From a3c4f86e809ecd508c8d46f272af0754563044db Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Wed, 5 Feb 2025 18:03:55 +0100
Subject: [PATCH 050/145] fix(ssl): do not remove SSL directory
---
app/Actions/Database/StartMariadb.php | 3 +--
app/Actions/Database/StartMysql.php | 1 -
app/Actions/Database/StartPostgresql.php | 1 -
3 files changed, 1 insertion(+), 4 deletions(-)
diff --git a/app/Actions/Database/StartMariadb.php b/app/Actions/Database/StartMariadb.php
index dd6f2d735..cd001ae45 100644
--- a/app/Actions/Database/StartMariadb.php
+++ b/app/Actions/Database/StartMariadb.php
@@ -56,7 +56,6 @@ class StartMariadb
});
} else {
$this->commands[] = "echo 'Setting up SSL for this database.'";
- $this->commands[] = "rm -rf $this->configuration_dir/ssl";
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
$server = $this->database->destination->server;
$caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
@@ -188,7 +187,7 @@ class StartMariadb
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml up -d";
$this->commands[] = "echo 'Database started.'";
if ($this->database->enable_ssl) {
- $this->commands[] = executeInDocker($this->database->uuid, 'chown mariadb:mariadb /etc/mysql/certs/server.crt /etc/mysql/certs/server.key');
+ $this->commands[] = executeInDocker($this->database->uuid, "chown {$this->database->mariadb_user}:{$this->database->mariadb_user} /etc/mysql/certs/server.crt /etc/mysql/certs/server.key");
}
return remote_process($this->commands, $database->destination->server, callEventOnFinish: 'DatabaseStatusChanged');
diff --git a/app/Actions/Database/StartMysql.php b/app/Actions/Database/StartMysql.php
index 88fcfe911..b7b18361e 100644
--- a/app/Actions/Database/StartMysql.php
+++ b/app/Actions/Database/StartMysql.php
@@ -56,7 +56,6 @@ class StartMysql
});
} else {
$this->commands[] = "echo 'Setting up SSL for this database.'";
- $this->commands[] = "rm -rf $this->configuration_dir/ssl";
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
$server = $this->database->destination->server;
$caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
diff --git a/app/Actions/Database/StartPostgresql.php b/app/Actions/Database/StartPostgresql.php
index 9ce953491..b582136a3 100644
--- a/app/Actions/Database/StartPostgresql.php
+++ b/app/Actions/Database/StartPostgresql.php
@@ -61,7 +61,6 @@ class StartPostgresql
});
} else {
$this->commands[] = "echo 'Setting up SSL for this database.'";
- $this->commands[] = "rm -rf $this->configuration_dir/ssl";
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
$server = $this->database->destination->server;
From 10038586328ab193603fb98bb10833e2d0b5bbd6 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Wed, 5 Feb 2025 18:06:38 +0100
Subject: [PATCH 051/145] feat(ssl): Add `openssl.conf` to configure SSL
extension properly
---
app/Helpers/SslHelper.php | 58 +++++++++++++++++++++++++++++++++------
1 file changed, 50 insertions(+), 8 deletions(-)
diff --git a/app/Helpers/SslHelper.php b/app/Helpers/SslHelper.php
index b410cb4f8..b1731d2ce 100644
--- a/app/Helpers/SslHelper.php
+++ b/app/Helpers/SslHelper.php
@@ -59,17 +59,56 @@ class SslHelper
$subjectAlternativeNames = array_unique(
array_merge(["DNS:$commonName"], $subjectAlternativeNames)
);
- $certificateSubject = [
+
+ $countryCode = self::DEFAULT_COUNTRY_CODE;
+ $state = self::DEFAULT_STATE;
+ $organization = self::DEFAULT_ORGANIZATION_NAME;
+
+ $altNames = [];
+ foreach ($subjectAlternativeNames as $index => $san) {
+ [$type, $value] = explode(':', $san, 2);
+ $altNames[] = "{$type}.".($index + 1)." = $value";
+ }
+ $altNamesSection = implode("\n", $altNames);
+
+ $basicConstraints = $isCaCertificate ? 'CA:TRUE' : 'CA:FALSE';
+ $keyUsage = $isCaCertificate ? 'keyCertSign, cRLSign' : 'digitalSignature, keyEncipherment';
+ $extendedKeyUsage = $isCaCertificate ? '' : 'extendedKeyUsage = serverAuth';
+
+ $config = << $commonName,
- 'subjectAltName' => $subjectAlternativeNames,
'organizationName' => self::DEFAULT_ORGANIZATION_NAME,
'countryName' => self::DEFAULT_COUNTRY_CODE,
'stateOrProvinceName' => self::DEFAULT_STATE,
- ];
-
- $csr = openssl_csr_new($certificateSubject, $privateKey, [
+ ], $privateKey, [
'digest_alg' => 'sha512',
- 'config' => null,
+ 'config' => $tempConfigPath,
'encrypt_key' => false,
]);
@@ -84,9 +123,10 @@ class SslHelper
$validityDays,
[
'digest_alg' => 'sha512',
- 'config' => null,
+ 'config' => $tempConfigPath,
+ 'x509_extensions' => 'v3_req',
],
- random_int(PHP_INT_MIN, PHP_INT_MAX)
+ random_int(1, PHP_INT_MAX)
);
if ($certificate === false) {
@@ -154,6 +194,8 @@ class SslHelper
]);
}
+ fclose($tempConfig);
+
return $sslCertificate;
} catch (\Throwable $e) {
throw new \RuntimeException('SSL Certificate generation failed: '.$e->getMessage(), 0, $e);
From 7666cec462075854f0719274b42e6a90b1c5a90b Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Wed, 5 Feb 2025 21:10:37 +0100
Subject: [PATCH 052/145] fix(ssl): wrong ssl cert is loaded to the server and
UI error when regenerating SSL
---
app/Livewire/Server/Advanced.php | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/app/Livewire/Server/Advanced.php b/app/Livewire/Server/Advanced.php
index 4390d691e..04d45620e 100644
--- a/app/Livewire/Server/Advanced.php
+++ b/app/Livewire/Server/Advanced.php
@@ -80,6 +80,8 @@ class Advanced extends Component
$this->caCertificate->ssl_certificate = $this->certificateContent;
$this->caCertificate->save();
+ $this->loadCaCertificate();
+
$this->writeCertificateToServer();
dispatch(new RegenerateSslCertJob(
@@ -103,6 +105,8 @@ class Advanced extends Component
validityDays: 15 * 365
);
+ $this->loadCaCertificate();
+
$this->writeCertificateToServer();
dispatch(new RegenerateSslCertJob(
@@ -126,7 +130,7 @@ class Advanced extends Component
"chown -R 9999:root $caCertPath",
"chmod -R 700 $caCertPath",
"rm -f $caCertPath/coolify-ca.crt",
- "echo '{$this->caCertificate->ssl_certificate}' > $caCertPath/coolify-ca.crt",
+ "echo '{$this->certificateContent}' > $caCertPath/coolify-ca.crt",
"chmod 644 $caCertPath/coolify-ca.crt",
]);
From ba24630c28ec72999a646f42708f540ff92885ae Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Wed, 5 Feb 2025 21:13:30 +0100
Subject: [PATCH 053/145] fix(ssl): make sure when regenerating the CA cert it
is not overwritten with a server cert
---
app/Jobs/RegenerateSslCertJob.php | 2 ++
1 file changed, 2 insertions(+)
diff --git a/app/Jobs/RegenerateSslCertJob.php b/app/Jobs/RegenerateSslCertJob.php
index a623f696c..541e53b7e 100644
--- a/app/Jobs/RegenerateSslCertJob.php
+++ b/app/Jobs/RegenerateSslCertJob.php
@@ -35,6 +35,8 @@ class RegenerateSslCertJob implements ShouldQueue
$query->where('valid_until', '<=', now()->addDays(14));
}
+ $query->where('is_ca_certificate', false);
+
$certificates = $query->get();
if ($certificates->isEmpty()) {
From 951a454cbceac78a8246d496ae59c0250bc9c0f6 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Wed, 5 Feb 2025 21:22:54 +0100
Subject: [PATCH 054/145] fix(ssl): regenerating certs for a specific DB
- fix: add mount path to make file mounts work correctly
- fix: get CA cert of the server not some random cert
---
app/Livewire/Project/Database/Mariadb/General.php | 13 ++++++++-----
app/Livewire/Project/Database/Mysql/General.php | 13 ++++++++-----
.../Project/Database/Postgresql/General.php | 13 ++++++++-----
3 files changed, 24 insertions(+), 15 deletions(-)
diff --git a/app/Livewire/Project/Database/Mariadb/General.php b/app/Livewire/Project/Database/Mariadb/General.php
index ac6e79140..63bfd16cd 100644
--- a/app/Livewire/Project/Database/Mariadb/General.php
+++ b/app/Livewire/Project/Database/Mariadb/General.php
@@ -158,10 +158,9 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $server = $this->database->destination->server;
-
$existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
->where('resource_id', $this->database->id)
+ ->where('server_id', $this->server->id)
->first();
if (! $existingCert) {
@@ -170,7 +169,10 @@ class General extends Component
return;
}
- $caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
+ $caCertificate = SslCertificate::where('server_id', $this->server->id)
+ ->where('resource_type', null)
+ ->where('resource_id', null)
+ ->first();
SslHelper::generateSslCertificate(
commonName: $existingCert->common_name,
@@ -178,9 +180,10 @@ class General extends Component
resourceType: $existingCert->resource_type,
resourceId: $existingCert->resource_id,
serverId: $existingCert->server_id,
- caCert: $caCert->ssl_certificate,
- caKey: $caCert->ssl_private_key,
+ caCert: $caCertificate->ssl_certificate,
+ caKey: $caCertificate->ssl_private_key,
configurationDir: $existingCert->configuration_dir,
+ mountPath: '/var/lib/mysql/certs',
);
$this->dispatch('success', 'SSL certificates have been regenerated. Please restart the database for changes to take effect.');
diff --git a/app/Livewire/Project/Database/Mysql/General.php b/app/Livewire/Project/Database/Mysql/General.php
index 9ae54e60a..d7d34c2e1 100644
--- a/app/Livewire/Project/Database/Mysql/General.php
+++ b/app/Livewire/Project/Database/Mysql/General.php
@@ -158,10 +158,9 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $server = $this->database->destination->server;
-
$existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
->where('resource_id', $this->database->id)
+ ->where('server_id', $this->server->id)
->first();
if (! $existingCert) {
@@ -170,7 +169,10 @@ class General extends Component
return;
}
- $caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
+ $caCertificate = SslCertificate::where('server_id', $this->server->id)
+ ->where('resource_type', null)
+ ->where('resource_id', null)
+ ->first();
SslHelper::generateSslCertificate(
commonName: $existingCert->common_name,
@@ -178,9 +180,10 @@ class General extends Component
resourceType: $existingCert->resource_type,
resourceId: $existingCert->resource_id,
serverId: $existingCert->server_id,
- caCert: $caCert->ssl_certificate,
- caKey: $caCert->ssl_private_key,
+ caCert: $caCertificate->ssl_certificate,
+ caKey: $caCertificate->ssl_private_key,
configurationDir: $existingCert->configuration_dir,
+ mountPath: '/var/lib/mysql/certs',
);
$this->dispatch('success', 'SSL certificates have been regenerated. Please restart the database for changes to take effect.');
diff --git a/app/Livewire/Project/Database/Postgresql/General.php b/app/Livewire/Project/Database/Postgresql/General.php
index cb8cefc76..534b66a6d 100644
--- a/app/Livewire/Project/Database/Postgresql/General.php
+++ b/app/Livewire/Project/Database/Postgresql/General.php
@@ -122,10 +122,9 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $server = $this->database->destination->server;
-
$existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
->where('resource_id', $this->database->id)
+ ->where('server_id', $this->server->id)
->first();
if (! $existingCert) {
@@ -134,7 +133,10 @@ class General extends Component
return;
}
- $caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
+ $caCertificate = SslCertificate::where('server_id', $this->server->id)
+ ->where('resource_type', null)
+ ->where('resource_id', null)
+ ->first();
SslHelper::generateSslCertificate(
commonName: $existingCert->common_name,
@@ -142,9 +144,10 @@ class General extends Component
resourceType: $existingCert->resource_type,
resourceId: $existingCert->resource_id,
serverId: $existingCert->server_id,
- caCert: $caCert->ssl_certificate,
- caKey: $caCert->ssl_private_key,
+ caCert: $caCertificate->ssl_certificate,
+ caKey: $caCertificate->ssl_private_key,
configurationDir: $existingCert->configuration_dir,
+ mountPath: '/var/lib/postgresql/certs',
);
$this->dispatch('success', 'SSL certificates have been regenerated. Please restart the database for changes to take effect.');
From 806d9af5690aaf5c60641c8f19fa18602324df03 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Wed, 5 Feb 2025 22:09:37 +0100
Subject: [PATCH 055/145] feat(ssl): improve SSL generation and security a lot
- rename some variables for better clarity
- format subjectAltNames correctly
- setup extensions more securely and improve them a lot
- use finally block to remove tempConfig
---
app/Helpers/SslHelper.php | 60 +++++++++++++++++++++------------------
1 file changed, 32 insertions(+), 28 deletions(-)
diff --git a/app/Helpers/SslHelper.php b/app/Helpers/SslHelper.php
index b1731d2ce..955976366 100644
--- a/app/Helpers/SslHelper.php
+++ b/app/Helpers/SslHelper.php
@@ -10,9 +10,9 @@ class SslHelper
{
private const DEFAULT_ORGANIZATION_NAME = 'Coolify';
- private const DEFAULT_COUNTRY_CODE = 'ZZ';
+ private const DEFAULT_COUNTRY_NAME = 'ZZ';
- private const DEFAULT_STATE = 'Default';
+ private const DEFAULT_STATE_NAME = 'Default';
public static function generateSslCertificate(
string $commonName,
@@ -27,6 +27,9 @@ class SslHelper
?string $configurationDir = null,
?string $mountPath = null
): SslCertificate {
+ $organizationName = self::DEFAULT_ORGANIZATION_NAME;
+ $countryName = self::DEFAULT_COUNTRY_NAME;
+ $stateName = self::DEFAULT_STATE_NAME;
try {
$privateKey = openssl_pkey_new([
@@ -60,41 +63,42 @@ class SslHelper
array_merge(["DNS:$commonName"], $subjectAlternativeNames)
);
- $countryCode = self::DEFAULT_COUNTRY_CODE;
- $state = self::DEFAULT_STATE;
- $organization = self::DEFAULT_ORGANIZATION_NAME;
-
- $altNames = [];
+ $formattedSubjectAltNames = [];
foreach ($subjectAlternativeNames as $index => $san) {
[$type, $value] = explode(':', $san, 2);
- $altNames[] = "{$type}.".($index + 1)." = $value";
+ $formattedSubjectAltNames[] = "{$type}.".($index + 1)." = $value";
}
- $altNamesSection = implode("\n", $altNames);
+ $formattedSubjectAltNamesSection = implode("\n", $formattedSubjectAltNames);
- $basicConstraints = $isCaCertificate ? 'CA:TRUE' : 'CA:FALSE';
- $keyUsage = $isCaCertificate ? 'keyCertSign, cRLSign' : 'digitalSignature, keyEncipherment';
- $extendedKeyUsage = $isCaCertificate ? '' : 'extendedKeyUsage = serverAuth';
+ $basicConstraints = $isCaCertificate ? 'critical, CA:TRUE, pathlen:0' : 'critical, CA:FALSE';
+ $keyUsage = $isCaCertificate ? 'critical, keyCertSign, cRLSign' : 'critical, digitalSignature';
+ $authorityKeyIdentifierLine = $isCaCertificate ? '' : "authorityKeyIdentifier = critical,keyid,issuer\n";
$config = << $commonName,
- 'organizationName' => self::DEFAULT_ORGANIZATION_NAME,
- 'countryName' => self::DEFAULT_COUNTRY_CODE,
- 'stateOrProvinceName' => self::DEFAULT_STATE,
+ 'organizationName' => $organizationName,
+ 'countryName' => $countryName,
+ 'stateOrProvinceName' => $stateName,
], $privateKey, [
'digest_alg' => 'sha512',
'config' => $tempConfigPath,
- 'encrypt_key' => false,
+ 'req_extensions' => 'req_ext',
]);
if ($csr === false) {
@@ -194,11 +198,11 @@ class SslHelper
]);
}
- fclose($tempConfig);
-
return $sslCertificate;
} catch (\Throwable $e) {
throw new \RuntimeException('SSL Certificate generation failed: '.$e->getMessage(), 0, $e);
+ } finally {
+ fclose($tempConfig);
}
}
}
From 852be5fd93c356fb0c6e0896daf5e24e574daa6a Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Wed, 5 Feb 2025 22:11:10 +0100
Subject: [PATCH 056/145] feat(ssl): check for SSL renewal twice daily
---
app/Console/Kernel.php | 3 +++
1 file changed, 3 insertions(+)
diff --git a/app/Console/Kernel.php b/app/Console/Kernel.php
index 8b4240412..a63f67857 100644
--- a/app/Console/Kernel.php
+++ b/app/Console/Kernel.php
@@ -10,6 +10,7 @@ use App\Jobs\CleanupStaleMultiplexedConnections;
use App\Jobs\DatabaseBackupJob;
use App\Jobs\DockerCleanupJob;
use App\Jobs\PullTemplatesFromCDN;
+use App\Jobs\RegenerateSslCertJob;
use App\Jobs\ScheduledTaskJob;
use App\Jobs\ServerCheckJob;
use App\Jobs\ServerCleanupMux;
@@ -84,6 +85,8 @@ class Kernel extends ConsoleKernel
$this->checkScheduledBackups();
$this->checkScheduledTasks();
+ $this->scheduleInstance->job(new RegenerateSslCertJob)->twiceDaily();
+
$this->scheduleInstance->command('cleanup:database --yes')->daily();
$this->scheduleInstance->command('uploads:clear')->everyTwoMinutes();
}
From 844f40188afe79877dee810bfb3b8718fe63940f Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Wed, 5 Feb 2025 22:19:13 +0100
Subject: [PATCH 057/145] feat(ssl): Add SSL relationships to all DBs
---
app/Models/StandaloneClickhouse.php | 5 +++++
app/Models/StandaloneDragonfly.php | 5 +++++
app/Models/StandaloneKeydb.php | 5 +++++
app/Models/StandaloneMariadb.php | 5 +++++
app/Models/StandaloneMongodb.php | 5 +++++
app/Models/StandaloneMysql.php | 5 +++++
app/Models/StandaloneRedis.php | 5 +++++
7 files changed, 35 insertions(+)
diff --git a/app/Models/StandaloneClickhouse.php b/app/Models/StandaloneClickhouse.php
index 60198115d..2f86c2060 100644
--- a/app/Models/StandaloneClickhouse.php
+++ b/app/Models/StandaloneClickhouse.php
@@ -163,6 +163,11 @@ class StandaloneClickhouse extends BaseModel
return data_get($this, 'environment.project');
}
+ public function sslCertificates()
+ {
+ return $this->morphMany(SslCertificate::class, 'resource');
+ }
+
public function link()
{
if (data_get($this, 'environment.project.uuid')) {
diff --git a/app/Models/StandaloneDragonfly.php b/app/Models/StandaloneDragonfly.php
index 3c1127d8d..6e7915faa 100644
--- a/app/Models/StandaloneDragonfly.php
+++ b/app/Models/StandaloneDragonfly.php
@@ -168,6 +168,11 @@ class StandaloneDragonfly extends BaseModel
return data_get($this, 'environment.project.team');
}
+ public function sslCertificates()
+ {
+ return $this->morphMany(SslCertificate::class, 'resource');
+ }
+
public function link()
{
if (data_get($this, 'environment.project.uuid')) {
diff --git a/app/Models/StandaloneKeydb.php b/app/Models/StandaloneKeydb.php
index ebf1c22e9..3e80408ef 100644
--- a/app/Models/StandaloneKeydb.php
+++ b/app/Models/StandaloneKeydb.php
@@ -168,6 +168,11 @@ class StandaloneKeydb extends BaseModel
return data_get($this, 'environment.project.team');
}
+ public function sslCertificates()
+ {
+ return $this->morphMany(SslCertificate::class, 'resource');
+ }
+
public function link()
{
if (data_get($this, 'environment.project.uuid')) {
diff --git a/app/Models/StandaloneMariadb.php b/app/Models/StandaloneMariadb.php
index 3708c02a9..24f011f12 100644
--- a/app/Models/StandaloneMariadb.php
+++ b/app/Models/StandaloneMariadb.php
@@ -289,6 +289,11 @@ class StandaloneMariadb extends BaseModel
return $this->morphMany(ScheduledDatabaseBackup::class, 'database');
}
+ public function sslCertificates()
+ {
+ return $this->morphMany(SslCertificate::class, 'resource');
+ }
+
public function getCpuMetrics(int $mins = 5)
{
$server = $this->destination->server;
diff --git a/app/Models/StandaloneMongodb.php b/app/Models/StandaloneMongodb.php
index aba0f6123..dfc6ec13b 100644
--- a/app/Models/StandaloneMongodb.php
+++ b/app/Models/StandaloneMongodb.php
@@ -177,6 +177,11 @@ class StandaloneMongodb extends BaseModel
return data_get($this, 'is_log_drain_enabled', false);
}
+ public function sslCertificates()
+ {
+ return $this->morphMany(SslCertificate::class, 'resource');
+ }
+
public function link()
{
if (data_get($this, 'environment.project.uuid')) {
diff --git a/app/Models/StandaloneMysql.php b/app/Models/StandaloneMysql.php
index 1bd75995c..cf45df578 100644
--- a/app/Models/StandaloneMysql.php
+++ b/app/Models/StandaloneMysql.php
@@ -169,6 +169,11 @@ class StandaloneMysql extends BaseModel
return data_get($this, 'environment.project.team');
}
+ public function sslCertificates()
+ {
+ return $this->morphMany(SslCertificate::class, 'resource');
+ }
+
public function link()
{
if (data_get($this, 'environment.project.uuid')) {
diff --git a/app/Models/StandaloneRedis.php b/app/Models/StandaloneRedis.php
index ed5cf9870..ebb0fbe30 100644
--- a/app/Models/StandaloneRedis.php
+++ b/app/Models/StandaloneRedis.php
@@ -164,6 +164,11 @@ class StandaloneRedis extends BaseModel
return data_get($this, 'environment.project.team');
}
+ public function sslCertificates()
+ {
+ return $this->morphMany(SslCertificate::class, 'resource');
+ }
+
public function link()
{
if (data_get($this, 'environment.project.uuid')) {
From 367eebc9fcddaef46a10a20b061f9b46351d5ebd Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Wed, 5 Feb 2025 22:56:29 +0100
Subject: [PATCH 058/145] feat: Add full SSL support to MongoDB
---
app/Actions/Database/StartMongodb.php | 141 +++++++++++++++---
.../Project/Database/Mongodb/General.php | 65 ++++++++
app/Models/StandaloneMongodb.php | 28 +++-
.../database/mongodb/general.blade.php | 47 ++++++
4 files changed, 260 insertions(+), 21 deletions(-)
diff --git a/app/Actions/Database/StartMongodb.php b/app/Actions/Database/StartMongodb.php
index 89d35ca7b..bf36d3802 100644
--- a/app/Actions/Database/StartMongodb.php
+++ b/app/Actions/Database/StartMongodb.php
@@ -2,6 +2,8 @@
namespace App\Actions\Database;
+use App\Helpers\SslHelper;
+use App\Models\SslCertificate;
use App\Models\StandaloneMongodb;
use Lorisleiva\Actions\Concerns\AsAction;
use Symfony\Component\Yaml\Yaml;
@@ -16,6 +18,8 @@ class StartMongodb
public string $configuration_dir;
+ private ?SslCertificate $ssl_certificate = null;
+
public function handle(StandaloneMongodb $database)
{
$this->database = $database;
@@ -24,16 +28,62 @@ class StartMongodb
$container_name = $this->database->uuid;
$this->configuration_dir = database_configuration_dir().'/'.$container_name;
-
if (isDev()) {
$this->configuration_dir = '/var/lib/docker/volumes/coolify_dev_coolify_data/_data/databases/'.$container_name;
}
$this->commands = [
"echo 'Starting database.'",
+ "echo 'Creating directories.'",
"mkdir -p $this->configuration_dir",
+ "echo 'Directories created successfully.'",
];
+ if (! $this->database->enable_ssl) {
+ $this->commands[] = "rm -rf $this->configuration_dir/ssl";
+
+ SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->delete();
+
+ $this->database->fileStorages()
+ ->where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->get()
+ ->filter(function ($storage) {
+ return in_array($storage->mount_path, [
+ '/etc/mongo/certs/server.crt',
+ '/etc/mongo/certs/server.key',
+ ]);
+ })
+ ->each(function ($storage) {
+ $storage->delete();
+ });
+ } else {
+ $this->commands[] = "echo 'Setting up SSL for this database.'";
+ $this->commands[] = "mkdir -p $this->configuration_dir/ssl";
+ $server = $this->database->destination->server;
+
+ $caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
+ $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->first();
+
+ if (! $this->ssl_certificate) {
+ $this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
+ $this->ssl_certificate = SslHelper::generateSslCertificate(
+ commonName: $this->database->uuid,
+ resourceType: $this->database->getMorphClass(),
+ resourceId: $this->database->id,
+ serverId: $server->id,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
+ configurationDir: $this->configuration_dir,
+ mountPath: '/etc/mongo/certs',
+ );
+ }
+ }
+
$persistent_storages = $this->generate_local_persistent_volumes();
$persistent_file_volumes = $this->database->fileStorages()->get();
$volume_names = $this->generate_local_persistent_volumes_only_volume_names();
@@ -79,47 +129,97 @@ class StartMongodb
],
],
];
+
if (! is_null($this->database->limits_cpuset)) {
data_set($docker_compose, "services.{$container_name}.cpuset", $this->database->limits_cpuset);
}
+
if ($this->database->destination->server->isLogDrainEnabled() && $this->database->isLogDrainEnabled()) {
$docker_compose['services'][$container_name]['logging'] = generate_fluentd_configuration();
}
+
if (count($this->database->ports_mappings_array) > 0) {
$docker_compose['services'][$container_name]['ports'] = $this->database->ports_mappings_array;
}
+
+ $docker_compose['services'][$container_name]['volumes'] ??= [];
+
if (count($persistent_storages) > 0) {
- $docker_compose['services'][$container_name]['volumes'] = $persistent_storages;
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ $persistent_storages
+ );
}
+
if (count($persistent_file_volumes) > 0) {
- $docker_compose['services'][$container_name]['volumes'] = $persistent_file_volumes->map(function ($item) {
- return "$item->fs_path:$item->mount_path";
- })->toArray();
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ $persistent_file_volumes->map(function ($item) {
+ return "$item->fs_path:$item->mount_path";
+ })->toArray()
+ );
}
+
if (count($volume_names) > 0) {
$docker_compose['volumes'] = $volume_names;
}
- if (! is_null($this->database->mongo_conf) || ! empty($this->database->mongo_conf)) {
- $docker_compose['services'][$container_name]['volumes'][] = [
- 'type' => 'bind',
- 'source' => $this->configuration_dir.'/mongod.conf',
- 'target' => '/etc/mongo/mongod.conf',
- 'read_only' => true,
- ];
- $docker_compose['services'][$container_name]['command'] = $startCommand.' --config /etc/mongo/mongod.conf';
+
+ if (! empty($this->database->mongo_conf)) {
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ [[
+ 'type' => 'bind',
+ 'source' => $this->configuration_dir.'/mongod.conf',
+ 'target' => '/etc/mongo/mongod.conf',
+ 'read_only' => true,
+ ]]
+ );
}
+
$this->add_default_database();
- $docker_compose['services'][$container_name]['volumes'][] = [
- 'type' => 'bind',
- 'source' => $this->configuration_dir.'/docker-entrypoint-initdb.d',
- 'target' => '/docker-entrypoint-initdb.d',
- 'read_only' => true,
- ];
+
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ [[
+ 'type' => 'bind',
+ 'source' => $this->configuration_dir.'/docker-entrypoint-initdb.d',
+ 'target' => '/docker-entrypoint-initdb.d',
+ 'read_only' => true,
+ ]]
+ );
// Add custom docker run options
$docker_run_options = convertDockerRunToCompose($this->database->custom_docker_run_options);
$docker_compose = generateCustomDockerRunOptionsForDatabases($docker_run_options, $docker_compose, $container_name, $this->database->destination->network);
+ if ($this->database->enable_ssl) {
+ $commandParts = ['mongod'];
+
+ $commandParts[] = '--sslPEMKeyFile';
+ $commandParts[] = '/etc/mongo/certs/server.pem';
+ $commandParts[] = '--sslCAFile';
+ $commandParts[] = '/etc/mongo/certs/ca.pem';
+
+ $sslConfig = match ($this->database->ssl_mode) {
+ 'verifyCA' => [
+ '--sslMode=requireSSL',
+ '--tlsAllowInvalidCertificates=false',
+ ],
+ 'verifyFull' => [
+ '--sslMode=requireSSL',
+ '--tlsAllowInvalidCertificates=false',
+ '--tlsAllowInvalidHostnames=false',
+ ],
+ 'requireSSL' => ['--sslMode=requireSSL'],
+ 'preferSSL' => ['--sslMode=preferSSL'],
+ 'allowSSL' => ['--sslMode=allowSSL'],
+ default => []
+ };
+
+ $commandParts = [...$commandParts, ...$sslConfig];
+ $docker_compose['services'][$container_name]['command'] = $commandParts;
+ }
+
$docker_compose = Yaml::dump($docker_compose, 10);
$docker_compose_base64 = base64_encode($docker_compose);
$this->commands[] = "echo '{$docker_compose_base64}' | base64 -d | tee $this->configuration_dir/docker-compose.yml > /dev/null";
@@ -128,6 +228,9 @@ class StartMongodb
$this->commands[] = "echo 'Pulling {$database->image} image.'";
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml pull";
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml up -d";
+ if ($this->database->enable_ssl) {
+ $this->commands[] = executeInDocker($this->database->uuid, "chown {$this->database->mongo_initdb_root_username}:{$this->database->mongo_initdb_root_username} /etc/mongo/certs/server.pem /etc/mongo/certs/ca.pem");
+ }
$this->commands[] = "echo 'Database started.'";
return remote_process($this->commands, $database->destination->server, callEventOnFinish: 'DatabaseStatusChanged');
diff --git a/app/Livewire/Project/Database/Mongodb/General.php b/app/Livewire/Project/Database/Mongodb/General.php
index e19895dae..911b74f55 100644
--- a/app/Livewire/Project/Database/Mongodb/General.php
+++ b/app/Livewire/Project/Database/Mongodb/General.php
@@ -4,7 +4,9 @@ namespace App\Livewire\Project\Database\Mongodb;
use App\Actions\Database\StartDatabaseProxy;
use App\Actions\Database\StopDatabaseProxy;
+use App\Helpers\SslHelper;
use App\Models\Server;
+use App\Models\SslCertificate;
use App\Models\StandaloneMongodb;
use Exception;
use Livewire\Component;
@@ -21,6 +23,8 @@ class General extends Component
public ?string $db_url_public = null;
+ public $certificateValidUntil = null;
+
protected $rules = [
'database.name' => 'required',
'database.description' => 'nullable',
@@ -34,6 +38,8 @@ class General extends Component
'database.public_port' => 'nullable|integer',
'database.is_log_drain_enabled' => 'nullable|boolean',
'database.custom_docker_run_options' => 'nullable',
+ 'database.enable_ssl' => 'boolean',
+ 'database.ssl_mode' => 'nullable|string|in:allowSSL,preferSSL,requireSSL,verifyCA,verifyFull',
];
protected $validationAttributes = [
@@ -48,6 +54,8 @@ class General extends Component
'database.is_public' => 'Is Public',
'database.public_port' => 'Public Port',
'database.custom_docker_run_options' => 'Custom Docker Run Options',
+ 'database.enable_ssl' => 'Enable SSL',
+ 'database.ssl_mode' => 'SSL Mode',
];
public function mount()
@@ -55,6 +63,14 @@ class General extends Component
$this->db_url = $this->database->internal_db_url;
$this->db_url_public = $this->database->external_db_url;
$this->server = data_get($this->database, 'destination.server');
+
+ $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->first();
+
+ if ($existingCert) {
+ $this->certificateValidUntil = $existingCert->valid_until;
+ }
}
public function instantSaveAdvanced()
@@ -128,6 +144,55 @@ class General extends Component
}
}
+ public function instantSaveSSL()
+ {
+ try {
+ $this->database->enable_ssl = $this->database->enable_ssl;
+ $this->database->ssl_mode = $this->database->ssl_mode;
+ $this->database->save();
+ $this->dispatch('success', 'SSL configuration updated.');
+ } catch (Exception $e) {
+ return handleError($e, $this);
+ }
+ }
+
+ public function regenerateSslCertificate()
+ {
+ try {
+ $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->where('server_id', $this->server->id)
+ ->first();
+
+ if (! $existingCert) {
+ $this->dispatch('error', 'No existing SSL certificate found for this database.');
+
+ return;
+ }
+
+ $caCertificate = SslCertificate::where('server_id', $this->server->id)
+ ->where('resource_type', null)
+ ->where('resource_id', null)
+ ->first();
+
+ SslHelper::generateSslCertificate(
+ commonName: $existingCert->common_name,
+ subjectAlternativeNames: $existingCert->subject_alternative_names ?? [],
+ resourceType: $existingCert->resource_type,
+ resourceId: $existingCert->resource_id,
+ serverId: $existingCert->server_id,
+ caCert: $caCertificate->ssl_certificate,
+ caKey: $caCertificate->ssl_private_key,
+ configurationDir: $existingCert->configuration_dir,
+ mountPath: '/etc/mongo/certs',
+ );
+
+ $this->dispatch('success', 'SSL certificates have been regenerated. Please restart the database for changes to take effect.');
+ } catch (Exception $e) {
+ return handleError($e, $this);
+ }
+ }
+
public function refresh(): void
{
$this->database->refresh();
diff --git a/app/Models/StandaloneMongodb.php b/app/Models/StandaloneMongodb.php
index dfc6ec13b..0b282eea1 100644
--- a/app/Models/StandaloneMongodb.php
+++ b/app/Models/StandaloneMongodb.php
@@ -243,7 +243,20 @@ class StandaloneMongodb extends BaseModel
protected function internalDbUrl(): Attribute
{
return new Attribute(
- get: fn () => "mongodb://{$this->mongo_initdb_root_username}:{$this->mongo_initdb_root_password}@{$this->uuid}:27017/?directConnection=true",
+ get: function () {
+ $url = "mongodb://{$this->mongo_initdb_root_username}:{$this->mongo_initdb_root_password}@{$this->uuid}:27017/?directConnection=true";
+ if ($this->enable_ssl) {
+ $url .= '&ssl=true';
+ if (in_array($this->ssl_mode, ['verifyCA', 'verifyFull'])) {
+ $url .= '&tlsAllowInvalidCertificates=false';
+ }
+ if ($this->ssl_mode === 'verifyFull') {
+ $url .= '&tlsAllowInvalidHostnames=false';
+ }
+ }
+
+ return $url;
+ },
);
}
@@ -252,7 +265,18 @@ class StandaloneMongodb extends BaseModel
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
- return "mongodb://{$this->mongo_initdb_root_username}:{$this->mongo_initdb_root_password}@{$this->destination->server->getIp}:{$this->public_port}/?directConnection=true";
+ $url = "mongodb://{$this->mongo_initdb_root_username}:{$this->mongo_initdb_root_password}@{$this->destination->server->getIp}:{$this->public_port}/?directConnection=true";
+ if ($this->enable_ssl) {
+ $url .= '&ssl=true';
+ if (in_array($this->ssl_mode, ['verifyCA', 'verifyFull'])) {
+ $url .= '&tlsAllowInvalidCertificates=false';
+ }
+ if ($this->ssl_mode === 'verifyFull') {
+ $url .= '&tlsAllowInvalidHostnames=false';
+ }
+ }
+
+ return $url;
}
return null;
diff --git a/resources/views/livewire/project/database/mongodb/general.blade.php b/resources/views/livewire/project/database/mongodb/general.blade.php
index 72fd2f75d..b64884525 100644
--- a/resources/views/livewire/project/database/mongodb/general.blade.php
+++ b/resources/views/livewire/project/database/mongodb/general.blade.php
@@ -55,6 +55,53 @@
type="password" readonly wire:model="db_url_public" />
@endif
+
+
+
+
+
SSL Configuration
+ @if($database->enable_ssl)
+
+ @endif
+
+
+ @if($database->enable_ssl && $certificateValidUntil)
+
Valid until:
+ @if(now()->gt($certificateValidUntil))
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }} - Expired
+ @elseif(now()->addDays(30)->gt($certificateValidUntil))
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }} - Expiring soon
+ @else
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }}
+ @endif
+
+ @endif
+
+
+
+
+ @if($database->enable_ssl)
+
+
+
+
+
+
+
+ @endif
+
+
+
From 6eabfd5c8e4e8aebf0f31b9d5ea667fc72243f19 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Thu, 6 Feb 2025 15:13:08 +0100
Subject: [PATCH 059/145] feat/fix(ssl): fix some issues and improve ssl
generation helper
- set default country to XX
- fix array handling of the subjectAlternativeNames so that no indexes are added or skipped
- add extendedKeyUsage to server certs to make them more secure
- add keyAgreement to server certs
- remove authorityKeyIdentifier as it caused the following issue: unable to get local issuer certificate
- removed duplicated distinguished_name entries
- improved formatting
---
app/Helpers/SslHelper.php | 76 ++++++++++++++++++++++-----------------
1 file changed, 43 insertions(+), 33 deletions(-)
diff --git a/app/Helpers/SslHelper.php b/app/Helpers/SslHelper.php
index 955976366..440815b80 100644
--- a/app/Helpers/SslHelper.php
+++ b/app/Helpers/SslHelper.php
@@ -10,7 +10,7 @@ class SslHelper
{
private const DEFAULT_ORGANIZATION_NAME = 'Coolify';
- private const DEFAULT_COUNTRY_NAME = 'ZZ';
+ private const DEFAULT_COUNTRY_NAME = 'XX';
private const DEFAULT_STATE_NAME = 'Default';
@@ -50,55 +50,65 @@ class SslHelper
if ($server) {
$ip = $server->getIp;
if ($ip) {
- if (filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4 | FILTER_FLAG_IPV6)) {
- $subjectAlternativeNames[] = "IP:$ip";
- } else {
- $subjectAlternativeNames[] = "DNS:$ip";
- }
+ $type = filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4 | FILTER_FLAG_IPV6)
+ ? 'IP'
+ : 'DNS';
+ $subjectAlternativeNames = array_unique(
+ array_merge($subjectAlternativeNames, ["$type:$ip"])
+ );
}
}
}
- $subjectAlternativeNames = array_unique(
- array_merge(["DNS:$commonName"], $subjectAlternativeNames)
- );
-
- $formattedSubjectAltNames = [];
- foreach ($subjectAlternativeNames as $index => $san) {
- [$type, $value] = explode(':', $san, 2);
- $formattedSubjectAltNames[] = "{$type}.".($index + 1)." = $value";
- }
- $formattedSubjectAltNamesSection = implode("\n", $formattedSubjectAltNames);
-
$basicConstraints = $isCaCertificate ? 'critical, CA:TRUE, pathlen:0' : 'critical, CA:FALSE';
- $keyUsage = $isCaCertificate ? 'critical, keyCertSign, cRLSign' : 'critical, digitalSignature';
- $authorityKeyIdentifierLine = $isCaCertificate ? '' : "authorityKeyIdentifier = critical,keyid,issuer\n";
+ $keyUsage = $isCaCertificate ? 'critical, keyCertSign, cRLSign' : 'critical, digitalSignature, keyAgreement';
+
+ $subjectAltNameSection = '';
+ $extendedKeyUsageSection = '';
+
+ if (! $isCaCertificate) {
+ $extendedKeyUsageSection = "\nextendedKeyUsage = serverAuth";
+
+ $subjectAlternativeNames = array_values(
+ array_unique(
+ array_merge(["DNS:$commonName"], $subjectAlternativeNames)
+ )
+ );
+
+ $formattedSubjectAltNames = array_map(
+ function ($index, $san) {
+ [$type, $value] = explode(':', $san, 2);
+
+ return "{$type}.".($index + 1)." = $value";
+ },
+ array_keys($subjectAlternativeNames),
+ $subjectAlternativeNames
+ );
+
+ $subjectAltNameSection = "subjectAltName = @subject_alt_names\n\n[ subject_alt_names ]\n"
+ .implode("\n", $formattedSubjectAltNames);
+ }
$config = <<
Date: Thu, 6 Feb 2025 15:14:57 +0100
Subject: [PATCH 060/145] fix(ssl): fix MariaDB and MySQL need CA cert
---
app/Actions/Database/StartMariadb.php | 17 +++++++++++++++++
app/Actions/Database/StartMysql.php | 19 +++++++++++++++++++
2 files changed, 36 insertions(+)
diff --git a/app/Actions/Database/StartMariadb.php b/app/Actions/Database/StartMariadb.php
index cd001ae45..f97d732c9 100644
--- a/app/Actions/Database/StartMariadb.php
+++ b/app/Actions/Database/StartMariadb.php
@@ -143,6 +143,7 @@ class StartMariadb
$persistent_storages
);
}
+
if (count($persistent_file_volumes) > 0) {
$docker_compose['services'][$container_name]['volumes'] = array_merge(
$docker_compose['services'][$container_name]['volumes'],
@@ -151,6 +152,21 @@ class StartMariadb
})->toArray()
);
}
+
+ if ($this->database->enable_ssl) {
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ [
+ [
+ 'type' => 'bind',
+ 'source' => '/data/coolify/ssl/coolify-ca.crt',
+ 'target' => '/etc/mysql/certs/ca.crt',
+ 'read_only' => true,
+ ],
+ ]
+ );
+ }
+
if (! is_null($this->database->mariadb_conf) || ! empty($this->database->mariadb_conf)) {
$docker_compose['services'][$container_name]['volumes'] = array_merge(
$docker_compose['services'][$container_name]['volumes'],
@@ -173,6 +189,7 @@ class StartMariadb
'mysqld',
'--ssl-cert=/etc/mysql/certs/server.crt',
'--ssl-key=/etc/mysql/certs/server.key',
+ '--ssl-ca=/etc/mysql/certs/ca.crt',
'--require-secure-transport=1',
];
}
diff --git a/app/Actions/Database/StartMysql.php b/app/Actions/Database/StartMysql.php
index b7b18361e..cbdda3381 100644
--- a/app/Actions/Database/StartMysql.php
+++ b/app/Actions/Database/StartMysql.php
@@ -118,6 +118,7 @@ class StartMysql
],
],
];
+
if (! is_null($this->database->limits_cpuset)) {
data_set($docker_compose, "services.{$container_name}.cpuset", $this->database->limits_cpuset);
}
@@ -138,6 +139,7 @@ class StartMysql
$persistent_storages
);
}
+
if (count($persistent_file_volumes) > 0) {
$docker_compose['services'][$container_name]['volumes'] = array_merge(
$docker_compose['services'][$container_name]['volumes'] ?? [],
@@ -146,9 +148,25 @@ class StartMysql
})->toArray()
);
}
+
if (count($volume_names) > 0) {
$docker_compose['volumes'] = $volume_names;
}
+
+ if ($this->database->enable_ssl) {
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ [
+ [
+ 'type' => 'bind',
+ 'source' => '/data/coolify/ssl/coolify-ca.crt',
+ 'target' => '/etc/mysql/certs/ca.crt',
+ 'read_only' => true,
+ ],
+ ]
+ );
+ }
+
if (! is_null($this->database->mysql_conf) || ! empty($this->database->mysql_conf)) {
$docker_compose['services'][$container_name]['volumes'] = array_merge(
$docker_compose['services'][$container_name]['volumes'] ?? [],
@@ -172,6 +190,7 @@ class StartMysql
'mysqld',
'--ssl-cert=/etc/mysql/certs/server.crt',
'--ssl-key=/etc/mysql/certs/server.key',
+ '--ssl-ca=/etc/mysql/certs/ca.crt',
'--require-secure-transport=1',
];
}
From f92c170db11bab1c45812dc19b36187753c1838d Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 18:07:55 +0100
Subject: [PATCH 061/145] feat(ssl): ability to create `.pem` certs and add
`clientAuth` to `extendedKeyUsage`
---
app/Helpers/SslHelper.php | 54 ++++++++++++++++++++++++---------------
1 file changed, 34 insertions(+), 20 deletions(-)
diff --git a/app/Helpers/SslHelper.php b/app/Helpers/SslHelper.php
index 440815b80..82c0a4553 100644
--- a/app/Helpers/SslHelper.php
+++ b/app/Helpers/SslHelper.php
@@ -25,7 +25,8 @@ class SslHelper
?string $caKey = null,
bool $isCaCertificate = false,
?string $configurationDir = null,
- ?string $mountPath = null
+ ?string $mountPath = null,
+ bool $isPemKeyFileRequired = false,
): SslCertificate {
$organizationName = self::DEFAULT_ORGANIZATION_NAME;
$countryName = self::DEFAULT_COUNTRY_NAME;
@@ -67,7 +68,7 @@ class SslHelper
$extendedKeyUsageSection = '';
if (! $isCaCertificate) {
- $extendedKeyUsageSection = "\nextendedKeyUsage = serverAuth";
+ $extendedKeyUsageSection = "\nextendedKeyUsage = serverAuth, clientAuth";
$subjectAlternativeNames = array_values(
array_unique(
@@ -181,31 +182,44 @@ class SslHelper
return in_array($storage->mount_path, [
$mountPath.'/server.crt',
$mountPath.'/server.key',
+ $mountPath.'/server.pem',
]);
})
->each(function ($storage) {
$storage->delete();
});
- $model->fileStorages()->create([
- 'fs_path' => $configurationDir.'/ssl/server.crt',
- 'mount_path' => $mountPath.'/server.crt',
- 'content' => $certificateStr,
- 'is_directory' => false,
- 'chmod' => '644',
- 'resource_type' => $resourceType,
- 'resource_id' => $resourceId,
- ]);
+ if ($isPemKeyFileRequired) {
+ $model->fileStorages()->create([
+ 'fs_path' => $configurationDir.'/ssl/server.pem',
+ 'mount_path' => $mountPath.'/server.pem',
+ 'content' => $certificateStr."\n".$privateKeyStr,
+ 'is_directory' => false,
+ 'chmod' => '600',
+ 'resource_type' => $resourceType,
+ 'resource_id' => $resourceId,
+ ]);
+ } else {
+ $model->fileStorages()->create([
+ 'fs_path' => $configurationDir.'/ssl/server.crt',
+ 'mount_path' => $mountPath.'/server.crt',
+ 'content' => $certificateStr,
+ 'is_directory' => false,
+ 'chmod' => '644',
+ 'resource_type' => $resourceType,
+ 'resource_id' => $resourceId,
+ ]);
- $model->fileStorages()->create([
- 'fs_path' => $configurationDir.'/ssl/server.key',
- 'mount_path' => $mountPath.'/server.key',
- 'content' => $privateKeyStr,
- 'is_directory' => false,
- 'chmod' => '600',
- 'resource_type' => $resourceType,
- 'resource_id' => $resourceId,
- ]);
+ $model->fileStorages()->create([
+ 'fs_path' => $configurationDir.'/ssl/server.key',
+ 'mount_path' => $mountPath.'/server.key',
+ 'content' => $privateKeyStr,
+ 'is_directory' => false,
+ 'chmod' => '600',
+ 'resource_type' => $resourceType,
+ 'resource_id' => $resourceId,
+ ]);
+ }
}
return $sslCertificate;
From 35cd9573ab3626b790b16de13aaf4b4c444b3a57 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 18:11:26 +0100
Subject: [PATCH 062/145] fix(ssl): add mount path to DB to fix regeneration of
certs
---
app/Helpers/SslHelper.php | 1 +
.../2025_01_27_153741_create_ssl_certificates_table.php | 1 +
2 files changed, 2 insertions(+)
diff --git a/app/Helpers/SslHelper.php b/app/Helpers/SslHelper.php
index 82c0a4553..6397c330d 100644
--- a/app/Helpers/SslHelper.php
+++ b/app/Helpers/SslHelper.php
@@ -165,6 +165,7 @@ class SslHelper
'resource_id' => $resourceId,
'server_id' => $serverId,
'configuration_dir' => $configurationDir,
+ 'mount_path' => $mountPath,
'valid_until' => CarbonImmutable::now()->addDays($validityDays),
'is_ca_certificate' => $isCaCertificate,
'common_name' => $commonName,
diff --git a/database/migrations/2025_01_27_153741_create_ssl_certificates_table.php b/database/migrations/2025_01_27_153741_create_ssl_certificates_table.php
index 1e7da5eb0..7907fb090 100644
--- a/database/migrations/2025_01_27_153741_create_ssl_certificates_table.php
+++ b/database/migrations/2025_01_27_153741_create_ssl_certificates_table.php
@@ -13,6 +13,7 @@ return new class extends Migration
$table->text('ssl_certificate');
$table->text('ssl_private_key');
$table->text('configuration_dir')->nullable();
+ $table->text('mount_path')->nullable();
$table->string('resource_type')->nullable();
$table->unsignedBigInteger('resource_id')->nullable();
$table->unsignedBigInteger('server_id');
From 69a6010839f9022b7faa6ee910e00dd4b6fd25f4 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 18:12:55 +0100
Subject: [PATCH 063/145] fix(ssl): fix SSL regeneration to sign with CA cert
and use mount path
---
app/Jobs/RegenerateSslCertJob.php | 9 ++++++++-
1 file changed, 8 insertions(+), 1 deletion(-)
diff --git a/app/Jobs/RegenerateSslCertJob.php b/app/Jobs/RegenerateSslCertJob.php
index 541e53b7e..0155ee798 100644
--- a/app/Jobs/RegenerateSslCertJob.php
+++ b/app/Jobs/RegenerateSslCertJob.php
@@ -47,14 +47,21 @@ class RegenerateSslCertJob implements ShouldQueue
foreach ($certificates as $certificate) {
try {
+ $caCert = SslCertificate::where('server_id', $certificate->server_id)
+ ->where('resource_type', null)
+ ->where('resource_id', null)
+ ->first();
+
SSLHelper::generateSslCertificate(
commonName: $certificate->common_name,
subjectAlternativeNames: $certificate->subject_alternative_names,
resourceType: $certificate->resource_type,
resourceId: $certificate->resource_id,
serverId: $certificate->server_id,
- validityDays: 365,
configurationDir: $certificate->configuration_dir,
+ mountPath: $certificate->mount_path,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
);
$regenerated->push($certificate);
} catch (\Exception $e) {
From 6a52f518515f26a2b6be7b5ae5f24ba96c8928db Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 18:27:30 +0100
Subject: [PATCH 064/145] fix(ssl): get caCert correctly
---
app/Actions/Database/StartMariadb.php | 9 ++++-----
app/Actions/Database/StartMysql.php | 9 ++++-----
app/Actions/Database/StartPostgresql.php | 4 ++--
app/Jobs/RegenerateSslCertJob.php | 5 +----
4 files changed, 11 insertions(+), 16 deletions(-)
diff --git a/app/Actions/Database/StartMariadb.php b/app/Actions/Database/StartMariadb.php
index f97d732c9..50fd1ab00 100644
--- a/app/Actions/Database/StartMariadb.php
+++ b/app/Actions/Database/StartMariadb.php
@@ -57,12 +57,11 @@ class StartMariadb
} else {
$this->commands[] = "echo 'Setting up SSL for this database.'";
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
- $server = $this->database->destination->server;
- $caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $server = $this->database->destination->server;
+ $caCert = SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->first();
+
+ $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
diff --git a/app/Actions/Database/StartMysql.php b/app/Actions/Database/StartMysql.php
index cbdda3381..bec1c7fb1 100644
--- a/app/Actions/Database/StartMysql.php
+++ b/app/Actions/Database/StartMysql.php
@@ -57,12 +57,11 @@ class StartMysql
} else {
$this->commands[] = "echo 'Setting up SSL for this database.'";
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
- $server = $this->database->destination->server;
- $caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $server = $this->database->destination->server;
+ $caCert = SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->first();
+
+ $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
diff --git a/app/Actions/Database/StartPostgresql.php b/app/Actions/Database/StartPostgresql.php
index b582136a3..75f43a5ee 100644
--- a/app/Actions/Database/StartPostgresql.php
+++ b/app/Actions/Database/StartPostgresql.php
@@ -62,9 +62,9 @@ class StartPostgresql
} else {
$this->commands[] = "echo 'Setting up SSL for this database.'";
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
- $server = $this->database->destination->server;
- $caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
+ $server = $this->database->destination->server;
+ $caCert = SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->first();
$this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
diff --git a/app/Jobs/RegenerateSslCertJob.php b/app/Jobs/RegenerateSslCertJob.php
index 0155ee798..3e4bf9070 100644
--- a/app/Jobs/RegenerateSslCertJob.php
+++ b/app/Jobs/RegenerateSslCertJob.php
@@ -47,10 +47,7 @@ class RegenerateSslCertJob implements ShouldQueue
foreach ($certificates as $certificate) {
try {
- $caCert = SslCertificate::where('server_id', $certificate->server_id)
- ->where('resource_type', null)
- ->where('resource_id', null)
- ->first();
+ $caCert = SslCertificate::where('server_id', $certificate->server_id)->where('is_ca_certificate', true)->first();
SSLHelper::generateSslCertificate(
commonName: $certificate->common_name,
From 836006798fdbadced7daebc3d2236bf75f8d2d23 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 18:28:58 +0100
Subject: [PATCH 065/145] fix(ssl): remove caCert even if it is a folder by
accident
---
app/Actions/Server/InstallDocker.php | 5 +++--
app/Livewire/Server/Advanced.php | 7 ++-----
database/seeders/CaSslCertSeeder.php | 8 ++++----
3 files changed, 9 insertions(+), 11 deletions(-)
diff --git a/app/Actions/Server/InstallDocker.php b/app/Actions/Server/InstallDocker.php
index 7c681e22c..122371cf6 100644
--- a/app/Actions/Server/InstallDocker.php
+++ b/app/Actions/Server/InstallDocker.php
@@ -20,10 +20,10 @@ class InstallDocker
throw new \Exception('Server OS type is not supported for automated installation. Please install Docker manually before continuing: documentation.');
}
- if (! SslCertificate::where('server_id', $server->id)->exists()) {
+ if (! SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->exists()) {
$serverCert = SslHelper::generateSslCertificate(
commonName: 'Coolify CA Certificate',
- serverId: $server->id,
+ serverId: $server->server_id,
isCaCertificate: true,
validityDays: 15 * 365
);
@@ -33,6 +33,7 @@ class InstallDocker
"mkdir -p $caCertPath",
"chown -R 9999:root $caCertPath",
"chmod -R 700 $caCertPath",
+ "rm -rf $caCertPath/coolify-ca.crt",
"echo '{$serverCert->ssl_certificate}' > $caCertPath/coolify-ca.crt",
"chmod 644 $caCertPath/coolify-ca.crt",
]);
diff --git a/app/Livewire/Server/Advanced.php b/app/Livewire/Server/Advanced.php
index 04d45620e..73a4391e6 100644
--- a/app/Livewire/Server/Advanced.php
+++ b/app/Livewire/Server/Advanced.php
@@ -49,10 +49,7 @@ class Advanced extends Component
public function loadCaCertificate()
{
- $this->caCertificate = SslCertificate::where('server_id', $this->server->id)
- ->where('resource_type', null)
- ->where('resource_id', null)
- ->first();
+ $this->caCertificate = SslCertificate::where('server_id', $this->server->server_id)->where('is_ca_certificate', true)->first();
if ($this->caCertificate) {
$this->certificateContent = $this->caCertificate->ssl_certificate;
@@ -129,7 +126,7 @@ class Advanced extends Component
"mkdir -p $caCertPath",
"chown -R 9999:root $caCertPath",
"chmod -R 700 $caCertPath",
- "rm -f $caCertPath/coolify-ca.crt",
+ "rm -rf $caCertPath/coolify-ca.crt",
"echo '{$this->certificateContent}' > $caCertPath/coolify-ca.crt",
"chmod 644 $caCertPath/coolify-ca.crt",
]);
diff --git a/database/seeders/CaSslCertSeeder.php b/database/seeders/CaSslCertSeeder.php
index e3672d053..4a9d59eb2 100644
--- a/database/seeders/CaSslCertSeeder.php
+++ b/database/seeders/CaSslCertSeeder.php
@@ -13,9 +13,9 @@ class CaSslCertSeeder extends Seeder
{
Server::chunk(200, function ($servers) {
foreach ($servers as $server) {
- $existingCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
+ $existingCaCert = SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->first();
- if (! $existingCert) {
+ if (! $existingCaCert) {
$caCert = SslHelper::generateSslCertificate(
commonName: 'Coolify CA Certificate',
serverId: $server->id,
@@ -23,7 +23,7 @@ class CaSslCertSeeder extends Seeder
validityDays: 15 * 365
);
} else {
- $caCert = $existingCert;
+ $caCert = $existingCaCert;
}
$caCertPath = config('constants.coolify.base_config_path').'/ssl/';
@@ -31,7 +31,7 @@ class CaSslCertSeeder extends Seeder
"mkdir -p $caCertPath",
"chown -R 9999:root $caCertPath",
"chmod -R 700 $caCertPath",
- "rm -f $caCertPath/coolify-ca.crt",
+ "rm -rf $caCertPath/coolify-ca.crt",
"echo '{$caCert->ssl_certificate}' > $caCertPath/coolify-ca.crt",
"chmod 644 $caCertPath/coolify-ca.crt",
]);
From 62fb2c2877b77fd0638a355fac9203a8755a005e Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 18:30:07 +0100
Subject: [PATCH 066/145] fix(ssl): ger caCert and `mountPath` correctly
---
app/Livewire/Project/Database/Mariadb/General.php | 11 ++++-------
app/Livewire/Project/Database/Mysql/General.php | 11 ++++-------
app/Livewire/Project/Database/Postgresql/General.php | 11 ++++-------
3 files changed, 12 insertions(+), 21 deletions(-)
diff --git a/app/Livewire/Project/Database/Mariadb/General.php b/app/Livewire/Project/Database/Mariadb/General.php
index 63bfd16cd..1eda804c9 100644
--- a/app/Livewire/Project/Database/Mariadb/General.php
+++ b/app/Livewire/Project/Database/Mariadb/General.php
@@ -169,10 +169,7 @@ class General extends Component
return;
}
- $caCertificate = SslCertificate::where('server_id', $this->server->id)
- ->where('resource_type', null)
- ->where('resource_id', null)
- ->first();
+ $caCert = SslCertificate::where('server_id', $existingCert->server_id)->where('is_ca_certificate', true)->first();
SslHelper::generateSslCertificate(
commonName: $existingCert->common_name,
@@ -180,10 +177,10 @@ class General extends Component
resourceType: $existingCert->resource_type,
resourceId: $existingCert->resource_id,
serverId: $existingCert->server_id,
- caCert: $caCertificate->ssl_certificate,
- caKey: $caCertificate->ssl_private_key,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
configurationDir: $existingCert->configuration_dir,
- mountPath: '/var/lib/mysql/certs',
+ mountPath: $existingCert->mount_path,
);
$this->dispatch('success', 'SSL certificates have been regenerated. Please restart the database for changes to take effect.');
diff --git a/app/Livewire/Project/Database/Mysql/General.php b/app/Livewire/Project/Database/Mysql/General.php
index d7d34c2e1..ad19db2a3 100644
--- a/app/Livewire/Project/Database/Mysql/General.php
+++ b/app/Livewire/Project/Database/Mysql/General.php
@@ -169,10 +169,7 @@ class General extends Component
return;
}
- $caCertificate = SslCertificate::where('server_id', $this->server->id)
- ->where('resource_type', null)
- ->where('resource_id', null)
- ->first();
+ $caCert = SslCertificate::where('server_id', $existingCert->server_id)->where('is_ca_certificate', true)->first();
SslHelper::generateSslCertificate(
commonName: $existingCert->common_name,
@@ -180,10 +177,10 @@ class General extends Component
resourceType: $existingCert->resource_type,
resourceId: $existingCert->resource_id,
serverId: $existingCert->server_id,
- caCert: $caCertificate->ssl_certificate,
- caKey: $caCertificate->ssl_private_key,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
configurationDir: $existingCert->configuration_dir,
- mountPath: '/var/lib/mysql/certs',
+ mountPath: $existingCert->mount_path,
);
$this->dispatch('success', 'SSL certificates have been regenerated. Please restart the database for changes to take effect.');
diff --git a/app/Livewire/Project/Database/Postgresql/General.php b/app/Livewire/Project/Database/Postgresql/General.php
index 534b66a6d..f5ea25865 100644
--- a/app/Livewire/Project/Database/Postgresql/General.php
+++ b/app/Livewire/Project/Database/Postgresql/General.php
@@ -133,10 +133,7 @@ class General extends Component
return;
}
- $caCertificate = SslCertificate::where('server_id', $this->server->id)
- ->where('resource_type', null)
- ->where('resource_id', null)
- ->first();
+ $caCert = SslCertificate::where('server_id', $existingCert->server_id)->where('is_ca_certificate', true)->first();
SslHelper::generateSslCertificate(
commonName: $existingCert->common_name,
@@ -144,10 +141,10 @@ class General extends Component
resourceType: $existingCert->resource_type,
resourceId: $existingCert->resource_id,
serverId: $existingCert->server_id,
- caCert: $caCertificate->ssl_certificate,
- caKey: $caCertificate->ssl_private_key,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
configurationDir: $existingCert->configuration_dir,
- mountPath: '/var/lib/postgresql/certs',
+ mountPath: $existingCert->mount_path,
);
$this->dispatch('success', 'SSL certificates have been regenerated. Please restart the database for changes to take effect.');
From 8a45c24dc246fa375848fdcdb6c05b34d6d60d3e Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 18:30:44 +0100
Subject: [PATCH 067/145] fix(ui): only show Regenerate SSL Certificates button
when there is a cert
---
.../views/livewire/project/database/mysql/general.blade.php | 2 +-
.../livewire/project/database/postgresql/general.blade.php | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/resources/views/livewire/project/database/mysql/general.blade.php b/resources/views/livewire/project/database/mysql/general.blade.php
index 8da378399..7bef88441 100644
--- a/resources/views/livewire/project/database/mysql/general.blade.php
+++ b/resources/views/livewire/project/database/mysql/general.blade.php
@@ -70,7 +70,7 @@
SSL Configuration
- @if($database->enable_ssl)
+ @if($database->enable_ssl && $certificateValidUntil)
SSL Configuration
- @if($database->enable_ssl)
+ @if($database->enable_ssl && $certificateValidUntil)
Date: Fri, 7 Feb 2025 18:31:41 +0100
Subject: [PATCH 068/145] feat(ssl): new modes for MongoDB and get `caCert` and
`mountPath` correctly
---
app/Livewire/Project/Database/Mongodb/General.php | 13 +++++--------
.../project/database/mongodb/general.blade.php | 10 +++++-----
2 files changed, 10 insertions(+), 13 deletions(-)
diff --git a/app/Livewire/Project/Database/Mongodb/General.php b/app/Livewire/Project/Database/Mongodb/General.php
index 911b74f55..08d45a4ee 100644
--- a/app/Livewire/Project/Database/Mongodb/General.php
+++ b/app/Livewire/Project/Database/Mongodb/General.php
@@ -39,7 +39,7 @@ class General extends Component
'database.is_log_drain_enabled' => 'nullable|boolean',
'database.custom_docker_run_options' => 'nullable',
'database.enable_ssl' => 'boolean',
- 'database.ssl_mode' => 'nullable|string|in:allowSSL,preferSSL,requireSSL,verifyCA,verifyFull',
+ 'database.ssl_mode' => 'nullable|string|in:allow,prefer,require,verify-ca,verify-full',
];
protected $validationAttributes = [
@@ -170,10 +170,7 @@ class General extends Component
return;
}
- $caCertificate = SslCertificate::where('server_id', $this->server->id)
- ->where('resource_type', null)
- ->where('resource_id', null)
- ->first();
+ $caCert = SslCertificate::where('server_id', $existingCert->server_id)->where('is_ca_certificate', true)->first();
SslHelper::generateSslCertificate(
commonName: $existingCert->common_name,
@@ -181,10 +178,10 @@ class General extends Component
resourceType: $existingCert->resource_type,
resourceId: $existingCert->resource_id,
serverId: $existingCert->server_id,
- caCert: $caCertificate->ssl_certificate,
- caKey: $caCertificate->ssl_private_key,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
configurationDir: $existingCert->configuration_dir,
- mountPath: '/etc/mongo/certs',
+ mountPath: $existingCert->mount_path,
);
$this->dispatch('success', 'SSL certificates have been regenerated. Please restart the database for changes to take effect.');
diff --git a/resources/views/livewire/project/database/mongodb/general.blade.php b/resources/views/livewire/project/database/mongodb/general.blade.php
index b64884525..c2dcea140 100644
--- a/resources/views/livewire/project/database/mongodb/general.blade.php
+++ b/resources/views/livewire/project/database/mongodb/general.blade.php
@@ -92,11 +92,11 @@
-
-
-
-
-
+
+
+
+
+
@endif
From a539bfd765ef0aa6c97919aa47df314659c9c377 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 18:45:12 +0100
Subject: [PATCH 069/145] fix(ssl): server id
---
app/Actions/Database/StartMariadb.php | 2 +-
app/Actions/Database/StartMysql.php | 2 +-
app/Actions/Database/StartPostgresql.php | 2 +-
app/Actions/Server/InstallDocker.php | 4 ++--
app/Livewire/Server/Advanced.php | 2 +-
database/seeders/CaSslCertSeeder.php | 2 +-
6 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/app/Actions/Database/StartMariadb.php b/app/Actions/Database/StartMariadb.php
index 50fd1ab00..b10ae3fde 100644
--- a/app/Actions/Database/StartMariadb.php
+++ b/app/Actions/Database/StartMariadb.php
@@ -59,7 +59,7 @@ class StartMariadb
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
$server = $this->database->destination->server;
- $caCert = SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->first();
+ $caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
$this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
diff --git a/app/Actions/Database/StartMysql.php b/app/Actions/Database/StartMysql.php
index bec1c7fb1..bda01dc1d 100644
--- a/app/Actions/Database/StartMysql.php
+++ b/app/Actions/Database/StartMysql.php
@@ -59,7 +59,7 @@ class StartMysql
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
$server = $this->database->destination->server;
- $caCert = SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->first();
+ $caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
$this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
diff --git a/app/Actions/Database/StartPostgresql.php b/app/Actions/Database/StartPostgresql.php
index 75f43a5ee..8f4bcb0d9 100644
--- a/app/Actions/Database/StartPostgresql.php
+++ b/app/Actions/Database/StartPostgresql.php
@@ -64,7 +64,7 @@ class StartPostgresql
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
$server = $this->database->destination->server;
- $caCert = SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->first();
+ $caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
$this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
diff --git a/app/Actions/Server/InstallDocker.php b/app/Actions/Server/InstallDocker.php
index 122371cf6..bbb3ea066 100644
--- a/app/Actions/Server/InstallDocker.php
+++ b/app/Actions/Server/InstallDocker.php
@@ -20,10 +20,10 @@ class InstallDocker
throw new \Exception('Server OS type is not supported for automated installation. Please install Docker manually before continuing: documentation.');
}
- if (! SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->exists()) {
+ if (! SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->exists()) {
$serverCert = SslHelper::generateSslCertificate(
commonName: 'Coolify CA Certificate',
- serverId: $server->server_id,
+ serverId: $server->id,
isCaCertificate: true,
validityDays: 15 * 365
);
diff --git a/app/Livewire/Server/Advanced.php b/app/Livewire/Server/Advanced.php
index 73a4391e6..497ec697e 100644
--- a/app/Livewire/Server/Advanced.php
+++ b/app/Livewire/Server/Advanced.php
@@ -49,7 +49,7 @@ class Advanced extends Component
public function loadCaCertificate()
{
- $this->caCertificate = SslCertificate::where('server_id', $this->server->server_id)->where('is_ca_certificate', true)->first();
+ $this->caCertificate = SslCertificate::where('server_id', $this->server->id)->where('is_ca_certificate', true)->first();
if ($this->caCertificate) {
$this->certificateContent = $this->caCertificate->ssl_certificate;
diff --git a/database/seeders/CaSslCertSeeder.php b/database/seeders/CaSslCertSeeder.php
index 4a9d59eb2..b869ff96a 100644
--- a/database/seeders/CaSslCertSeeder.php
+++ b/database/seeders/CaSslCertSeeder.php
@@ -13,7 +13,7 @@ class CaSslCertSeeder extends Seeder
{
Server::chunk(200, function ($servers) {
foreach ($servers as $server) {
- $existingCaCert = SslCertificate::where('server_id', $server->server_id)->where('is_ca_certificate', true)->first();
+ $existingCaCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
if (! $existingCaCert) {
$caCert = SslHelper::generateSslCertificate(
From cd637607704ca3a72ca37c7291b78fac818fc9a6 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 19:36:52 +0100
Subject: [PATCH 070/145] fix(ssl): when regenerating SSL certs the cert is not
singed with the new CN
---
app/Models/SslCertificate.php | 1 +
1 file changed, 1 insertion(+)
diff --git a/app/Models/SslCertificate.php b/app/Models/SslCertificate.php
index cf9395a5d..eb2175d44 100644
--- a/app/Models/SslCertificate.php
+++ b/app/Models/SslCertificate.php
@@ -10,6 +10,7 @@ class SslCertificate extends Model
'ssl_certificate',
'ssl_private_key',
'configuration_dir',
+ 'mount_path',
'resource_type',
'resource_id',
'server_id',
From c1e7a5721e9481155af0f267bb25b17a6f0ed9d3 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 20:09:11 +0100
Subject: [PATCH 071/145] fix(ssl): adjust ca paths for MySQL
---
app/Actions/Database/StartMysql.php | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/app/Actions/Database/StartMysql.php b/app/Actions/Database/StartMysql.php
index bda01dc1d..2a9e37f9c 100644
--- a/app/Actions/Database/StartMysql.php
+++ b/app/Actions/Database/StartMysql.php
@@ -159,7 +159,7 @@ class StartMysql
[
'type' => 'bind',
'source' => '/data/coolify/ssl/coolify-ca.crt',
- 'target' => '/etc/mysql/certs/ca.crt',
+ 'target' => '/etc/mysql/certs/coolify-ca.crt',
'read_only' => true,
],
]
@@ -189,7 +189,7 @@ class StartMysql
'mysqld',
'--ssl-cert=/etc/mysql/certs/server.crt',
'--ssl-key=/etc/mysql/certs/server.key',
- '--ssl-ca=/etc/mysql/certs/ca.crt',
+ '--ssl-ca=/etc/mysql/certs/coolify-ca.crt',
'--require-secure-transport=1',
];
}
From 5b347f3d0fce9459b96d3062f0dca566f93deb74 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 21:07:40 +0100
Subject: [PATCH 072/145] fix(ssl): remove mode selection for MariaDB as it is
not supported
---
.../Project/Database/Mariadb/General.php | 3 ---
app/Models/StandaloneMariadb.php | 22 ++-----------------
.../database/mariadb/general.blade.php | 9 --------
3 files changed, 2 insertions(+), 32 deletions(-)
diff --git a/app/Livewire/Project/Database/Mariadb/General.php b/app/Livewire/Project/Database/Mariadb/General.php
index 1eda804c9..a963e0ca3 100644
--- a/app/Livewire/Project/Database/Mariadb/General.php
+++ b/app/Livewire/Project/Database/Mariadb/General.php
@@ -40,7 +40,6 @@ class General extends Component
'database.is_log_drain_enabled' => 'nullable|boolean',
'database.custom_docker_run_options' => 'nullable',
'database.enable_ssl' => 'boolean',
- 'database.ssl_mode' => 'nullable|string|in:PREFERRED,REQUIRED,VERIFY_CA,VERIFY_IDENTITY',
];
protected $validationAttributes = [
@@ -57,7 +56,6 @@ class General extends Component
'database.public_port' => 'Public Port',
'database.custom_docker_run_options' => 'Custom Docker Options',
'database.enable_ssl' => 'Enable SSL',
- 'database.ssl_mode' => 'SSL Mode',
];
public function mount()
@@ -147,7 +145,6 @@ class General extends Component
{
try {
$this->database->enable_ssl = $this->database->enable_ssl;
- $this->database->ssl_mode = $this->database->ssl_mode;
$this->database->save();
$this->dispatch('success', 'SSL configuration updated.');
} catch (Exception $e) {
diff --git a/app/Models/StandaloneMariadb.php b/app/Models/StandaloneMariadb.php
index 24f011f12..523fde3c5 100644
--- a/app/Models/StandaloneMariadb.php
+++ b/app/Models/StandaloneMariadb.php
@@ -218,17 +218,7 @@ class StandaloneMariadb extends BaseModel
protected function internalDbUrl(): Attribute
{
return new Attribute(
- get: function () {
- $url = "mysql://{$this->mariadb_user}:{$this->mariadb_password}@{$this->uuid}:3306/{$this->mariadb_database}";
- if ($this->enable_ssl) {
- $url .= "?ssl-mode={$this->ssl_mode}";
- if (in_array($this->ssl_mode, ['VERIFY_CA', 'VERIFY_IDENTITY'])) {
- $url .= '&ssl-ca=/etc/ssl/certs/coolify-ca.crt';
- }
- }
-
- return $url;
- },
+ get: fn () => "mysql://{$this->mariadb_user}:{$this->mariadb_password}@{$this->uuid}:3306/{$this->mariadb_database}",
);
}
@@ -237,15 +227,7 @@ class StandaloneMariadb extends BaseModel
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
- $url = "mysql://{$this->mariadb_user}:{$this->mariadb_password}@{$this->destination->server->getIp}:{$this->public_port}/{$this->mariadb_database}";
- if ($this->enable_ssl) {
- $url .= "?ssl-mode={$this->ssl_mode}";
- if (in_array($this->ssl_mode, ['VERIFY_CA', 'VERIFY_IDENTITY'])) {
- $url .= '&ssl-ca=/etc/ssl/certs/coolify-ca.crt';
- }
- }
-
- return $url;
+ return "mysql://{$this->mariadb_user}:{$this->mariadb_password}@{$this->destination->server->getIp}:{$this->public_port}/{$this->mariadb_database}";
}
return null;
diff --git a/resources/views/livewire/project/database/mariadb/general.blade.php b/resources/views/livewire/project/database/mariadb/general.blade.php
index 673868667..96ba3a06a 100644
--- a/resources/views/livewire/project/database/mariadb/general.blade.php
+++ b/resources/views/livewire/project/database/mariadb/general.blade.php
@@ -97,15 +97,6 @@
- @if($database->enable_ssl)
-
-
-
-
-
-
- @endif
From aad717d22fe50be9e6ffe1c954778f58d0c38ca2 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 21:08:14 +0100
Subject: [PATCH 073/145] fix(ssl): permission issue with MariDB cert and key
and paths
---
app/Actions/Database/StartMariadb.php | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/app/Actions/Database/StartMariadb.php b/app/Actions/Database/StartMariadb.php
index b10ae3fde..87185d064 100644
--- a/app/Actions/Database/StartMariadb.php
+++ b/app/Actions/Database/StartMariadb.php
@@ -159,7 +159,7 @@ class StartMariadb
[
'type' => 'bind',
'source' => '/data/coolify/ssl/coolify-ca.crt',
- 'target' => '/etc/mysql/certs/ca.crt',
+ 'target' => '/etc/mysql/certs/coolify-ca.crt',
'read_only' => true,
],
]
@@ -188,7 +188,7 @@ class StartMariadb
'mysqld',
'--ssl-cert=/etc/mysql/certs/server.crt',
'--ssl-key=/etc/mysql/certs/server.key',
- '--ssl-ca=/etc/mysql/certs/ca.crt',
+ '--ssl-ca=/etc/mysql/certs/coolify-ca.crt',
'--require-secure-transport=1',
];
}
@@ -203,7 +203,7 @@ class StartMariadb
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml up -d";
$this->commands[] = "echo 'Database started.'";
if ($this->database->enable_ssl) {
- $this->commands[] = executeInDocker($this->database->uuid, "chown {$this->database->mariadb_user}:{$this->database->mariadb_user} /etc/mysql/certs/server.crt /etc/mysql/certs/server.key");
+ $this->commands[] = executeInDocker($this->database->uuid, 'chown mysql:mysql /etc/mysql/certs/server.crt /etc/mysql/certs/server.key');
}
return remote_process($this->commands, $database->destination->server, callEventOnFinish: 'DatabaseStatusChanged');
From 7b30b1aff1863fb90fcf5d901d66529f3abdf577 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Fri, 7 Feb 2025 22:36:36 +0100
Subject: [PATCH 074/145] feat(ssl): Full SSL support for Redis
---
app/Actions/Database/StartRedis.php | 133 ++++++++++++++++--
.../Project/Database/Redis/General.php | 61 ++++++++
app/Models/StandaloneRedis.php | 17 ++-
.../project/database/redis/general.blade.php | 41 ++++++
4 files changed, 241 insertions(+), 11 deletions(-)
diff --git a/app/Actions/Database/StartRedis.php b/app/Actions/Database/StartRedis.php
index 1beebd134..11534e87d 100644
--- a/app/Actions/Database/StartRedis.php
+++ b/app/Actions/Database/StartRedis.php
@@ -2,6 +2,8 @@
namespace App\Actions\Database;
+use App\Helpers\SslHelper;
+use App\Models\SslCertificate;
use App\Models\StandaloneRedis;
use Illuminate\Support\Facades\Storage;
use Lorisleiva\Actions\Concerns\AsAction;
@@ -17,6 +19,8 @@ class StartRedis
public string $configuration_dir;
+ private ?SslCertificate $ssl_certificate = null;
+
public function handle(StandaloneRedis $database)
{
$this->database = $database;
@@ -26,9 +30,53 @@ class StartRedis
$this->commands = [
"echo 'Starting database.'",
+ "echo 'Creating directories.'",
"mkdir -p $this->configuration_dir",
+ "echo 'Directories created successfully.'",
];
+ if (! $this->database->enable_ssl) {
+ $this->commands[] = "rm -rf $this->configuration_dir/ssl";
+ SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->delete();
+ $this->database->fileStorages()
+ ->where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->get()
+ ->filter(function ($storage) {
+ return in_array($storage->mount_path, [
+ '/etc/redis/certs/server.crt',
+ '/etc/redis/certs/server.key',
+ ]);
+ })
+ ->each(function ($storage) {
+ $storage->delete();
+ });
+ } else {
+ $this->commands[] = "echo 'Setting up SSL for this database.'";
+ $this->commands[] = "mkdir -p $this->configuration_dir/ssl";
+
+ $server = $this->database->destination->server;
+ $caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
+
+ $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
+
+ if (! $this->ssl_certificate) {
+ $this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
+ $this->ssl_certificate = SslHelper::generateSslCertificate(
+ commonName: $this->database->uuid,
+ resourceType: $this->database->getMorphClass(),
+ resourceId: $this->database->id,
+ serverId: $server->id,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
+ configurationDir: $this->configuration_dir,
+ mountPath: '/etc/redis/certs',
+ );
+ }
+ }
+
$persistent_storages = $this->generate_local_persistent_volumes();
$persistent_file_volumes = $this->database->fileStorages()->get();
$volume_names = $this->generate_local_persistent_volumes_only_volume_names();
@@ -50,11 +98,22 @@ class StartRedis
],
'labels' => defaultDatabaseLabels($this->database)->toArray(),
'healthcheck' => [
- 'test' => [
- 'CMD-SHELL',
- 'redis-cli',
- 'ping',
- ],
+ 'test' => $this->database->enable_ssl
+ ? [
+ 'CMD-SHELL',
+ 'redis-cli',
+ '--tls',
+ '--cacert /etc/redis/certs/coolify-ca.crt',
+ '--cert /etc/redis/certs/server.crt',
+ '--key /etc/redis/certs/server.key',
+ '-p 6380',
+ 'ping',
+ ]
+ : [
+ 'CMD-SHELL',
+ 'redis-cli',
+ 'ping',
+ ],
'interval' => '5s',
'timeout' => '5s',
'retries' => 10,
@@ -76,26 +135,55 @@ class StartRedis
],
],
];
+
if (! is_null($this->database->limits_cpuset)) {
data_set($docker_compose, "services.{$container_name}.cpuset", $this->database->limits_cpuset);
}
+
if ($this->database->destination->server->isLogDrainEnabled() && $this->database->isLogDrainEnabled()) {
$docker_compose['services'][$container_name]['logging'] = generate_fluentd_configuration();
}
+
if (count($this->database->ports_mappings_array) > 0) {
$docker_compose['services'][$container_name]['ports'] = $this->database->ports_mappings_array;
}
+
+ $docker_compose['services'][$container_name]['volumes'] ??= [];
+
if (count($persistent_storages) > 0) {
- $docker_compose['services'][$container_name]['volumes'] = $persistent_storages;
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'],
+ $persistent_storages
+ );
}
+
if (count($persistent_file_volumes) > 0) {
- $docker_compose['services'][$container_name]['volumes'] = $persistent_file_volumes->map(function ($item) {
- return "$item->fs_path:$item->mount_path";
- })->toArray();
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'],
+ $persistent_file_volumes->map(function ($item) {
+ return "$item->fs_path:$item->mount_path";
+ })->toArray()
+ );
}
+
if (count($volume_names) > 0) {
$docker_compose['volumes'] = $volume_names;
}
+
+ if ($this->database->enable_ssl) {
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ [
+ [
+ 'type' => 'bind',
+ 'source' => '/data/coolify/ssl/coolify-ca.crt',
+ 'target' => '/etc/redis/certs/coolify-ca.crt',
+ 'read_only' => true,
+ ],
+ ]
+ );
+ }
+
if (! is_null($this->database->redis_conf) || ! empty($this->database->redis_conf)) {
$docker_compose['services'][$container_name]['volumes'][] = [
'type' => 'bind',
@@ -116,6 +204,9 @@ class StartRedis
$this->commands[] = "echo '{$readme}' > $this->configuration_dir/README.md";
$this->commands[] = "echo 'Pulling {$database->image} image.'";
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml pull";
+ if ($this->database->enable_ssl) {
+ $this->commands[] = "chown -R 999:999 $this->configuration_dir/ssl/server.key $this->configuration_dir/ssl/server.crt";
+ }
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml up -d";
$this->commands[] = "echo 'Database started.'";
@@ -202,6 +293,30 @@ class StartRedis
$command = "redis-server --requirepass {$this->database->redis_password} --appendonly yes";
}
+ if ($this->database->enable_ssl) {
+ $sslArgs = match ($this->database->ssl_mode) {
+ 'require' => [
+ '--tls-port 6380',
+ '--tls-cert-file /etc/redis/certs/server.crt',
+ '--tls-key-file /etc/redis/certs/server.key',
+ '--tls-ca-cert-file /etc/redis/certs/coolify-ca.crt',
+ '--tls-auth-clients no',
+ ],
+ 'verify-full' => [
+ '--tls-port 6380',
+ '--tls-cert-file /etc/redis/certs/server.crt',
+ '--tls-key-file /etc/redis/certs/server.key',
+ '--tls-ca-cert-file /etc/redis/certs/coolify-ca.crt',
+ '--tls-auth-clients yes',
+ ],
+ default => []
+ };
+ }
+
+ if (! empty($sslArgs)) {
+ $command .= ' '.implode(' ', $sslArgs);
+ }
+
return $command;
}
diff --git a/app/Livewire/Project/Database/Redis/General.php b/app/Livewire/Project/Database/Redis/General.php
index 05babeaec..32ba0a9ad 100644
--- a/app/Livewire/Project/Database/Redis/General.php
+++ b/app/Livewire/Project/Database/Redis/General.php
@@ -4,7 +4,9 @@ namespace App\Livewire\Project\Database\Redis;
use App\Actions\Database\StartDatabaseProxy;
use App\Actions\Database\StopDatabaseProxy;
+use App\Helpers\SslHelper;
use App\Models\Server;
+use App\Models\SslCertificate;
use App\Models\StandaloneRedis;
use Exception;
use Livewire\Component;
@@ -30,6 +32,8 @@ class General extends Component
public ?string $db_url_public = null;
+ public $certificateValidUntil = null;
+
protected $rules = [
'database.name' => 'required',
'database.description' => 'nullable',
@@ -42,6 +46,8 @@ class General extends Component
'database.custom_docker_run_options' => 'nullable',
'redis_username' => 'required',
'redis_password' => 'required',
+ 'database.enable_ssl' => 'boolean',
+ 'database.ssl_mode' => 'nullable|string|in:require,verify-full',
];
protected $validationAttributes = [
@@ -55,12 +61,21 @@ class General extends Component
'database.custom_docker_run_options' => 'Custom Docker Options',
'redis_username' => 'Redis Username',
'redis_password' => 'Redis Password',
+ 'database.enable_ssl' => 'Enable SSL',
+ 'database.ssl_mode' => 'SSL Mode',
];
public function mount()
{
$this->server = data_get($this->database, 'destination.server');
$this->refreshView();
+ $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->first();
+
+ if ($existingCert) {
+ $this->certificateValidUntil = $existingCert->valid_until;
+ }
}
public function instantSaveAdvanced()
@@ -136,6 +151,52 @@ class General extends Component
}
}
+ public function instantSaveSSL()
+ {
+ try {
+ $this->database->enable_ssl = $this->database->enable_ssl;
+ $this->database->ssl_mode = $this->database->ssl_mode;
+ $this->database->save();
+ $this->dispatch('success', 'SSL configuration updated.');
+ } catch (Exception $e) {
+ return handleError($e, $this);
+ }
+ }
+
+ public function regenerateSslCertificate()
+ {
+ try {
+ $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->where('server_id', $this->server->id)
+ ->first();
+
+ if (! $existingCert) {
+ $this->dispatch('error', 'No existing SSL certificate found for this database.');
+
+ return;
+ }
+
+ $caCert = SslCertificate::where('server_id', $existingCert->server_id)->where('is_ca_certificate', true)->first();
+
+ SslHelper::generateSslCertificate(
+ commonName: $existingCert->commonName,
+ subjectAlternativeNames: $existingCert->subjectAlternativeNames ?? [],
+ resourceType: $existingCert->resource_type,
+ resourceId: $existingCert->resource_id,
+ serverId: $existingCert->server_id,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
+ configurationDir: $existingCert->configuration_dir,
+ mountPath: $existingCert->mount_path,
+ );
+
+ $this->dispatch('success', 'SSL certificates regenerated. Restart database to apply changes.');
+ } catch (Exception $e) {
+ handleError($e, $this);
+ }
+ }
+
public function refresh(): void
{
$this->database->refresh();
diff --git a/app/Models/StandaloneRedis.php b/app/Models/StandaloneRedis.php
index ebb0fbe30..b7835b4c9 100644
--- a/app/Models/StandaloneRedis.php
+++ b/app/Models/StandaloneRedis.php
@@ -222,8 +222,15 @@ class StandaloneRedis extends BaseModel
get: function () {
$redis_version = $this->getRedisVersion();
$username_part = version_compare($redis_version, '6.0', '>=') ? "{$this->redis_username}:" : '';
+ $scheme = $this->enable_ssl ? 'rediss' : 'redis';
+ $port = $this->enable_ssl ? 6380 : 6379;
+ $url = "{$scheme}://{$username_part}{$this->redis_password}@{$this->uuid}:{$port}/0";
- return "redis://{$username_part}{$this->redis_password}@{$this->uuid}:6379/0";
+ if ($this->enable_ssl && $this->ssl_mode === 'verify-full') {
+ $url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
+ }
+
+ return $url;
}
);
}
@@ -235,8 +242,14 @@ class StandaloneRedis extends BaseModel
if ($this->is_public && $this->public_port) {
$redis_version = $this->getRedisVersion();
$username_part = version_compare($redis_version, '6.0', '>=') ? "{$this->redis_username}:" : '';
+ $scheme = $this->enable_ssl ? 'rediss' : 'redis';
+ $url = "{$scheme}://{$username_part}{$this->redis_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
- return "redis://{$username_part}{$this->redis_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
+ if ($this->enable_ssl && $this->ssl_mode === 'verify-full') {
+ $url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
+ }
+
+ return $url;
}
return null;
diff --git a/resources/views/livewire/project/database/redis/general.blade.php b/resources/views/livewire/project/database/redis/general.blade.php
index a274fa62e..eb9d7af23 100644
--- a/resources/views/livewire/project/database/redis/general.blade.php
+++ b/resources/views/livewire/project/database/redis/general.blade.php
@@ -49,6 +49,47 @@
type="password" readonly wire:model="db_url_public" />
@endif
+
+
+
+
SSL Configuration
+ @if($database->enable_ssl && $certificateValidUntil)
+
+ @endif
+
+
+ @if($database->enable_ssl && $certificateValidUntil)
+
Valid until:
+ @if(now()->gt($certificateValidUntil))
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }} - Expired
+ @elseif(now()->addDays(30)->gt($certificateValidUntil))
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }} - Expiring soon
+ @else
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }}
+ @endif
+
+ @endif
+
+
+ @if($database->enable_ssl)
+
+
+
+
+ @endif
+
+
From 484fc5140b4ef4924d8941036969e5faea60eced Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Sat, 8 Feb 2025 16:43:15 +0100
Subject: [PATCH 075/145] fix(ssl): rename Redis mode to verify-ca as it is not
verify-full
---
app/Actions/Database/StartRedis.php | 2 +-
app/Livewire/Project/Database/Redis/General.php | 2 +-
app/Models/StandaloneRedis.php | 4 ++--
.../views/livewire/project/database/redis/general.blade.php | 2 +-
4 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/app/Actions/Database/StartRedis.php b/app/Actions/Database/StartRedis.php
index 11534e87d..fee80be2b 100644
--- a/app/Actions/Database/StartRedis.php
+++ b/app/Actions/Database/StartRedis.php
@@ -302,7 +302,7 @@ class StartRedis
'--tls-ca-cert-file /etc/redis/certs/coolify-ca.crt',
'--tls-auth-clients no',
],
- 'verify-full' => [
+ 'verify-ca' => [
'--tls-port 6380',
'--tls-cert-file /etc/redis/certs/server.crt',
'--tls-key-file /etc/redis/certs/server.key',
diff --git a/app/Livewire/Project/Database/Redis/General.php b/app/Livewire/Project/Database/Redis/General.php
index 32ba0a9ad..71fbd5887 100644
--- a/app/Livewire/Project/Database/Redis/General.php
+++ b/app/Livewire/Project/Database/Redis/General.php
@@ -47,7 +47,7 @@ class General extends Component
'redis_username' => 'required',
'redis_password' => 'required',
'database.enable_ssl' => 'boolean',
- 'database.ssl_mode' => 'nullable|string|in:require,verify-full',
+ 'database.ssl_mode' => 'nullable|string|in:require,verify-ca',
];
protected $validationAttributes = [
diff --git a/app/Models/StandaloneRedis.php b/app/Models/StandaloneRedis.php
index b7835b4c9..2b565aa4f 100644
--- a/app/Models/StandaloneRedis.php
+++ b/app/Models/StandaloneRedis.php
@@ -226,7 +226,7 @@ class StandaloneRedis extends BaseModel
$port = $this->enable_ssl ? 6380 : 6379;
$url = "{$scheme}://{$username_part}{$this->redis_password}@{$this->uuid}:{$port}/0";
- if ($this->enable_ssl && $this->ssl_mode === 'verify-full') {
+ if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
}
@@ -245,7 +245,7 @@ class StandaloneRedis extends BaseModel
$scheme = $this->enable_ssl ? 'rediss' : 'redis';
$url = "{$scheme}://{$username_part}{$this->redis_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
- if ($this->enable_ssl && $this->ssl_mode === 'verify-full') {
+ if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
}
diff --git a/resources/views/livewire/project/database/redis/general.blade.php b/resources/views/livewire/project/database/redis/general.blade.php
index eb9d7af23..28aa8dbba 100644
--- a/resources/views/livewire/project/database/redis/general.blade.php
+++ b/resources/views/livewire/project/database/redis/general.blade.php
@@ -85,7 +85,7 @@
-
+
@endif
From 5c12f7273ef392b8201726536fc6b9a72d688aa2 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Mon, 10 Feb 2025 15:18:29 +0100
Subject: [PATCH 076/145] feat: New mode implementation for MongoDB
---
app/Actions/Database/StartMongodb.php | 68 +++++++++++++++++----------
app/Models/StandaloneMongodb.php | 19 +++-----
2 files changed, 51 insertions(+), 36 deletions(-)
diff --git a/app/Actions/Database/StartMongodb.php b/app/Actions/Database/StartMongodb.php
index bf36d3802..250cb321d 100644
--- a/app/Actions/Database/StartMongodb.php
+++ b/app/Actions/Database/StartMongodb.php
@@ -52,8 +52,7 @@ class StartMongodb
->get()
->filter(function ($storage) {
return in_array($storage->mount_path, [
- '/etc/mongo/certs/server.crt',
- '/etc/mongo/certs/server.key',
+ '/etc/mongo/certs/server.pem',
]);
})
->each(function ($storage) {
@@ -62,12 +61,11 @@ class StartMongodb
} else {
$this->commands[] = "echo 'Setting up SSL for this database.'";
$this->commands[] = "mkdir -p $this->configuration_dir/ssl";
- $server = $this->database->destination->server;
- $caCert = SslCertificate::where('server_id', $server->id)->firstOrFail();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $server = $this->database->destination->server;
+ $caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
+
+ $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
@@ -80,6 +78,7 @@ class StartMongodb
caKey: $caCert->ssl_private_key,
configurationDir: $this->configuration_dir,
mountPath: '/etc/mongo/certs',
+ isPemKeyFileRequired: true,
);
}
}
@@ -188,6 +187,20 @@ class StartMongodb
]]
);
+ if ($this->database->enable_ssl) {
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ [
+ [
+ 'type' => 'bind',
+ 'source' => '/data/coolify/ssl/coolify-ca.crt',
+ 'target' => '/etc/mongo/certs/ca.pem',
+ 'read_only' => true,
+ ],
+ ]
+ );
+ }
+
// Add custom docker run options
$docker_run_options = convertDockerRunToCompose($this->database->custom_docker_run_options);
$docker_compose = generateCustomDockerRunOptionsForDatabases($docker_run_options, $docker_compose, $container_name, $this->database->destination->network);
@@ -195,28 +208,35 @@ class StartMongodb
if ($this->database->enable_ssl) {
$commandParts = ['mongod'];
- $commandParts[] = '--sslPEMKeyFile';
- $commandParts[] = '/etc/mongo/certs/server.pem';
- $commandParts[] = '--sslCAFile';
- $commandParts[] = '/etc/mongo/certs/ca.pem';
-
$sslConfig = match ($this->database->ssl_mode) {
- 'verifyCA' => [
- '--sslMode=requireSSL',
- '--tlsAllowInvalidCertificates=false',
+ 'allow' => [
+ '--tlsMode=allowTLS',
+ '--tlsAllowConnectionsWithoutCertificates',
+ '--tlsAllowInvalidHostnames',
],
- 'verifyFull' => [
- '--sslMode=requireSSL',
- '--tlsAllowInvalidCertificates=false',
- '--tlsAllowInvalidHostnames=false',
+ 'prefer' => [
+ '--tlsMode=preferTLS',
+ '--tlsAllowConnectionsWithoutCertificates',
+ '--tlsAllowInvalidHostnames',
],
- 'requireSSL' => ['--sslMode=requireSSL'],
- 'preferSSL' => ['--sslMode=preferSSL'],
- 'allowSSL' => ['--sslMode=allowSSL'],
- default => []
+ 'require' => [
+ '--tlsMode=requireTLS',
+ '--tlsAllowConnectionsWithoutCertificates',
+ '--tlsAllowInvalidHostnames',
+ ],
+ 'verify-full' => [
+ '--tlsMode=requireTLS',
+ '--tlsAllowInvalidHostnames',
+ ],
+ default => [],
};
$commandParts = [...$commandParts, ...$sslConfig];
+ $commandParts[] = '--tlsCAFile';
+ $commandParts[] = '/etc/mongo/certs/ca.pem';
+ $commandParts[] = '--tlsCertificateKeyFile';
+ $commandParts[] = '/etc/mongo/certs/server.pem';
+
$docker_compose['services'][$container_name]['command'] = $commandParts;
}
@@ -229,7 +249,7 @@ class StartMongodb
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml pull";
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml up -d";
if ($this->database->enable_ssl) {
- $this->commands[] = executeInDocker($this->database->uuid, "chown {$this->database->mongo_initdb_root_username}:{$this->database->mongo_initdb_root_username} /etc/mongo/certs/server.pem /etc/mongo/certs/ca.pem");
+ $this->commands[] = executeInDocker($this->database->uuid, 'chown mongodb:mongodb /etc/mongo/certs/server.pem');
}
$this->commands[] = "echo 'Database started.'";
diff --git a/app/Models/StandaloneMongodb.php b/app/Models/StandaloneMongodb.php
index 0b282eea1..0367b8650 100644
--- a/app/Models/StandaloneMongodb.php
+++ b/app/Models/StandaloneMongodb.php
@@ -246,13 +246,11 @@ class StandaloneMongodb extends BaseModel
get: function () {
$url = "mongodb://{$this->mongo_initdb_root_username}:{$this->mongo_initdb_root_password}@{$this->uuid}:27017/?directConnection=true";
if ($this->enable_ssl) {
- $url .= '&ssl=true';
- if (in_array($this->ssl_mode, ['verifyCA', 'verifyFull'])) {
- $url .= '&tlsAllowInvalidCertificates=false';
- }
- if ($this->ssl_mode === 'verifyFull') {
- $url .= '&tlsAllowInvalidHostnames=false';
+ $url .= '&tls=true';
+ if (in_array($this->ssl_mode, ['verify-full'])) {
+ $url .= '&tlsCAFile=/etc/ssl/certs/coolify-ca.crt';
}
+
}
return $url;
@@ -267,12 +265,9 @@ class StandaloneMongodb extends BaseModel
if ($this->is_public && $this->public_port) {
$url = "mongodb://{$this->mongo_initdb_root_username}:{$this->mongo_initdb_root_password}@{$this->destination->server->getIp}:{$this->public_port}/?directConnection=true";
if ($this->enable_ssl) {
- $url .= '&ssl=true';
- if (in_array($this->ssl_mode, ['verifyCA', 'verifyFull'])) {
- $url .= '&tlsAllowInvalidCertificates=false';
- }
- if ($this->ssl_mode === 'verifyFull') {
- $url .= '&tlsAllowInvalidHostnames=false';
+ $url .= '&tls=true';
+ if (in_array($this->ssl_mode, ['verify-full'])) {
+ $url .= '&tlsCAFile=/etc/ssl/certs/coolify-ca.crt';
}
}
From 6b6a9f57f34a903eba7ad2afef7fe894b51bdc2a Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Mon, 10 Feb 2025 15:26:05 +0100
Subject: [PATCH 077/145] fix(ui): remove unused mode for MongoDB
---
app/Livewire/Project/Database/Mongodb/General.php | 2 +-
.../views/livewire/project/database/mongodb/general.blade.php | 1 -
2 files changed, 1 insertion(+), 2 deletions(-)
diff --git a/app/Livewire/Project/Database/Mongodb/General.php b/app/Livewire/Project/Database/Mongodb/General.php
index 08d45a4ee..526aae9ea 100644
--- a/app/Livewire/Project/Database/Mongodb/General.php
+++ b/app/Livewire/Project/Database/Mongodb/General.php
@@ -39,7 +39,7 @@ class General extends Component
'database.is_log_drain_enabled' => 'nullable|boolean',
'database.custom_docker_run_options' => 'nullable',
'database.enable_ssl' => 'boolean',
- 'database.ssl_mode' => 'nullable|string|in:allow,prefer,require,verify-ca,verify-full',
+ 'database.ssl_mode' => 'nullable|string|in:allow,prefer,require,verify-full',
];
protected $validationAttributes = [
diff --git a/resources/views/livewire/project/database/mongodb/general.blade.php b/resources/views/livewire/project/database/mongodb/general.blade.php
index c2dcea140..b060bca54 100644
--- a/resources/views/livewire/project/database/mongodb/general.blade.php
+++ b/resources/views/livewire/project/database/mongodb/general.blade.php
@@ -95,7 +95,6 @@
-
@endif
From 792b1b889fb11cc7267af0399fbae5b0b67f69b8 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Mon, 10 Feb 2025 15:32:05 +0100
Subject: [PATCH 078/145] faet(migration): Add SSL fields to database tables
---
...2616_add_ssl_fields_to_database_tables.php | 70 +++++++++++++++++++
...d_ssl_fields_to_standalone_postgresqls.php | 30 --------
2 files changed, 70 insertions(+), 30 deletions(-)
create mode 100644 database/migrations/2025_01_27_102616_add_ssl_fields_to_database_tables.php
delete mode 100644 database/migrations/2025_01_27_102616_add_ssl_fields_to_standalone_postgresqls.php
diff --git a/database/migrations/2025_01_27_102616_add_ssl_fields_to_database_tables.php b/database/migrations/2025_01_27_102616_add_ssl_fields_to_database_tables.php
new file mode 100644
index 000000000..361e2fd32
--- /dev/null
+++ b/database/migrations/2025_01_27_102616_add_ssl_fields_to_database_tables.php
@@ -0,0 +1,70 @@
+boolean('enable_ssl')->default(true);
+ $table->enum('ssl_mode', ['allow', 'prefer', 'require', 'verify-ca', 'verify-full'])->default('require');
+ });
+ Schema::table('standalone_mysqls', function (Blueprint $table) {
+ $table->boolean('enable_ssl')->default(true);
+ $table->enum('ssl_mode', ['PREFERRED', 'REQUIRED', 'VERIFY_CA', 'VERIFY_IDENTITY'])->default('REQUIRED');
+ });
+ Schema::table('standalone_mariadbs', function (Blueprint $table) {
+ $table->boolean('enable_ssl')->default(true);
+ });
+ Schema::table('standalone_redis', function (Blueprint $table) {
+ $table->boolean('enable_ssl')->default(false);
+ });
+ Schema::table('standalone_keydbs', function (Blueprint $table) {
+ $table->boolean('enable_ssl')->default(false);
+ });
+ Schema::table('standalone_dragonflies', function (Blueprint $table) {
+ $table->boolean('enable_ssl')->default(false);
+ });
+ Schema::table('standalone_mongodbs', function (Blueprint $table) {
+ $table->boolean('enable_ssl')->default(true);
+ $table->enum('ssl_mode', ['allow', 'prefer', 'require', 'verify-full'])->default('require');
+ });
+ }
+
+ /**
+ * Reverse the migrations.
+ */
+ public function down()
+ {
+ Schema::table('standalone_postgresqls', function (Blueprint $table) {
+ $table->dropColumn('enable_ssl');
+ $table->dropColumn('ssl_mode');
+ });
+ Schema::table('standalone_mysqls', function (Blueprint $table) {
+ $table->dropColumn('enable_ssl');
+ $table->dropColumn('ssl_mode');
+ });
+ Schema::table('standalone_mariadbs', function (Blueprint $table) {
+ $table->dropColumn('enable_ssl');
+ });
+ Schema::table('standalone_redis', function (Blueprint $table) {
+ $table->dropColumn('enable_ssl');
+ });
+ Schema::table('standalone_keydbs', function (Blueprint $table) {
+ $table->dropColumn('enable_ssl');
+ });
+ Schema::table('standalone_dragonflies', function (Blueprint $table) {
+ $table->dropColumn('enable_ssl');
+ });
+ Schema::table('standalone_mongodbs', function (Blueprint $table) {
+ $table->dropColumn('enable_ssl');
+ $table->dropColumn('ssl_mode');
+ });
+ }
+};
diff --git a/database/migrations/2025_01_27_102616_add_ssl_fields_to_standalone_postgresqls.php b/database/migrations/2025_01_27_102616_add_ssl_fields_to_standalone_postgresqls.php
deleted file mode 100644
index 3b0ce8aa4..000000000
--- a/database/migrations/2025_01_27_102616_add_ssl_fields_to_standalone_postgresqls.php
+++ /dev/null
@@ -1,30 +0,0 @@
-boolean('enable_ssl')->default(true);
- $table->string('ssl_mode')->nullable()->default('require');
- });
- }
-
- /**
- * Reverse the migrations.
- */
- public function down()
- {
- Schema::table('standalone_postgresqls', function (Blueprint $table) {
- $table->dropColumn('enable_ssl');
- $table->dropColumn('ssl_mode');
- });
- }
-};
From 4547647e983e2186cca0af35202f0eb083e77c56 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Mon, 10 Feb 2025 19:23:39 +0100
Subject: [PATCH 079/145] feat(ssl): improve Redis and remove modes
---
app/Actions/Database/StartRedis.php | 45 +++++--------------
.../Project/Database/Redis/General.php | 3 --
.../project/database/redis/general.blade.php | 7 ---
3 files changed, 12 insertions(+), 43 deletions(-)
diff --git a/app/Actions/Database/StartRedis.php b/app/Actions/Database/StartRedis.php
index fee80be2b..edc7e0cce 100644
--- a/app/Actions/Database/StartRedis.php
+++ b/app/Actions/Database/StartRedis.php
@@ -98,22 +98,11 @@ class StartRedis
],
'labels' => defaultDatabaseLabels($this->database)->toArray(),
'healthcheck' => [
- 'test' => $this->database->enable_ssl
- ? [
- 'CMD-SHELL',
- 'redis-cli',
- '--tls',
- '--cacert /etc/redis/certs/coolify-ca.crt',
- '--cert /etc/redis/certs/server.crt',
- '--key /etc/redis/certs/server.key',
- '-p 6380',
- 'ping',
- ]
- : [
- 'CMD-SHELL',
- 'redis-cli',
- 'ping',
- ],
+ 'test' => [
+ 'CMD-SHELL',
+ 'redis-cli',
+ 'ping',
+ ],
'interval' => '5s',
'timeout' => '5s',
'retries' => 10,
@@ -294,23 +283,13 @@ class StartRedis
}
if ($this->database->enable_ssl) {
- $sslArgs = match ($this->database->ssl_mode) {
- 'require' => [
- '--tls-port 6380',
- '--tls-cert-file /etc/redis/certs/server.crt',
- '--tls-key-file /etc/redis/certs/server.key',
- '--tls-ca-cert-file /etc/redis/certs/coolify-ca.crt',
- '--tls-auth-clients no',
- ],
- 'verify-ca' => [
- '--tls-port 6380',
- '--tls-cert-file /etc/redis/certs/server.crt',
- '--tls-key-file /etc/redis/certs/server.key',
- '--tls-ca-cert-file /etc/redis/certs/coolify-ca.crt',
- '--tls-auth-clients yes',
- ],
- default => []
- };
+ $sslArgs = [
+ '--tls-port 6380',
+ '--tls-cert-file /etc/redis/certs/server.crt',
+ '--tls-key-file /etc/redis/certs/server.key',
+ '--tls-ca-cert-file /etc/redis/certs/coolify-ca.crt',
+ '--tls-auth-clients optional',
+ ];
}
if (! empty($sslArgs)) {
diff --git a/app/Livewire/Project/Database/Redis/General.php b/app/Livewire/Project/Database/Redis/General.php
index 71fbd5887..ea896e294 100644
--- a/app/Livewire/Project/Database/Redis/General.php
+++ b/app/Livewire/Project/Database/Redis/General.php
@@ -47,7 +47,6 @@ class General extends Component
'redis_username' => 'required',
'redis_password' => 'required',
'database.enable_ssl' => 'boolean',
- 'database.ssl_mode' => 'nullable|string|in:require,verify-ca',
];
protected $validationAttributes = [
@@ -62,7 +61,6 @@ class General extends Component
'redis_username' => 'Redis Username',
'redis_password' => 'Redis Password',
'database.enable_ssl' => 'Enable SSL',
- 'database.ssl_mode' => 'SSL Mode',
];
public function mount()
@@ -155,7 +153,6 @@ class General extends Component
{
try {
$this->database->enable_ssl = $this->database->enable_ssl;
- $this->database->ssl_mode = $this->database->ssl_mode;
$this->database->save();
$this->dispatch('success', 'SSL configuration updated.');
} catch (Exception $e) {
diff --git a/resources/views/livewire/project/database/redis/general.blade.php b/resources/views/livewire/project/database/redis/general.blade.php
index 28aa8dbba..a6cae8e38 100644
--- a/resources/views/livewire/project/database/redis/general.blade.php
+++ b/resources/views/livewire/project/database/redis/general.blade.php
@@ -81,13 +81,6 @@
@endif
- @if($database->enable_ssl)
-
-
-
-
- @endif
From 90e681e24b3d515731675405341cad65c83f0a78 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Mon, 10 Feb 2025 21:29:20 +0100
Subject: [PATCH 080/145] feat: Full SSL support for DrangonflyDB
---
app/Actions/Database/StartDragonfly.php | 111 +++++++++++++++++-
.../Project/Database/Dragonfly/General.php | 63 ++++++++++
app/Models/StandaloneDragonfly.php | 21 +++-
.../database/dragonfly/general.blade.php | 34 ++++++
4 files changed, 221 insertions(+), 8 deletions(-)
diff --git a/app/Actions/Database/StartDragonfly.php b/app/Actions/Database/StartDragonfly.php
index 4f9f45b7c..c9a2f173c 100644
--- a/app/Actions/Database/StartDragonfly.php
+++ b/app/Actions/Database/StartDragonfly.php
@@ -2,6 +2,8 @@
namespace App\Actions\Database;
+use App\Helpers\SslHelper;
+use App\Models\SslCertificate;
use App\Models\StandaloneDragonfly;
use Lorisleiva\Actions\Concerns\AsAction;
use Symfony\Component\Yaml\Yaml;
@@ -16,24 +18,74 @@ class StartDragonfly
public string $configuration_dir;
+ private ?SslCertificate $ssl_certificate = null;
+
public function handle(StandaloneDragonfly $database)
{
$this->database = $database;
- $startCommand = "dragonfly --requirepass {$this->database->dragonfly_password}";
-
$container_name = $this->database->uuid;
$this->configuration_dir = database_configuration_dir().'/'.$container_name;
$this->commands = [
"echo 'Starting database.'",
+ "echo 'Creating directories.'",
"mkdir -p $this->configuration_dir",
+ "echo 'Directories created successfully.'",
];
+ if (! $this->database->enable_ssl) {
+ $this->commands[] = "rm -rf $this->configuration_dir/ssl";
+ SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->delete();
+ $this->database->fileStorages()
+ ->where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->get()
+ ->filter(function ($storage) {
+ return in_array($storage->mount_path, [
+ '/etc/dragonfly/certs/server.crt',
+ '/etc/dragonfly/certs/server.key',
+ ]);
+ })
+ ->each(function ($storage) {
+ $storage->delete();
+ });
+ } else {
+ $this->commands[] = "echo 'Setting up SSL for this database.'";
+ $this->commands[] = "mkdir -p $this->configuration_dir/ssl";
+
+ $server = $this->database->destination->server;
+ $caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
+
+ $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->first();
+
+ if (! $this->ssl_certificate) {
+ $this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
+ $this->ssl_certificate = SslHelper::generateSslCertificate(
+ commonName: $this->database->uuid,
+ resourceType: $this->database->getMorphClass(),
+ resourceId: $this->database->id,
+ serverId: $server->id,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
+ configurationDir: $this->configuration_dir,
+ mountPath: '/etc/dragonfly/certs',
+ );
+ }
+ }
+
+ $container_name = $this->database->uuid;
+ $this->configuration_dir = database_configuration_dir().'/'.$container_name;
+
$persistent_storages = $this->generate_local_persistent_volumes();
$persistent_file_volumes = $this->database->fileStorages()->get();
$volume_names = $this->generate_local_persistent_volumes_only_volume_names();
$environment_variables = $this->generate_environment_variables();
+ $startCommand = $this->buildStartCommand();
$docker_compose = [
'services' => [
@@ -70,27 +122,55 @@ class StartDragonfly
],
],
];
+
if (! is_null($this->database->limits_cpuset)) {
data_set($docker_compose, "services.{$container_name}.cpuset", $this->database->limits_cpuset);
}
+
if ($this->database->destination->server->isLogDrainEnabled() && $this->database->isLogDrainEnabled()) {
$docker_compose['services'][$container_name]['logging'] = generate_fluentd_configuration();
}
+
if (count($this->database->ports_mappings_array) > 0) {
$docker_compose['services'][$container_name]['ports'] = $this->database->ports_mappings_array;
}
+
+ $docker_compose['services'][$container_name]['volumes'] ??= [];
+
if (count($persistent_storages) > 0) {
- $docker_compose['services'][$container_name]['volumes'] = $persistent_storages;
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'],
+ $persistent_storages
+ );
}
+
if (count($persistent_file_volumes) > 0) {
- $docker_compose['services'][$container_name]['volumes'] = $persistent_file_volumes->map(function ($item) {
- return "$item->fs_path:$item->mount_path";
- })->toArray();
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'],
+ $persistent_file_volumes->map(function ($item) {
+ return "$item->fs_path:$item->mount_path";
+ })->toArray()
+ );
}
+
if (count($volume_names) > 0) {
$docker_compose['volumes'] = $volume_names;
}
+ if ($this->database->enable_ssl) {
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ [
+ [
+ 'type' => 'bind',
+ 'source' => '/data/coolify/ssl/coolify-ca.crt',
+ 'target' => '/etc/dragonfly/certs/coolify-ca.crt',
+ 'read_only' => true,
+ ],
+ ]
+ );
+ }
+
// Add custom docker run options
$docker_run_options = convertDockerRunToCompose($this->database->custom_docker_run_options);
$docker_compose = generateCustomDockerRunOptionsForDatabases($docker_run_options, $docker_compose, $container_name, $this->database->destination->network);
@@ -102,12 +182,31 @@ class StartDragonfly
$this->commands[] = "echo '{$readme}' > $this->configuration_dir/README.md";
$this->commands[] = "echo 'Pulling {$database->image} image.'";
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml pull";
+ if ($this->database->enable_ssl) {
+ $this->commands[] = "chown -R 999:999 $this->configuration_dir/ssl/server.key $this->configuration_dir/ssl/server.crt";
+ }
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml up -d";
$this->commands[] = "echo 'Database started.'";
return remote_process($this->commands, $database->destination->server, callEventOnFinish: 'DatabaseStatusChanged');
}
+ private function buildStartCommand(): string
+ {
+ $command = "dragonfly --requirepass {$this->database->dragonfly_password}";
+
+ if ($this->database->enable_ssl) {
+ $sslArgs = [
+ '--tls_cert_file /etc/dragonfly/certs/server.crt',
+ '--tls_key_file /etc/dragonfly/certs/server.key',
+ '--tls_ca_cert_file /etc/dragonfly/certs/coolify-ca.crt',
+ ];
+ $command .= ' '.implode(' ', $sslArgs);
+ }
+
+ return $command;
+ }
+
private function generate_local_persistent_volumes()
{
$local_persistent_volumes = [];
diff --git a/app/Livewire/Project/Database/Dragonfly/General.php b/app/Livewire/Project/Database/Dragonfly/General.php
index ea6cd46b0..bd04e4d38 100644
--- a/app/Livewire/Project/Database/Dragonfly/General.php
+++ b/app/Livewire/Project/Database/Dragonfly/General.php
@@ -4,7 +4,9 @@ namespace App\Livewire\Project\Database\Dragonfly;
use App\Actions\Database\StartDatabaseProxy;
use App\Actions\Database\StopDatabaseProxy;
+use App\Helpers\SslHelper;
use App\Models\Server;
+use App\Models\SslCertificate;
use App\Models\StandaloneDragonfly;
use Exception;
use Illuminate\Support\Facades\Auth;
@@ -50,6 +52,11 @@ class General extends Component
#[Validate(['nullable', 'boolean'])]
public bool $isLogDrainEnabled = false;
+ public $certificateValidUntil = null;
+
+ #[Validate(['nullable', 'boolean'])]
+ public bool $enable_ssl = false;
+
public function getListeners()
{
$teamId = Auth::user()->currentTeam()->id;
@@ -64,6 +71,14 @@ class General extends Component
try {
$this->syncData();
$this->server = data_get($this->database, 'destination.server');
+
+ $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->first();
+
+ if ($existingCert) {
+ $this->certificateValidUntil = $existingCert->valid_until;
+ }
} catch (\Throwable $e) {
return handleError($e, $this);
}
@@ -82,6 +97,7 @@ class General extends Component
$this->database->public_port = $this->publicPort;
$this->database->custom_docker_run_options = $this->customDockerRunOptions;
$this->database->is_log_drain_enabled = $this->isLogDrainEnabled;
+ $this->database->enable_ssl = $this->enable_ssl;
$this->database->save();
$this->dbUrl = $this->database->internal_db_url;
@@ -96,6 +112,7 @@ class General extends Component
$this->publicPort = $this->database->public_port;
$this->customDockerRunOptions = $this->database->custom_docker_run_options;
$this->isLogDrainEnabled = $this->database->is_log_drain_enabled;
+ $this->enable_ssl = $this->database->enable_ssl;
$this->dbUrl = $this->database->internal_db_url;
$this->dbUrlPublic = $this->database->external_db_url;
}
@@ -174,4 +191,50 @@ class General extends Component
}
}
}
+
+ public function instantSaveSSL()
+ {
+ try {
+ $this->syncData(true);
+ $this->dispatch('success', 'SSL configuration updated.');
+ } catch (Exception $e) {
+ return handleError($e, $this);
+ }
+ }
+
+ public function regenerateSslCertificate()
+ {
+ try {
+ $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->where('server_id', $this->server->id)
+ ->first();
+
+ if (! $existingCert) {
+ $this->dispatch('error', 'No existing SSL certificate found for this database.');
+
+ return;
+ }
+
+ $caCert = SslCertificate::where('server_id', $existingCert->server_id)
+ ->where('is_ca_certificate', true)
+ ->first();
+
+ SslHelper::generateSslCertificate(
+ commonName: $existingCert->commonName,
+ subjectAlternativeNames: $existingCert->subjectAlternativeNames ?? [],
+ resourceType: $existingCert->resource_type,
+ resourceId: $existingCert->resource_id,
+ serverId: $existingCert->server_id,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
+ configurationDir: $existingCert->configuration_dir,
+ mountPath: $existingCert->mount_path,
+ );
+
+ $this->dispatch('success', 'SSL certificates regenerated. Restart database to apply changes.');
+ } catch (Exception $e) {
+ handleError($e, $this);
+ }
+ }
}
diff --git a/app/Models/StandaloneDragonfly.php b/app/Models/StandaloneDragonfly.php
index 6e7915faa..3aaedfc52 100644
--- a/app/Models/StandaloneDragonfly.php
+++ b/app/Models/StandaloneDragonfly.php
@@ -223,7 +223,17 @@ class StandaloneDragonfly extends BaseModel
protected function internalDbUrl(): Attribute
{
return new Attribute(
- get: fn () => "redis://:{$this->dragonfly_password}@{$this->uuid}:6379/0",
+ get: function () {
+ $scheme = $this->enable_ssl ? 'rediss' : 'redis';
+ $port = $this->enable_ssl ? 6380 : 6379;
+ $url = "{$scheme}://:{$this->dragonfly_password}@{$this->uuid}:{$port}/0";
+
+ if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
+ $url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
+ }
+
+ return $url;
+ }
);
}
@@ -232,7 +242,14 @@ class StandaloneDragonfly extends BaseModel
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
- return "redis://:{$this->dragonfly_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
+ $scheme = $this->enable_ssl ? 'rediss' : 'redis';
+ $url = "{$scheme}://:{$this->dragonfly_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
+
+ if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
+ $url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
+ }
+
+ return $url;
}
return null;
diff --git a/resources/views/livewire/project/database/dragonfly/general.blade.php b/resources/views/livewire/project/database/dragonfly/general.blade.php
index aa24db860..44765ae13 100644
--- a/resources/views/livewire/project/database/dragonfly/general.blade.php
+++ b/resources/views/livewire/project/database/dragonfly/general.blade.php
@@ -49,6 +49,40 @@
readonly value="Starting the database will generate this." />
@endif
+
+
+
+
SSL Configuration
+ @if($database->enable_ssl && $certificateValidUntil)
+
+ @endif
+
+
+ @if($database->enable_ssl && $certificateValidUntil)
+
Valid until:
+ @if(now()->gt($certificateValidUntil))
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }} - Expired
+ @elseif(now()->addDays(30)->gt($certificateValidUntil))
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }} - Expiring soon
+ @else
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }}
+ @endif
+
+ @endif
+
+
+
+
From 3e95387e101a187f310f626439ce80c92036258c Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Mon, 10 Feb 2025 21:29:45 +0100
Subject: [PATCH 081/145] Full: SSL Support for KeyDB
---
app/Actions/Database/StartKeydb.php | 145 ++++++++++++++++--
.../Project/Database/Keydb/General.php | 63 ++++++++
app/Models/StandaloneKeydb.php | 21 ++-
.../project/database/keydb/general.blade.php | 34 ++++
4 files changed, 248 insertions(+), 15 deletions(-)
diff --git a/app/Actions/Database/StartKeydb.php b/app/Actions/Database/StartKeydb.php
index 6c733d318..1e601e689 100644
--- a/app/Actions/Database/StartKeydb.php
+++ b/app/Actions/Database/StartKeydb.php
@@ -2,6 +2,8 @@
namespace App\Actions\Database;
+use App\Helpers\SslHelper;
+use App\Models\SslCertificate;
use App\Models\StandaloneKeydb;
use Illuminate\Support\Facades\Storage;
use Lorisleiva\Actions\Concerns\AsAction;
@@ -17,26 +19,77 @@ class StartKeydb
public string $configuration_dir;
+ private ?SslCertificate $ssl_certificate = null;
+
public function handle(StandaloneKeydb $database)
{
$this->database = $database;
- $startCommand = "keydb-server --requirepass {$this->database->keydb_password} --appendonly yes";
-
$container_name = $this->database->uuid;
$this->configuration_dir = database_configuration_dir().'/'.$container_name;
$this->commands = [
"echo 'Starting database.'",
+ "echo 'Creating directories.'",
"mkdir -p $this->configuration_dir",
+ "echo 'Directories created successfully.'",
];
+ if (! $this->database->enable_ssl) {
+ $this->commands[] = "rm -rf $this->configuration_dir/ssl";
+ SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->delete();
+ $this->database->fileStorages()
+ ->where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->get()
+ ->filter(function ($storage) {
+ return in_array($storage->mount_path, [
+ '/etc/keydb/certs/server.crt',
+ '/etc/keydb/certs/server.key',
+ ]);
+ })
+ ->each(function ($storage) {
+ $storage->delete();
+ });
+ } else {
+ $this->commands[] = "echo 'Setting up SSL for this database.'";
+ $this->commands[] = "mkdir -p $this->configuration_dir/ssl";
+
+ $server = $this->database->destination->server;
+ $caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
+
+ $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->first();
+
+ if (! $this->ssl_certificate) {
+ $this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
+ $this->ssl_certificate = SslHelper::generateSslCertificate(
+ commonName: $this->database->uuid,
+ resourceType: $this->database->getMorphClass(),
+ resourceId: $this->database->id,
+ serverId: $server->id,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
+ configurationDir: $this->configuration_dir,
+ mountPath: '/etc/keydb/certs',
+ );
+ }
+ }
+
+ $container_name = $this->database->uuid;
+ $this->configuration_dir = database_configuration_dir().'/'.$container_name;
+
$persistent_storages = $this->generate_local_persistent_volumes();
$persistent_file_volumes = $this->database->fileStorages()->get();
$volume_names = $this->generate_local_persistent_volumes_only_volume_names();
$environment_variables = $this->generate_environment_variables();
$this->add_custom_keydb();
+ $startCommand = $this->buildStartCommand();
+
$docker_compose = [
'services' => [
$container_name => [
@@ -72,34 +125,67 @@ class StartKeydb
],
],
];
+
if (! is_null($this->database->limits_cpuset)) {
data_set($docker_compose, "services.{$container_name}.cpuset", $this->database->limits_cpuset);
}
+
if ($this->database->destination->server->isLogDrainEnabled() && $this->database->isLogDrainEnabled()) {
$docker_compose['services'][$container_name]['logging'] = generate_fluentd_configuration();
}
+
if (count($this->database->ports_mappings_array) > 0) {
$docker_compose['services'][$container_name]['ports'] = $this->database->ports_mappings_array;
}
+
+ $docker_compose['services'][$container_name]['volumes'] ??= [];
+
if (count($persistent_storages) > 0) {
- $docker_compose['services'][$container_name]['volumes'] = $persistent_storages;
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ $persistent_storages
+ );
}
+
if (count($persistent_file_volumes) > 0) {
- $docker_compose['services'][$container_name]['volumes'] = $persistent_file_volumes->map(function ($item) {
- return "$item->fs_path:$item->mount_path";
- })->toArray();
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ $persistent_file_volumes->map(function ($item) {
+ return "$item->fs_path:$item->mount_path";
+ })->toArray()
+ );
}
+
if (count($volume_names) > 0) {
$docker_compose['volumes'] = $volume_names;
}
+
if (! is_null($this->database->keydb_conf) || ! empty($this->database->keydb_conf)) {
- $docker_compose['services'][$container_name]['volumes'][] = [
- 'type' => 'bind',
- 'source' => $this->configuration_dir.'/keydb.conf',
- 'target' => '/etc/keydb/keydb.conf',
- 'read_only' => true,
- ];
- $docker_compose['services'][$container_name]['command'] = "keydb-server /etc/keydb/keydb.conf --requirepass {$this->database->keydb_password} --appendonly yes";
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ [
+ [
+ 'type' => 'bind',
+ 'source' => $this->configuration_dir.'/keydb.conf',
+ 'target' => '/etc/keydb/keydb.conf',
+ 'read_only' => true,
+ ],
+ ]
+ );
+ }
+
+ if ($this->database->enable_ssl) {
+ $docker_compose['services'][$container_name]['volumes'] = array_merge(
+ $docker_compose['services'][$container_name]['volumes'] ?? [],
+ [
+ [
+ 'type' => 'bind',
+ 'source' => '/data/coolify/ssl/coolify-ca.crt',
+ 'target' => '/etc/keydb/certs/coolify-ca.crt',
+ 'read_only' => true,
+ ],
+ ]
+ );
}
// Add custom docker run options
@@ -112,6 +198,9 @@ class StartKeydb
$this->commands[] = "echo '{$readme}' > $this->configuration_dir/README.md";
$this->commands[] = "echo 'Pulling {$database->image} image.'";
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml pull";
+ if ($this->database->enable_ssl) {
+ $this->commands[] = "chown -R 999:999 $this->configuration_dir/ssl/server.key $this->configuration_dir/ssl/server.crt";
+ }
$this->commands[] = "docker compose -f $this->configuration_dir/docker-compose.yml up -d";
$this->commands[] = "echo 'Database started.'";
@@ -177,4 +266,34 @@ class StartKeydb
instant_scp($path, "{$this->configuration_dir}/{$filename}", $this->database->destination->server);
Storage::disk('local')->delete("tmp/keydb.conf_{$this->database->uuid}");
}
+
+ private function buildStartCommand(): string
+ {
+ $hasKeydbConf = ! is_null($this->database->keydb_conf) && ! empty($this->database->keydb_conf);
+ $keydbConfPath = '/etc/keydb/keydb.conf';
+
+ if ($hasKeydbConf) {
+ $confContent = $this->database->keydb_conf;
+ $hasRequirePass = str_contains($confContent, 'requirepass');
+
+ if ($hasRequirePass) {
+ $command = "keydb-server $keydbConfPath";
+ } else {
+ $command = "keydb-server $keydbConfPath --requirepass {$this->database->keydb_password}";
+ }
+ } else {
+ $command = "keydb-server --requirepass {$this->database->keydb_password} --appendonly yes";
+ }
+
+ if ($this->database->enable_ssl) {
+ $sslArgs = [
+ '--tls-cert-file /etc/keydb/certs/server.crt',
+ '--tls-key-file /etc/keydb/certs/server.key',
+ '--tls-ca-cert-file /etc/keydb/certs/coolify-ca.crt',
+ ];
+ $command .= ' '.implode(' ', $sslArgs);
+ }
+
+ return $command;
+ }
}
diff --git a/app/Livewire/Project/Database/Keydb/General.php b/app/Livewire/Project/Database/Keydb/General.php
index e768495eb..58db162a8 100644
--- a/app/Livewire/Project/Database/Keydb/General.php
+++ b/app/Livewire/Project/Database/Keydb/General.php
@@ -4,7 +4,9 @@ namespace App\Livewire\Project\Database\Keydb;
use App\Actions\Database\StartDatabaseProxy;
use App\Actions\Database\StopDatabaseProxy;
+use App\Helpers\SslHelper;
use App\Models\Server;
+use App\Models\SslCertificate;
use App\Models\StandaloneKeydb;
use Exception;
use Illuminate\Support\Facades\Auth;
@@ -53,6 +55,11 @@ class General extends Component
#[Validate(['nullable', 'boolean'])]
public bool $isLogDrainEnabled = false;
+ public $certificateValidUntil = null;
+
+ #[Validate(['nullable', 'boolean'])]
+ public bool $enable_ssl = false;
+
public function getListeners()
{
$teamId = Auth::user()->currentTeam()->id;
@@ -67,6 +74,14 @@ class General extends Component
try {
$this->syncData();
$this->server = data_get($this->database, 'destination.server');
+
+ $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->first();
+
+ if ($existingCert) {
+ $this->certificateValidUntil = $existingCert->valid_until;
+ }
} catch (\Throwable $e) {
return handleError($e, $this);
}
@@ -86,6 +101,7 @@ class General extends Component
$this->database->public_port = $this->publicPort;
$this->database->custom_docker_run_options = $this->customDockerRunOptions;
$this->database->is_log_drain_enabled = $this->isLogDrainEnabled;
+ $this->database->enable_ssl = $this->enable_ssl;
$this->database->save();
$this->dbUrl = $this->database->internal_db_url;
@@ -101,6 +117,7 @@ class General extends Component
$this->publicPort = $this->database->public_port;
$this->customDockerRunOptions = $this->database->custom_docker_run_options;
$this->isLogDrainEnabled = $this->database->is_log_drain_enabled;
+ $this->enable_ssl = $this->database->enable_ssl;
$this->dbUrl = $this->database->internal_db_url;
$this->dbUrlPublic = $this->database->external_db_url;
}
@@ -179,4 +196,50 @@ class General extends Component
}
}
}
+
+ public function instantSaveSSL()
+ {
+ try {
+ $this->syncData(true);
+ $this->dispatch('success', 'SSL configuration updated.');
+ } catch (Exception $e) {
+ return handleError($e, $this);
+ }
+ }
+
+ public function regenerateSslCertificate()
+ {
+ try {
+ $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
+ ->where('resource_id', $this->database->id)
+ ->where('server_id', $this->server->id)
+ ->first();
+
+ if (! $existingCert) {
+ $this->dispatch('error', 'No existing SSL certificate found for this database.');
+
+ return;
+ }
+
+ $caCert = SslCertificate::where('server_id', $existingCert->server_id)
+ ->where('is_ca_certificate', true)
+ ->first();
+
+ SslHelper::generateSslCertificate(
+ commonName: $existingCert->commonName,
+ subjectAlternativeNames: $existingCert->subjectAlternativeNames ?? [],
+ resourceType: $existingCert->resource_type,
+ resourceId: $existingCert->resource_id,
+ serverId: $existingCert->server_id,
+ caCert: $caCert->ssl_certificate,
+ caKey: $caCert->ssl_private_key,
+ configurationDir: $existingCert->configuration_dir,
+ mountPath: $existingCert->mount_path,
+ );
+
+ $this->dispatch('success', 'SSL certificates regenerated. Restart database to apply changes.');
+ } catch (Exception $e) {
+ handleError($e, $this);
+ }
+ }
}
diff --git a/app/Models/StandaloneKeydb.php b/app/Models/StandaloneKeydb.php
index 3e80408ef..af95d58e5 100644
--- a/app/Models/StandaloneKeydb.php
+++ b/app/Models/StandaloneKeydb.php
@@ -223,7 +223,17 @@ class StandaloneKeydb extends BaseModel
protected function internalDbUrl(): Attribute
{
return new Attribute(
- get: fn () => "redis://:{$this->keydb_password}@{$this->uuid}:6379/0",
+ get: function () {
+ $scheme = $this->enable_ssl ? 'rediss' : 'redis';
+ $port = $this->enable_ssl ? 6380 : 6379;
+ $url = "{$scheme}://:{$this->keydb_password}@{$this->uuid}:{$port}/0";
+
+ if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
+ $url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
+ }
+
+ return $url;
+ }
);
}
@@ -232,7 +242,14 @@ class StandaloneKeydb extends BaseModel
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
- return "redis://:{$this->keydb_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
+ $scheme = $this->enable_ssl ? 'rediss' : 'redis';
+ $url = "{$scheme}://:{$this->keydb_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
+
+ if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
+ $url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
+ }
+
+ return $url;
}
return null;
diff --git a/resources/views/livewire/project/database/keydb/general.blade.php b/resources/views/livewire/project/database/keydb/general.blade.php
index 362b7b363..8939bd00d 100644
--- a/resources/views/livewire/project/database/keydb/general.blade.php
+++ b/resources/views/livewire/project/database/keydb/general.blade.php
@@ -49,6 +49,40 @@
readonly value="Starting the database will generate this." />
@endif
+
+
+
+
SSL Configuration
+ @if($database->enable_ssl && $certificateValidUntil)
+
+ @endif
+
+
+ @if($database->enable_ssl && $certificateValidUntil)
+
Valid until:
+ @if(now()->gt($certificateValidUntil))
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }} - Expired
+ @elseif(now()->addDays(30)->gt($certificateValidUntil))
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }} - Expiring soon
+ @else
+ {{ $certificateValidUntil->format('d.m.Y H:i:s') }}
+ @endif
+
+ @endif
+
+
+
+
From 268fca3477a5ce594f96ba17a4d9ec94e9f21c31 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Mon, 10 Feb 2025 21:31:31 +0100
Subject: [PATCH 082/145] feat: SSL notification
---
.../SslExpirationNotification.php | 151 ++++++++++++++++++
.../emails/ssl-certificate-renewed.blade.php | 28 ++++
2 files changed, 179 insertions(+)
create mode 100644 app/Notifications/SslExpirationNotification.php
create mode 100644 resources/views/emails/ssl-certificate-renewed.blade.php
diff --git a/app/Notifications/SslExpirationNotification.php b/app/Notifications/SslExpirationNotification.php
new file mode 100644
index 000000000..78e1e8be9
--- /dev/null
+++ b/app/Notifications/SslExpirationNotification.php
@@ -0,0 +1,151 @@
+onQueue('high');
+ $this->resources = collect($resources);
+
+ // Collect URLs for each resource
+ $this->resources->each(function ($resource) {
+ if (data_get($resource, 'environment.project.uuid')) {
+ $routeName = match ($resource->type()) {
+ 'application' => 'project.application.configuration',
+ 'database' => 'project.database.configuration',
+ 'service' => 'project.service.configuration',
+ default => null
+ };
+
+ if ($routeName) {
+ $route = route($routeName, [
+ 'project_uuid' => data_get($resource, 'environment.project.uuid'),
+ 'environment_uuid' => data_get($resource, 'environment.uuid'),
+ $resource->type().'_uuid' => data_get($resource, 'uuid'),
+ ]);
+
+ $settings = instanceSettings();
+ if (data_get($settings, 'fqdn')) {
+ $url = Url::fromString($route);
+ $url = $url->withPort(null);
+ $fqdn = data_get($settings, 'fqdn');
+ $fqdn = str_replace(['http://', 'https://'], '', $fqdn);
+ $url = $url->withHost($fqdn);
+
+ $this->urls[$resource->name] = $url->__toString();
+ } else {
+ $this->urls[$resource->name] = $route;
+ }
+ }
+ }
+ });
+ }
+
+ public function via(object $notifiable): array
+ {
+ return $notifiable->getEnabledChannels('ssl_certificate_renewal');
+ }
+
+ public function toMail(): MailMessage
+ {
+ $mail = new MailMessage;
+ $mail->subject('Coolify: [Action Required] SSL Certificates Renewed - Manual Redeployment Needed');
+ $mail->view('emails.ssl-certificate-renewed', [
+ 'resources' => $this->resources,
+ 'urls' => $this->urls,
+ ]);
+
+ return $mail;
+ }
+
+ public function toDiscord(): DiscordMessage
+ {
+ $resourceNames = $this->resources->pluck('name')->join(', ');
+
+ $message = new DiscordMessage(
+ title: '🔒 SSL Certificates Renewed',
+ description: "SSL certificates have been renewed for: {$resourceNames}.\n\n**Action Required:** These resources need to be redeployed manually.",
+ color: DiscordMessage::warningColor(),
+ );
+
+ foreach ($this->urls as $name => $url) {
+ $message->addField($name, "[View Resource]({$url})");
+ }
+
+ return $message;
+ }
+
+ public function toTelegram(): array
+ {
+ $resourceNames = $this->resources->pluck('name')->join(', ');
+ $message = "Coolify: SSL certificates have been renewed for: {$resourceNames}.\n\nAction Required: These resources need to be redeployed manually for the new SSL certificates to take effect.";
+
+ $buttons = [];
+ foreach ($this->urls as $name => $url) {
+ $buttons[] = [
+ 'text' => "View {$name}",
+ 'url' => $url,
+ ];
+ }
+
+ return [
+ 'message' => $message,
+ 'buttons' => $buttons,
+ ];
+ }
+
+ public function toPushover(): PushoverMessage
+ {
+ $resourceNames = $this->resources->pluck('name')->join(', ');
+ $message = "SSL certificates have been renewed for: {$resourceNames}
";
+ $message .= '
Action Required: These resources need to be redeployed manually for the new SSL certificates to take effect.';
+
+ $buttons = [];
+ foreach ($this->urls as $name => $url) {
+ $buttons[] = [
+ 'text' => "View {$name}",
+ 'url' => $url,
+ ];
+ }
+
+ return new PushoverMessage(
+ title: 'SSL Certificates Renewed',
+ level: 'warning',
+ message: $message,
+ buttons: $buttons,
+ );
+ }
+
+ public function toSlack(): SlackMessage
+ {
+ $resourceNames = $this->resources->pluck('name')->join(', ');
+ $description = "SSL certificates have been renewed for: {$resourceNames}\n\n";
+ $description .= '**Action Required:** These resources need to be redeployed manually for the new SSL certificates to take effect.';
+
+ if (! empty($this->urls)) {
+ $description .= "\n\n**Resource URLs:**\n";
+ foreach ($this->urls as $name => $url) {
+ $description .= "• {$name}: {$url}\n";
+ }
+ }
+
+ return new SlackMessage(
+ title: '🔒 SSL Certificates Renewed',
+ description: $description,
+ color: SlackMessage::warningColor()
+ );
+ }
+}
diff --git a/resources/views/emails/ssl-certificate-renewed.blade.php b/resources/views/emails/ssl-certificate-renewed.blade.php
new file mode 100644
index 000000000..3d0d7a7b2
--- /dev/null
+++ b/resources/views/emails/ssl-certificate-renewed.blade.php
@@ -0,0 +1,28 @@
+
+SSL Certificates Renewed
+
+SSL certificates have been renewed for the following resources:
+
+
+@foreach($resources as $resource)
+ - {{ $resource->name }}
+@endforeach
+
+
+
+ ⚠️ Action Required: These resources need to be redeployed manually for the new SSL certificates to take effect. Please do this in the next few days to ensure your database connections remain accessible.
+
+
+The old SSL certificates will remain valid for approximately 14 more days, as we renew certificates 14 days before their expiration.
+
+@if(isset($urls) && count($urls) > 0)
+
+
You can redeploy these resources here:
+
+ @foreach($urls as $name => $url)
+ - {{ $name }}
+ @endforeach
+
+
+@endif
+
From 0a738e6bff5a25f553214c3d8c3756f91eec26b4 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Tue, 11 Feb 2025 20:18:19 +0100
Subject: [PATCH 083/145] fix(ssl): KeyDB port and caCert args are missing
---
app/Actions/Database/StartKeydb.php | 2 ++
1 file changed, 2 insertions(+)
diff --git a/app/Actions/Database/StartKeydb.php b/app/Actions/Database/StartKeydb.php
index 1e601e689..8ec076dd2 100644
--- a/app/Actions/Database/StartKeydb.php
+++ b/app/Actions/Database/StartKeydb.php
@@ -287,9 +287,11 @@ class StartKeydb
if ($this->database->enable_ssl) {
$sslArgs = [
+ '--tls-port 6380',
'--tls-cert-file /etc/keydb/certs/server.crt',
'--tls-key-file /etc/keydb/certs/server.key',
'--tls-ca-cert-file /etc/keydb/certs/coolify-ca.crt',
+ '--tls-auth-clients optional',
];
$command .= ' '.implode(' ', $sslArgs);
}
From 4fdd5679c9ea417e1aecded3c2074e3812de369b Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Tue, 11 Feb 2025 20:18:42 +0100
Subject: [PATCH 084/145] fix(ui): enable SSL is not working correctly for
KeyDB
---
app/Livewire/Project/Database/Keydb/General.php | 2 +-
.../views/livewire/project/database/keydb/general.blade.php | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/app/Livewire/Project/Database/Keydb/General.php b/app/Livewire/Project/Database/Keydb/General.php
index 58db162a8..fd7737343 100644
--- a/app/Livewire/Project/Database/Keydb/General.php
+++ b/app/Livewire/Project/Database/Keydb/General.php
@@ -57,7 +57,7 @@ class General extends Component
public $certificateValidUntil = null;
- #[Validate(['nullable', 'boolean'])]
+ #[Validate(['boolean'])]
public bool $enable_ssl = false;
public function getListeners()
diff --git a/resources/views/livewire/project/database/keydb/general.blade.php b/resources/views/livewire/project/database/keydb/general.blade.php
index 8939bd00d..58a41c289 100644
--- a/resources/views/livewire/project/database/keydb/general.blade.php
+++ b/resources/views/livewire/project/database/keydb/general.blade.php
@@ -80,7 +80,7 @@
@endif
-
+
From d74c578a4a7fc6be460de6141a66e9d85217e9d8 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Tue, 11 Feb 2025 20:34:45 +0100
Subject: [PATCH 085/145] fix(ssl): add `--tls` arg to DrangflyDB
---
app/Actions/Database/StartDragonfly.php | 1 +
1 file changed, 1 insertion(+)
diff --git a/app/Actions/Database/StartDragonfly.php b/app/Actions/Database/StartDragonfly.php
index c9a2f173c..99bb5fa89 100644
--- a/app/Actions/Database/StartDragonfly.php
+++ b/app/Actions/Database/StartDragonfly.php
@@ -197,6 +197,7 @@ class StartDragonfly
if ($this->database->enable_ssl) {
$sslArgs = [
+ '--tls',
'--tls_cert_file /etc/dragonfly/certs/server.crt',
'--tls_key_file /etc/dragonfly/certs/server.key',
'--tls_ca_cert_file /etc/dragonfly/certs/coolify-ca.crt',
From f2888527534bdadeb3b3d16bc672c3569e6585a7 Mon Sep 17 00:00:00 2001
From: peaklabs-dev <122374094+peaklabs-dev@users.noreply.github.com>
Date: Tue, 11 Feb 2025 20:55:33 +0100
Subject: [PATCH 086/145] fix(notification): always send SSL notifications
---
app/Traits/HasNotificationSettings.php | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/app/Traits/HasNotificationSettings.php b/app/Traits/HasNotificationSettings.php
index ef858d0b6..236e4d97c 100644
--- a/app/Traits/HasNotificationSettings.php
+++ b/app/Traits/HasNotificationSettings.php
@@ -4,9 +4,9 @@ namespace App\Traits;
use App\Notifications\Channels\DiscordChannel;
use App\Notifications\Channels\EmailChannel;
+use App\Notifications\Channels\PushoverChannel;
use App\Notifications\Channels\SlackChannel;
use App\Notifications\Channels\TelegramChannel;
-use App\Notifications\Channels\PushoverChannel;
use Illuminate\Database\Eloquent\Model;
trait HasNotificationSettings
@@ -16,6 +16,7 @@ trait HasNotificationSettings
'server_force_disabled',
'general',
'test',
+ 'ssl_certificate_renewal',
];
/**
From e86e96a29a261b6b52e08460274137fd0c146ec8 Mon Sep 17 00:00:00 2001
From: bopad
Date: Wed, 12 Feb 2025 14:43:50 +0100
Subject: [PATCH 087/145] add yaml + svg
---
public/svgs/denoKV.svg | 1 +
templates/compose/denoKV.yaml | 25 +++++++++++++++++++++++++
2 files changed, 26 insertions(+)
create mode 100644 public/svgs/denoKV.svg
create mode 100644 templates/compose/denoKV.yaml
diff --git a/public/svgs/denoKV.svg b/public/svgs/denoKV.svg
new file mode 100644
index 000000000..799fcf865
--- /dev/null
+++ b/public/svgs/denoKV.svg
@@ -0,0 +1 @@
+
\ No newline at end of file
diff --git a/templates/compose/denoKV.yaml b/templates/compose/denoKV.yaml
new file mode 100644
index 000000000..8709fc657
--- /dev/null
+++ b/templates/compose/denoKV.yaml
@@ -0,0 +1,25 @@
+# documentation: https://docs.deno.com/deploy/kv/manual/
+# slogan: The Denoland key-value database
+# tags: deno, kv, key-value, database
+# logo: svgs/deno.svg
+# port: 4512
+
+services:
+ denokv:
+ image: ghcr.io/denoland/denokv:latest
+ environment:
+ - 'ACCESS_TOKEN=${SERVICE_PASSWORD_DENOKV}'
+ - SERVICE_FQDN_DENOKV_4512
+ volumes:
+ - '${COOLIFY_VOLUME_APP}:/data'
+ command: '--sqlite-path /data/denokv.sqlite serve --access-token ${SERVICE_PASSWORD_DENOKV}'
+ healthcheck:
+ test:
+ - CMD
+ - nc
+ - '-zv'
+ - 127.0.0.1
+ - '4512'
+ interval: 5s
+ timeout: 5s
+ retries: 3
From e5bf2cc3900ee123f4943b346ebb67c863403053 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Urs=20Kr=C3=B6ll?=
<109229014+UrsKroell@users.noreply.github.com>
Date: Sun, 16 Feb 2025 15:05:24 +0100
Subject: [PATCH 088/145] Add wakapi template
Adds a template to create a wakapi instance
---
templates/compose/wakapi.yaml | 60 +++++++++++++++++++++++++++++++++++
1 file changed, 60 insertions(+)
create mode 100644 templates/compose/wakapi.yaml
diff --git a/templates/compose/wakapi.yaml b/templates/compose/wakapi.yaml
new file mode 100644
index 000000000..45cc205ff
--- /dev/null
+++ b/templates/compose/wakapi.yaml
@@ -0,0 +1,60 @@
+# documentation: https://wakapi.dev/
+# slogan: A minimalist, self-hosted WakaTime-compatible backend for coding statistics
+# tags: productivity, self-hosted, developer-tools, time-tracker, wakatime, wakatime-api, coding-statistics, statistics, timetracking, analytics
+# logo: svgs/wakapi.svg
+# port: 3000
+
+services:
+ wakapi:
+ image: ghcr.io/muety/wakapi:latest
+ environment:
+ - SERVICE_FQDN_WAKAPI_3000
+ - TZ=${TIMEZONE:-Europe/Berlin}
+
+ - WAKAPI_SERVER_LISTEN_IPV6="-"
+ - WAKAPI_ENV=${WAKAPI_ENVIRONMENT:-production}
+ - WAKAPI_SECURITY_PASSWORD_SALT=${SERVICE_BASE64_64_PASSWORDSALT}
+ - WAKAPI_SECURITY_EXPOSE_METRICS=${WAKAPI_SECURITY_EXPOSE_METRICS:-false}
+
+ # Database configuration
+ - WAKAPI_DB_TYPE=postgres
+ - WAKAPI_DB_NAME=${WAKAPI_DB_NAME:-wakapi}
+ - WAKAPI_DB_USER=${SERVICE_USER_DATABASE}
+ - WAKAPI_DB_PASSWORD=${SERVICE_PASSWORD_DATABASE}
+ - WAKAPI_DB_HOST=${WAKAPI_DB_HOST:-postgres}
+ - WAKAPI_DB_PORT=${WAKAPI_DB_PORT:-5432}
+
+ # SMTP configuration
+ - WAKAPI_MAIL_ENABLED=${WAKAPI_MAIL_ENABLED:-false}
+ - WAKAPI_MAIL_PROVIDER=smtp #only smtp supported
+ - WAKAPI_MAIL_SENDER=${WAKAPI_MAIL_SENDER}
+ - WAKAPI_MAIL_SMTP_HOST=${WAKAPI_MAIL_SMTP_HOST}
+ - WAKAPI_MAIL_SMTP_PORT=${WAKAPI_MAIL_SMTP_PORT:-587}
+ - WAKAPI_MAIL_SMTP_USERNAME=${WAKAPI_MAIL_SMTP_USERNAME}
+ - WAKAPI_MAIL_SMTP_PASSWORD=${WAKAPI_MAIL_SMTP_PASSWORD}
+
+ volumes:
+ - wakapi-data:/data
+ depends_on:
+ postgres:
+ condition: service_healthy
+ healthcheck:
+ test: ["CMD-SHELL", "wget -qO- http://127.0.0.1:3000/"]
+ interval: 2s
+ timeout: 10s
+ retries: 15
+
+ postgres:
+ image: postgres:16-alpine
+ volumes:
+ - wakapi-postgres-data:/var/lib/postgresql/data
+ environment:
+ - POSTGRES_USER=${SERVICE_USER_DATABASE}
+ - POSTGRES_PASSWORD=${SERVICE_PASSWORD_DATABASE}
+ - POSTGRES_DB=${WAKAPI_DB_NAME:-wakapi}
+ - POSTGRES_PORT=${WAKAPI_DB_PORT:-5432}
+ healthcheck:
+ test: ["CMD-SHELL", "pg_isready -U $${POSTGRES_USER} -d $${POSTGRES_DB}"]
+ interval: 5s
+ timeout: 20s
+ retries: 10
From cd51b94d733708db9fe359638e86545a3278ae2c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Urs=20Kr=C3=B6ll?=
<109229014+UrsKroell@users.noreply.github.com>
Date: Sun, 16 Feb 2025 15:06:14 +0100
Subject: [PATCH 089/145] Add wakapi logo
Add the svg logo for wakapi
---
public/svgs/wakapi.svg | 150 +++++++++++++++++++++++++++++++++++++++++
1 file changed, 150 insertions(+)
create mode 100644 public/svgs/wakapi.svg
diff --git a/public/svgs/wakapi.svg b/public/svgs/wakapi.svg
new file mode 100644
index 000000000..1f5dfb0c0
--- /dev/null
+++ b/public/svgs/wakapi.svg
@@ -0,0 +1,150 @@
+
+
From 4a0cab8be3320e83a7f79defc8ab2e7b4b9c91bc Mon Sep 17 00:00:00 2001
From: Mike M
Date: Sun, 16 Feb 2025 16:44:22 -0800
Subject: [PATCH 090/145] Added support for passing hd parameter to Google via
existing tenant column in oauth_settings
---
app/Providers/EventServiceProvider.php | 2 +
bootstrap/helpers/socialite.php | 13 +++++-
composer.json | 3 +-
composer.lock | 43 ++++++++++++++++++-
config/services.php | 8 ++++
.../views/livewire/settings-oauth.blade.php | 5 +++
6 files changed, 71 insertions(+), 3 deletions(-)
diff --git a/app/Providers/EventServiceProvider.php b/app/Providers/EventServiceProvider.php
index 428f78cb5..d76ec3037 100644
--- a/app/Providers/EventServiceProvider.php
+++ b/app/Providers/EventServiceProvider.php
@@ -11,6 +11,7 @@ use Illuminate\Foundation\Events\MaintenanceModeEnabled;
use Illuminate\Foundation\Support\Providers\EventServiceProvider as ServiceProvider;
use SocialiteProviders\Authentik\AuthentikExtendSocialite;
use SocialiteProviders\Azure\AzureExtendSocialite;
+use SocialiteProviders\Google\GoogleExtendSocialite;
use SocialiteProviders\Infomaniak\InfomaniakExtendSocialite;
use SocialiteProviders\Manager\SocialiteWasCalled;
@@ -26,6 +27,7 @@ class EventServiceProvider extends ServiceProvider
SocialiteWasCalled::class => [
AzureExtendSocialite::class.'@handle',
AuthentikExtendSocialite::class.'@handle',
+ GoogleExtendSocialite::class.'@handle',
InfomaniakExtendSocialite::class.'@handle',
],
ProxyStarted::class => [
diff --git a/bootstrap/helpers/socialite.php b/bootstrap/helpers/socialite.php
index 09dffb78a..16870e33d 100644
--- a/bootstrap/helpers/socialite.php
+++ b/bootstrap/helpers/socialite.php
@@ -29,6 +29,18 @@ function get_socialite_provider(string $provider)
return Socialite::driver('authentik')->setConfig($authentik_config);
}
+ if ($provider == 'google') {
+ $google_config = new \SocialiteProviders\Manager\Config(
+ $oauth_setting->client_id,
+ $oauth_setting->client_secret,
+ $oauth_setting->redirect_uri
+ );
+
+ return Socialite::driver('google')
+ ->setConfig($google_config)
+ ->with(['hd' => $oauth_setting->tenant]);
+ }
+
$config = [
'client_id' => $oauth_setting->client_id,
'client_secret' => $oauth_setting->client_secret,
@@ -39,7 +51,6 @@ function get_socialite_provider(string $provider)
'bitbucket' => \Laravel\Socialite\Two\BitbucketProvider::class,
'github' => \Laravel\Socialite\Two\GithubProvider::class,
'gitlab' => \Laravel\Socialite\Two\GitlabProvider::class,
- 'google' => \Laravel\Socialite\Two\GoogleProvider::class,
'infomaniak' => \SocialiteProviders\Infomaniak\Provider::class,
];
diff --git a/composer.json b/composer.json
index f01913b5f..e5aeb6126 100644
--- a/composer.json
+++ b/composer.json
@@ -40,6 +40,7 @@
"resend/resend-laravel": "^0.15.0",
"sentry/sentry-laravel": "^4.6",
"socialiteproviders/authentik": "^5.2",
+ "socialiteproviders/google": "^4.1",
"socialiteproviders/infomaniak": "^4.0",
"socialiteproviders/microsoft-azure": "^5.1",
"spatie/laravel-activitylog": "^4.7.3",
@@ -125,4 +126,4 @@
"@php artisan key:generate --ansi"
]
}
-}
\ No newline at end of file
+}
diff --git a/composer.lock b/composer.lock
index 97b40f7c7..5a7e04bbc 100644
--- a/composer.lock
+++ b/composer.lock
@@ -4,7 +4,7 @@
"Read more about it at https://getcomposer.org/doc/01-basic-usage.md#installing-dependencies",
"This file is @generated automatically"
],
- "content-hash": "9c1a0833be38d1f058f216dcaa522077",
+ "content-hash": "dcf6b2f554372a570628d7f85184df7b",
"packages": [
{
"name": "3sidedcube/laravel-redoc",
@@ -7474,6 +7474,47 @@
},
"time": "2023-11-07T22:21:16+00:00"
},
+ {
+ "name": "socialiteproviders/google",
+ "version": "4.1.0",
+ "source": {
+ "type": "git",
+ "url": "https://github.com/SocialiteProviders/Google-Plus.git",
+ "reference": "1cb8f6fb2c0dd0fc8b34e95f69865663fdf0b401"
+ },
+ "dist": {
+ "type": "zip",
+ "url": "https://api.github.com/repos/SocialiteProviders/Google-Plus/zipball/1cb8f6fb2c0dd0fc8b34e95f69865663fdf0b401",
+ "reference": "1cb8f6fb2c0dd0fc8b34e95f69865663fdf0b401",
+ "shasum": ""
+ },
+ "require": {
+ "ext-json": "*",
+ "php": "^7.2 || ^8.0",
+ "socialiteproviders/manager": "~4.0"
+ },
+ "type": "library",
+ "autoload": {
+ "psr-4": {
+ "SocialiteProviders\\Google\\": ""
+ }
+ },
+ "notification-url": "https://packagist.org/downloads/",
+ "license": [
+ "MIT"
+ ],
+ "authors": [
+ {
+ "name": "xstoop",
+ "email": "myenglishnameisx@gmail.com"
+ }
+ ],
+ "description": "Google OAuth2 Provider for Laravel Socialite",
+ "support": {
+ "source": "https://github.com/SocialiteProviders/Google-Plus/tree/4.1.0"
+ },
+ "time": "2020-12-01T23:10:59+00:00"
+ },
{
"name": "socialiteproviders/infomaniak",
"version": "4.0.0",
diff --git a/config/services.php b/config/services.php
index 46fd12ec3..d1c4a3699 100644
--- a/config/services.php
+++ b/config/services.php
@@ -45,4 +45,12 @@ return [
'client_secret' => env('AUTHENTIK_CLIENT_SECRET'),
'redirect' => env('AUTHENTIK_REDIRECT_URI'),
],
+
+ 'google' => [
+ 'client_id' => env('GOOGLE_CLIENT_ID'),
+ 'client_secret' => env('GOOGLE_CLIENT_SECRET'),
+ 'redirect' => env('GOOGLE_REDIRECT_URI'),
+ 'tenant' => env('GOOGLE_TENANT'),
+ ],
+
];
diff --git a/resources/views/livewire/settings-oauth.blade.php b/resources/views/livewire/settings-oauth.blade.php
index 2f0d28cfc..7062ef4d4 100644
--- a/resources/views/livewire/settings-oauth.blade.php
+++ b/resources/views/livewire/settings-oauth.blade.php
@@ -32,6 +32,11 @@
@endif
+ @if ($oauth_setting->provider == 'google')
+
+ @endif
@if ($oauth_setting->provider == 'authentik')
From ee130da0ccd1b8ea9bf6ee1e9ab9b3df9ab13051 Mon Sep 17 00:00:00 2001
From: phenomen
Date: Sun, 16 Feb 2025 20:36:04 -0600
Subject: [PATCH 091/145] Update Foundry VTT template
---
templates/compose/foundryvtt.yaml | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/templates/compose/foundryvtt.yaml b/templates/compose/foundryvtt.yaml
index 5cf961a37..75b86841f 100644
--- a/templates/compose/foundryvtt.yaml
+++ b/templates/compose/foundryvtt.yaml
@@ -39,12 +39,17 @@ services:
- FOUNDRY_MINIFY_STATIC_FILES=${FOUNDRY_MINIFY_STATIC_FILES:-true}
# The world ID to startup at system start.
- FOUNDRY_WORLD=${FOUNDRY_WORLD}
+ # Optional telemetry.
- FOUNDRY_TELEMETRY=${FOUNDRY_TELEMETRY:-false}
+ # The timezone to use for the server.
- TIMEZONE=${TIMEZONE:-UTC}
# Set a path to cache downloads of the Foundry distribution archive and speed up subsequent container startups.
- CONTAINER_CACHE=/data/container_cache
volumes:
- - foundryvtt-data:/data
+ - type: bind
+ source: ${FOUNDRY_DATA:-/data/foundryvtt}
+ target: /data
+ is_directory: true
healthcheck:
test: ["CMD", "curl", "-f", "http://127.0.0.1:30000"]
timeout: 5s
From ca380213d51499394f2dad2f29f142b7d53137dd Mon Sep 17 00:00:00 2001
From: Manish Gupta <59428681+mguptahub@users.noreply.github.com>
Date: Mon, 17 Feb 2025 15:49:19 +0530
Subject: [PATCH 092/145] updated 'plane.yaml' to use APP_RELEASE environment
variable
---
templates/compose/plane.yaml | 22 ++++++++++------------
1 file changed, 10 insertions(+), 12 deletions(-)
diff --git a/templates/compose/plane.yaml b/templates/compose/plane.yaml
index fc62cb122..d1fcf78fa 100644
--- a/templates/compose/plane.yaml
+++ b/templates/compose/plane.yaml
@@ -5,6 +5,7 @@
x-app-env: &app-env
environment:
+ - APP_RELEASE=${APP_RELEASE:-v0.24.1}
- WEB_URL=${SERVICE_FQDN_PLANE}
- DEBUG=${DEBUG:-0}
- CORS_ALLOWED_ORIGINS=${CORS_ALLOWED_ORIGIN:-http://localhost}
@@ -54,7 +55,7 @@ services:
- SERVICE_FQDN_PLANE
- FILE_SIZE_LIMIT=${FILE_SIZE_LIMIT:-5242880}
- BUCKET_NAME=${BUCKET_NAME:-uploads}
- image: makeplane/plane-proxy:stable
+ image: makeplane/plane-proxy:${APP_RELEASE:-v0.24.1}
depends_on:
- web
- api
@@ -66,8 +67,7 @@ services:
retries: 15
web:
- <<: *app-env
- image: makeplane/plane-frontend:stable
+ image: makeplane/plane-frontend:${APP_RELEASE:-v0.24.1}
command: node web/server.js web
depends_on:
- api
@@ -78,8 +78,7 @@ services:
timeout: 10s
retries: 15
space:
- <<: *app-env
- image: makeplane/plane-space:stable
+ image: makeplane/plane-space:${APP_RELEASE:-v0.24.1}
command: node space/server.js space
depends_on:
- api
@@ -92,8 +91,7 @@ services:
retries: 15
admin:
- <<: *app-env
- image: makeplane/plane-admin:stable
+ image: makeplane/plane-admin:${APP_RELEASE:-v0.24.1}
command: node admin/server.js admin
depends_on:
- api
@@ -106,7 +104,7 @@ services:
live:
<<: *app-env
- image: makeplane/plane-live:stable
+ image: makeplane/plane-live:${APP_RELEASE:-v0.24.1}
command: node live/dist/server.js live
depends_on:
- api
@@ -119,7 +117,7 @@ services:
api:
<<: *app-env
- image: makeplane/plane-backend:stable
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.24.1}
command: ./bin/docker-entrypoint-api.sh
volumes:
- logs_api:/code/plane/logs
@@ -134,7 +132,7 @@ services:
worker:
<<: *app-env
- image: makeplane/plane-backend:stable
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.24.1}
command: ./bin/docker-entrypoint-worker.sh
volumes:
- logs_worker:/code/plane/logs
@@ -150,7 +148,7 @@ services:
beat-worker:
<<: *app-env
- image: makeplane/plane-backend:stable
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.24.1}
command: ./bin/docker-entrypoint-beat.sh
volumes:
- logs_beat-worker:/code/plane/logs
@@ -166,7 +164,7 @@ services:
migrator:
<<: *app-env
- image: makeplane/plane-backend:stable
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.24.1}
restart: "no"
command: ./bin/docker-entrypoint-migrator.sh
volumes:
From 0d12b8296e4d4f91517a4a7d4518df2b169787de Mon Sep 17 00:00:00 2001
From: "Gauthier A."
Date: Mon, 17 Feb 2025 23:10:21 +0100
Subject: [PATCH 093/145] fix wrong database container name + code
simplification
---
app/Actions/Database/StartDatabaseProxy.php | 68 ++++-----------------
1 file changed, 11 insertions(+), 57 deletions(-)
diff --git a/app/Actions/Database/StartDatabaseProxy.php b/app/Actions/Database/StartDatabaseProxy.php
index d9272356c..14be9d2bc 100644
--- a/app/Actions/Database/StartDatabaseProxy.php
+++ b/app/Actions/Database/StartDatabaseProxy.php
@@ -22,74 +22,28 @@ class StartDatabaseProxy
public function handle(StandaloneRedis|StandalonePostgresql|StandaloneMongodb|StandaloneMysql|StandaloneMariadb|StandaloneKeydb|StandaloneDragonfly|StandaloneClickhouse|ServiceDatabase $database)
{
- $internalPort = null;
- $type = $database->getMorphClass();
+ $databaseType = $database->database_type;
$network = data_get($database, 'destination.network');
$server = data_get($database, 'destination.server');
$containerName = data_get($database, 'uuid');
$proxyContainerName = "{$database->uuid}-proxy";
+
if ($database->getMorphClass() === \App\Models\ServiceDatabase::class) {
$databaseType = $database->databaseType();
// $connectPredefined = data_get($database, 'service.connect_to_docker_network');
$network = $database->service->uuid;
$server = data_get($database, 'service.destination.server');
$proxyContainerName = "{$database->service->uuid}-proxy";
- switch ($databaseType) {
- case 'standalone-mariadb':
- $type = \App\Models\StandaloneMariadb::class;
- $containerName = "mariadb-{$database->service->uuid}";
- break;
- case 'standalone-mongodb':
- $type = \App\Models\StandaloneMongodb::class;
- $containerName = "mongodb-{$database->service->uuid}";
- break;
- case 'standalone-mysql':
- $type = \App\Models\StandaloneMysql::class;
- $containerName = "mysql-{$database->service->uuid}";
- break;
- case 'standalone-postgresql':
- $type = \App\Models\StandalonePostgresql::class;
- $containerName = "postgresql-{$database->service->uuid}";
- break;
- case 'standalone-redis':
- $type = \App\Models\StandaloneRedis::class;
- $containerName = "redis-{$database->service->uuid}";
- break;
- case 'standalone-keydb':
- $type = \App\Models\StandaloneKeydb::class;
- $containerName = "keydb-{$database->service->uuid}";
- break;
- case 'standalone-dragonfly':
- $type = \App\Models\StandaloneDragonfly::class;
- $containerName = "dragonfly-{$database->service->uuid}";
- break;
- case 'standalone-clickhouse':
- $type = \App\Models\StandaloneClickhouse::class;
- $containerName = "clickhouse-{$database->service->uuid}";
- break;
- case 'standalone-supabase/postgres':
- $type = \App\Models\StandalonePostgresql::class;
- $containerName = "supabase-db-{$database->service->uuid}";
- break;
- }
- }
- if ($type === \App\Models\StandaloneRedis::class) {
- $internalPort = 6379;
- } elseif ($type === \App\Models\StandalonePostgresql::class) {
- $internalPort = 5432;
- } elseif ($type === \App\Models\StandaloneMongodb::class) {
- $internalPort = 27017;
- } elseif ($type === \App\Models\StandaloneMysql::class) {
- $internalPort = 3306;
- } elseif ($type === \App\Models\StandaloneMariadb::class) {
- $internalPort = 3306;
- } elseif ($type === \App\Models\StandaloneKeydb::class) {
- $internalPort = 6379;
- } elseif ($type === \App\Models\StandaloneDragonfly::class) {
- $internalPort = 6379;
- } elseif ($type === \App\Models\StandaloneClickhouse::class) {
- $internalPort = 9000;
+ $containerName = "{$database->name}-{$database->service->uuid}";
}
+
+ $internalPort = match ($databaseType) {
+ 'standalone-mariadb', 'standalone-mysql' => 3306,
+ 'standalone-postgresql', 'standalone-supabase/postgres' => 5432,
+ 'standalone-redis', 'standalone-keydb', 'standalone-dragonfly' => 6379,
+ 'standalone-clickhouse' => 9000,
+ };
+
$configuration_dir = database_proxy_dir($database->uuid);
$nginxconf = <<
Date: Wed, 19 Feb 2025 18:04:58 +0100
Subject: [PATCH 094/145] chore: improve code quality suggested by code rabbit
---
app/Actions/Database/StartDragonfly.php | 8 +--
app/Actions/Database/StartKeydb.php | 8 +--
app/Actions/Database/StartMariadb.php | 6 +--
app/Actions/Database/StartMongodb.php | 6 +--
app/Actions/Database/StartMysql.php | 6 +--
app/Actions/Database/StartPostgresql.php | 6 +--
app/Actions/Database/StartRedis.php | 6 +--
app/Actions/Server/InstallDocker.php | 2 +-
app/Jobs/RegenerateSslCertJob.php | 18 +++----
.../Project/Database/Dragonfly/General.php | 12 ++---
.../Project/Database/Keydb/General.php | 12 ++---
.../Project/Database/Mariadb/General.php | 12 ++---
.../Project/Database/Mongodb/General.php | 12 ++---
.../Project/Database/Mysql/General.php | 12 ++---
.../Project/Database/Postgresql/General.php | 12 ++---
.../Project/Database/Redis/General.php | 12 ++---
app/Livewire/Server/Advanced.php | 5 +-
app/Models/StandaloneClickhouse.php | 12 ++++-
app/Models/StandaloneDragonfly.php | 6 ++-
app/Models/StandaloneKeydb.php | 6 ++-
app/Models/StandaloneMariadb.php | 12 ++++-
app/Models/StandaloneMongodb.php | 9 ++--
app/Models/StandaloneMysql.php | 8 ++-
app/Models/StandalonePostgresql.php | 8 ++-
app/Models/StandaloneRedis.php | 10 ++--
...5223_encrypt_local_file_volumes_fields.php | 54 ++++++++++---------
database/seeders/CaSslCertSeeder.php | 2 +-
27 files changed, 138 insertions(+), 144 deletions(-)
diff --git a/app/Actions/Database/StartDragonfly.php b/app/Actions/Database/StartDragonfly.php
index 99bb5fa89..882ed3c2e 100644
--- a/app/Actions/Database/StartDragonfly.php
+++ b/app/Actions/Database/StartDragonfly.php
@@ -36,9 +36,7 @@ class StartDragonfly
if (! $this->database->enable_ssl) {
$this->commands[] = "rm -rf $this->configuration_dir/ssl";
- SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->delete();
+ $this->database->sslCertificates()->delete();
$this->database->fileStorages()
->where('resource_type', $this->database->getMorphClass())
->where('resource_id', $this->database->id)
@@ -59,9 +57,7 @@ class StartDragonfly
$server = $this->database->destination->server;
$caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $this->ssl_certificate = $this->database->sslCertificates()->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
diff --git a/app/Actions/Database/StartKeydb.php b/app/Actions/Database/StartKeydb.php
index 8ec076dd2..311b5094a 100644
--- a/app/Actions/Database/StartKeydb.php
+++ b/app/Actions/Database/StartKeydb.php
@@ -37,9 +37,7 @@ class StartKeydb
if (! $this->database->enable_ssl) {
$this->commands[] = "rm -rf $this->configuration_dir/ssl";
- SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->delete();
+ $this->database->sslCertificates()->delete();
$this->database->fileStorages()
->where('resource_type', $this->database->getMorphClass())
->where('resource_id', $this->database->id)
@@ -60,9 +58,7 @@ class StartKeydb
$server = $this->database->destination->server;
$caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $this->ssl_certificate = $this->database->sslCertificates()->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
diff --git a/app/Actions/Database/StartMariadb.php b/app/Actions/Database/StartMariadb.php
index 87185d064..14df9b017 100644
--- a/app/Actions/Database/StartMariadb.php
+++ b/app/Actions/Database/StartMariadb.php
@@ -37,9 +37,7 @@ class StartMariadb
if (! $this->database->enable_ssl) {
$this->commands[] = "rm -rf $this->configuration_dir/ssl";
- SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->delete();
+ $this->database->sslCertificates()->delete();
$this->database->fileStorages()
->where('resource_type', $this->database->getMorphClass())
@@ -61,7 +59,7 @@ class StartMariadb
$server = $this->database->destination->server;
$caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
+ $this->ssl_certificate = $this->database->sslCertificates()->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
diff --git a/app/Actions/Database/StartMongodb.php b/app/Actions/Database/StartMongodb.php
index 250cb321d..3ea8287ac 100644
--- a/app/Actions/Database/StartMongodb.php
+++ b/app/Actions/Database/StartMongodb.php
@@ -42,9 +42,7 @@ class StartMongodb
if (! $this->database->enable_ssl) {
$this->commands[] = "rm -rf $this->configuration_dir/ssl";
- SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->delete();
+ $this->database->sslCertificates()->delete();
$this->database->fileStorages()
->where('resource_type', $this->database->getMorphClass())
@@ -65,7 +63,7 @@ class StartMongodb
$server = $this->database->destination->server;
$caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
+ $this->ssl_certificate = $this->database->sslCertificates()->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
diff --git a/app/Actions/Database/StartMysql.php b/app/Actions/Database/StartMysql.php
index 2a9e37f9c..a2e08c316 100644
--- a/app/Actions/Database/StartMysql.php
+++ b/app/Actions/Database/StartMysql.php
@@ -37,9 +37,7 @@ class StartMysql
if (! $this->database->enable_ssl) {
$this->commands[] = "rm -rf $this->configuration_dir/ssl";
- SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->delete();
+ $this->database->sslCertificates()->delete();
$this->database->fileStorages()
->where('resource_type', $this->database->getMorphClass())
@@ -61,7 +59,7 @@ class StartMysql
$server = $this->database->destination->server;
$caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
+ $this->ssl_certificate = $this->database->sslCertificates()->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
diff --git a/app/Actions/Database/StartPostgresql.php b/app/Actions/Database/StartPostgresql.php
index 8f4bcb0d9..97e565ec8 100644
--- a/app/Actions/Database/StartPostgresql.php
+++ b/app/Actions/Database/StartPostgresql.php
@@ -42,9 +42,7 @@ class StartPostgresql
if (! $this->database->enable_ssl) {
$this->commands[] = "rm -rf $this->configuration_dir/ssl";
- SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->delete();
+ $this->database->sslCertificates()->delete();
$this->database->fileStorages()
->where('resource_type', $this->database->getMorphClass())
@@ -66,7 +64,7 @@ class StartPostgresql
$server = $this->database->destination->server;
$caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
+ $this->ssl_certificate = $this->database->sslCertificates()->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
diff --git a/app/Actions/Database/StartRedis.php b/app/Actions/Database/StartRedis.php
index edc7e0cce..9e7a2a084 100644
--- a/app/Actions/Database/StartRedis.php
+++ b/app/Actions/Database/StartRedis.php
@@ -37,9 +37,7 @@ class StartRedis
if (! $this->database->enable_ssl) {
$this->commands[] = "rm -rf $this->configuration_dir/ssl";
- SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->delete();
+ $this->database->sslCertificates()->delete();
$this->database->fileStorages()
->where('resource_type', $this->database->getMorphClass())
->where('resource_id', $this->database->id)
@@ -60,7 +58,7 @@ class StartRedis
$server = $this->database->destination->server;
$caCert = SslCertificate::where('server_id', $server->id)->where('is_ca_certificate', true)->first();
- $this->ssl_certificate = SslCertificate::where('resource_type', $this->database->getMorphClass())->where('resource_id', $this->database->id)->first();
+ $this->ssl_certificate = $this->database->sslCertificates()->first();
if (! $this->ssl_certificate) {
$this->commands[] = "echo 'No SSL certificate found, generating new SSL certificate for this database.'";
diff --git a/app/Actions/Server/InstallDocker.php b/app/Actions/Server/InstallDocker.php
index bbb3ea066..5410b1cbd 100644
--- a/app/Actions/Server/InstallDocker.php
+++ b/app/Actions/Server/InstallDocker.php
@@ -25,7 +25,7 @@ class InstallDocker
commonName: 'Coolify CA Certificate',
serverId: $server->id,
isCaCertificate: true,
- validityDays: 15 * 365
+ validityDays: 10 * 365
);
$caCertPath = config('constants.coolify.base_config_path').'/ssl/';
diff --git a/app/Jobs/RegenerateSslCertJob.php b/app/Jobs/RegenerateSslCertJob.php
index 3e4bf9070..0570227b6 100644
--- a/app/Jobs/RegenerateSslCertJob.php
+++ b/app/Jobs/RegenerateSslCertJob.php
@@ -17,6 +17,10 @@ class RegenerateSslCertJob implements ShouldQueue
{
use Dispatchable, InteractsWithQueue, Queueable, SerializesModels;
+ public $tries = 3;
+
+ public $backoff = 60;
+
public function __construct(
protected ?Team $team = null,
protected ?int $server_id = null,
@@ -37,17 +41,13 @@ class RegenerateSslCertJob implements ShouldQueue
$query->where('is_ca_certificate', false);
- $certificates = $query->get();
-
- if ($certificates->isEmpty()) {
- return;
- }
-
$regenerated = collect();
- foreach ($certificates as $certificate) {
+ $query->cursor()->each(function ($certificate) use ($regenerated) {
try {
- $caCert = SslCertificate::where('server_id', $certificate->server_id)->where('is_ca_certificate', true)->first();
+ $caCert = SslCertificate::where('server_id', $certificate->server_id)
+ ->where('is_ca_certificate', true)
+ ->first();
SSLHelper::generateSslCertificate(
commonName: $certificate->common_name,
@@ -64,7 +64,7 @@ class RegenerateSslCertJob implements ShouldQueue
} catch (\Exception $e) {
Log::error('Failed to regenerate SSL certificate: '.$e->getMessage());
}
- }
+ });
if ($regenerated->isNotEmpty()) {
$this->team?->notify(new SslExpirationNotification($regenerated));
diff --git a/app/Livewire/Project/Database/Dragonfly/General.php b/app/Livewire/Project/Database/Dragonfly/General.php
index bd04e4d38..51f8b5a66 100644
--- a/app/Livewire/Project/Database/Dragonfly/General.php
+++ b/app/Livewire/Project/Database/Dragonfly/General.php
@@ -8,6 +8,7 @@ use App\Helpers\SslHelper;
use App\Models\Server;
use App\Models\SslCertificate;
use App\Models\StandaloneDragonfly;
+use Carbon\Carbon;
use Exception;
use Illuminate\Support\Facades\Auth;
use Livewire\Attributes\Validate;
@@ -52,7 +53,7 @@ class General extends Component
#[Validate(['nullable', 'boolean'])]
public bool $isLogDrainEnabled = false;
- public $certificateValidUntil = null;
+ public ?Carbon $certificateValidUntil = null;
#[Validate(['nullable', 'boolean'])]
public bool $enable_ssl = false;
@@ -72,9 +73,7 @@ class General extends Component
$this->syncData();
$this->server = data_get($this->database, 'destination.server');
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if ($existingCert) {
$this->certificateValidUntil = $existingCert->valid_until;
@@ -205,10 +204,7 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->where('server_id', $this->server->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if (! $existingCert) {
$this->dispatch('error', 'No existing SSL certificate found for this database.');
diff --git a/app/Livewire/Project/Database/Keydb/General.php b/app/Livewire/Project/Database/Keydb/General.php
index fd7737343..213b0d2d3 100644
--- a/app/Livewire/Project/Database/Keydb/General.php
+++ b/app/Livewire/Project/Database/Keydb/General.php
@@ -8,6 +8,7 @@ use App\Helpers\SslHelper;
use App\Models\Server;
use App\Models\SslCertificate;
use App\Models\StandaloneKeydb;
+use Carbon\Carbon;
use Exception;
use Illuminate\Support\Facades\Auth;
use Livewire\Attributes\Validate;
@@ -55,7 +56,7 @@ class General extends Component
#[Validate(['nullable', 'boolean'])]
public bool $isLogDrainEnabled = false;
- public $certificateValidUntil = null;
+ public ?Carbon $certificateValidUntil = null;
#[Validate(['boolean'])]
public bool $enable_ssl = false;
@@ -75,9 +76,7 @@ class General extends Component
$this->syncData();
$this->server = data_get($this->database, 'destination.server');
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if ($existingCert) {
$this->certificateValidUntil = $existingCert->valid_until;
@@ -210,10 +209,7 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->where('server_id', $this->server->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if (! $existingCert) {
$this->dispatch('error', 'No existing SSL certificate found for this database.');
diff --git a/app/Livewire/Project/Database/Mariadb/General.php b/app/Livewire/Project/Database/Mariadb/General.php
index a963e0ca3..b0c4f5d3e 100644
--- a/app/Livewire/Project/Database/Mariadb/General.php
+++ b/app/Livewire/Project/Database/Mariadb/General.php
@@ -8,6 +8,7 @@ use App\Helpers\SslHelper;
use App\Models\Server;
use App\Models\SslCertificate;
use App\Models\StandaloneMariadb;
+use Carbon\Carbon;
use Exception;
use Livewire\Component;
@@ -23,7 +24,7 @@ class General extends Component
public ?string $db_url_public = null;
- public $certificateValidUntil = null;
+ public ?Carbon $certificateValidUntil = null;
protected $rules = [
'database.name' => 'required',
@@ -64,9 +65,7 @@ class General extends Component
$this->db_url_public = $this->database->external_db_url;
$this->server = data_get($this->database, 'destination.server');
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if ($existingCert) {
$this->certificateValidUntil = $existingCert->valid_until;
@@ -155,10 +154,7 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->where('server_id', $this->server->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if (! $existingCert) {
$this->dispatch('error', 'No existing SSL certificate found for this database.');
diff --git a/app/Livewire/Project/Database/Mongodb/General.php b/app/Livewire/Project/Database/Mongodb/General.php
index 526aae9ea..28be1c69d 100644
--- a/app/Livewire/Project/Database/Mongodb/General.php
+++ b/app/Livewire/Project/Database/Mongodb/General.php
@@ -8,6 +8,7 @@ use App\Helpers\SslHelper;
use App\Models\Server;
use App\Models\SslCertificate;
use App\Models\StandaloneMongodb;
+use Carbon\Carbon;
use Exception;
use Livewire\Component;
@@ -23,7 +24,7 @@ class General extends Component
public ?string $db_url_public = null;
- public $certificateValidUntil = null;
+ public ?Carbon $certificateValidUntil = null;
protected $rules = [
'database.name' => 'required',
@@ -64,9 +65,7 @@ class General extends Component
$this->db_url_public = $this->database->external_db_url;
$this->server = data_get($this->database, 'destination.server');
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if ($existingCert) {
$this->certificateValidUntil = $existingCert->valid_until;
@@ -159,10 +158,7 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->where('server_id', $this->server->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if (! $existingCert) {
$this->dispatch('error', 'No existing SSL certificate found for this database.');
diff --git a/app/Livewire/Project/Database/Mysql/General.php b/app/Livewire/Project/Database/Mysql/General.php
index ad19db2a3..3e164d885 100644
--- a/app/Livewire/Project/Database/Mysql/General.php
+++ b/app/Livewire/Project/Database/Mysql/General.php
@@ -8,6 +8,7 @@ use App\Helpers\SslHelper;
use App\Models\Server;
use App\Models\SslCertificate;
use App\Models\StandaloneMysql;
+use Carbon\Carbon;
use Exception;
use Livewire\Component;
@@ -23,7 +24,7 @@ class General extends Component
public ?string $db_url_public = null;
- public $certificateValidUntil = null;
+ public ?Carbon $certificateValidUntil = null;
protected $rules = [
'database.name' => 'required',
@@ -66,9 +67,7 @@ class General extends Component
$this->db_url_public = $this->database->external_db_url;
$this->server = data_get($this->database, 'destination.server');
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if ($existingCert) {
$this->certificateValidUntil = $existingCert->valid_until;
@@ -158,10 +157,7 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->where('server_id', $this->server->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if (! $existingCert) {
$this->dispatch('error', 'No existing SSL certificate found for this database.');
diff --git a/app/Livewire/Project/Database/Postgresql/General.php b/app/Livewire/Project/Database/Postgresql/General.php
index f5ea25865..881c74d53 100644
--- a/app/Livewire/Project/Database/Postgresql/General.php
+++ b/app/Livewire/Project/Database/Postgresql/General.php
@@ -8,6 +8,7 @@ use App\Helpers\SslHelper;
use App\Models\Server;
use App\Models\SslCertificate;
use App\Models\StandalonePostgresql;
+use Carbon\Carbon;
use Exception;
use Livewire\Component;
@@ -25,7 +26,7 @@ class General extends Component
public ?string $db_url_public = null;
- public $certificateValidUntil = null;
+ public ?Carbon $certificateValidUntil = null;
public function getListeners()
{
@@ -81,9 +82,7 @@ class General extends Component
$this->db_url_public = $this->database->external_db_url;
$this->server = data_get($this->database, 'destination.server');
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if ($existingCert) {
$this->certificateValidUntil = $existingCert->valid_until;
@@ -122,10 +121,7 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->where('server_id', $this->server->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if (! $existingCert) {
$this->dispatch('error', 'No existing SSL certificate found for this database.');
diff --git a/app/Livewire/Project/Database/Redis/General.php b/app/Livewire/Project/Database/Redis/General.php
index ea896e294..a3916277d 100644
--- a/app/Livewire/Project/Database/Redis/General.php
+++ b/app/Livewire/Project/Database/Redis/General.php
@@ -8,6 +8,7 @@ use App\Helpers\SslHelper;
use App\Models\Server;
use App\Models\SslCertificate;
use App\Models\StandaloneRedis;
+use Carbon\Carbon;
use Exception;
use Livewire\Component;
@@ -32,7 +33,7 @@ class General extends Component
public ?string $db_url_public = null;
- public $certificateValidUntil = null;
+ public ?Carbon $certificateValidUntil = null;
protected $rules = [
'database.name' => 'required',
@@ -67,9 +68,7 @@ class General extends Component
{
$this->server = data_get($this->database, 'destination.server');
$this->refreshView();
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if ($existingCert) {
$this->certificateValidUntil = $existingCert->valid_until;
@@ -163,10 +162,7 @@ class General extends Component
public function regenerateSslCertificate()
{
try {
- $existingCert = SslCertificate::where('resource_type', $this->database->getMorphClass())
- ->where('resource_id', $this->database->id)
- ->where('server_id', $this->server->id)
- ->first();
+ $existingCert = $this->database->sslCertificates()->first();
if (! $existingCert) {
$this->dispatch('error', 'No existing SSL certificate found for this database.');
diff --git a/app/Livewire/Server/Advanced.php b/app/Livewire/Server/Advanced.php
index 497ec697e..b2b8b1518 100644
--- a/app/Livewire/Server/Advanced.php
+++ b/app/Livewire/Server/Advanced.php
@@ -6,6 +6,7 @@ use App\Helpers\SslHelper;
use App\Jobs\RegenerateSslCertJob;
use App\Models\Server;
use App\Models\SslCertificate;
+use Carbon\Carbon;
use Livewire\Attributes\Validate;
use Livewire\Component;
@@ -19,7 +20,7 @@ class Advanced extends Component
public $certificateContent = '';
- public $certificateValidUntil = null;
+ public ?Carbon $certificateValidUntil = null;
public array $parameters = [];
@@ -99,7 +100,7 @@ class Advanced extends Component
commonName: 'Coolify CA Certificate',
serverId: $this->server->id,
isCaCertificate: true,
- validityDays: 15 * 365
+ validityDays: 10 * 365
);
$this->loadCaCertificate();
diff --git a/app/Models/StandaloneClickhouse.php b/app/Models/StandaloneClickhouse.php
index 2f86c2060..bc1f9b4b3 100644
--- a/app/Models/StandaloneClickhouse.php
+++ b/app/Models/StandaloneClickhouse.php
@@ -223,7 +223,12 @@ class StandaloneClickhouse extends BaseModel
protected function internalDbUrl(): Attribute
{
return new Attribute(
- get: fn () => "clickhouse://{$this->clickhouse_admin_user}:{$this->clickhouse_admin_password}@{$this->uuid}:9000/{$this->clickhouse_db}",
+ get: function () {
+ $encodedUser = rawurlencode($this->clickhouse_admin_user);
+ $encodedPass = rawurlencode($this->clickhouse_admin_password);
+
+ return "clickhouse://{$encodedUser}:{$encodedPass}@{$this->uuid}:9000/{$this->clickhouse_db}";
+ },
);
}
@@ -232,7 +237,10 @@ class StandaloneClickhouse extends BaseModel
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
- return "clickhouse://{$this->clickhouse_admin_user}:{$this->clickhouse_admin_password}@{$this->destination->server->getIp}:{$this->public_port}/{$this->clickhouse_db}";
+ $encodedUser = rawurlencode($this->clickhouse_admin_user);
+ $encodedPass = rawurlencode($this->clickhouse_admin_password);
+
+ return "clickhouse://{$encodedUser}:{$encodedPass}@{$this->destination->server->getIp}:{$this->public_port}/{$this->clickhouse_db}";
}
return null;
diff --git a/app/Models/StandaloneDragonfly.php b/app/Models/StandaloneDragonfly.php
index 3aaedfc52..a14c5e378 100644
--- a/app/Models/StandaloneDragonfly.php
+++ b/app/Models/StandaloneDragonfly.php
@@ -226,7 +226,8 @@ class StandaloneDragonfly extends BaseModel
get: function () {
$scheme = $this->enable_ssl ? 'rediss' : 'redis';
$port = $this->enable_ssl ? 6380 : 6379;
- $url = "{$scheme}://:{$this->dragonfly_password}@{$this->uuid}:{$port}/0";
+ $encodedPass = rawurlencode($this->dragonfly_password);
+ $url = "{$scheme}://:{$encodedPass}@{$this->uuid}:{$port}/0";
if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
@@ -243,7 +244,8 @@ class StandaloneDragonfly extends BaseModel
get: function () {
if ($this->is_public && $this->public_port) {
$scheme = $this->enable_ssl ? 'rediss' : 'redis';
- $url = "{$scheme}://:{$this->dragonfly_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
+ $encodedPass = rawurlencode($this->dragonfly_password);
+ $url = "{$scheme}://:{$encodedPass}@{$this->destination->server->getIp}:{$this->public_port}/0";
if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
diff --git a/app/Models/StandaloneKeydb.php b/app/Models/StandaloneKeydb.php
index af95d58e5..2d3aea755 100644
--- a/app/Models/StandaloneKeydb.php
+++ b/app/Models/StandaloneKeydb.php
@@ -226,7 +226,8 @@ class StandaloneKeydb extends BaseModel
get: function () {
$scheme = $this->enable_ssl ? 'rediss' : 'redis';
$port = $this->enable_ssl ? 6380 : 6379;
- $url = "{$scheme}://:{$this->keydb_password}@{$this->uuid}:{$port}/0";
+ $encodedPass = rawurlencode($this->keydb_password);
+ $url = "{$scheme}://:{$encodedPass}@{$this->uuid}:{$port}/0";
if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
@@ -243,7 +244,8 @@ class StandaloneKeydb extends BaseModel
get: function () {
if ($this->is_public && $this->public_port) {
$scheme = $this->enable_ssl ? 'rediss' : 'redis';
- $url = "{$scheme}://:{$this->keydb_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
+ $encodedPass = rawurlencode($this->keydb_password);
+ $url = "{$scheme}://:{$encodedPass}@{$this->destination->server->getIp}:{$this->public_port}/0";
if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
diff --git a/app/Models/StandaloneMariadb.php b/app/Models/StandaloneMariadb.php
index 523fde3c5..7549ace3e 100644
--- a/app/Models/StandaloneMariadb.php
+++ b/app/Models/StandaloneMariadb.php
@@ -218,7 +218,12 @@ class StandaloneMariadb extends BaseModel
protected function internalDbUrl(): Attribute
{
return new Attribute(
- get: fn () => "mysql://{$this->mariadb_user}:{$this->mariadb_password}@{$this->uuid}:3306/{$this->mariadb_database}",
+ get: function () {
+ $encodedUser = rawurlencode($this->mariadb_user);
+ $encodedPass = rawurlencode($this->mariadb_password);
+
+ return "mysql://{$encodedUser}:{$encodedPass}@{$this->uuid}:3306/{$this->mariadb_database}";
+ },
);
}
@@ -227,7 +232,10 @@ class StandaloneMariadb extends BaseModel
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
- return "mysql://{$this->mariadb_user}:{$this->mariadb_password}@{$this->destination->server->getIp}:{$this->public_port}/{$this->mariadb_database}";
+ $encodedUser = rawurlencode($this->mariadb_user);
+ $encodedPass = rawurlencode($this->mariadb_password);
+
+ return "mysql://{$encodedUser}:{$encodedPass}@{$this->destination->server->getIp}:{$this->public_port}/{$this->mariadb_database}";
}
return null;
diff --git a/app/Models/StandaloneMongodb.php b/app/Models/StandaloneMongodb.php
index 0367b8650..1b181e7d5 100644
--- a/app/Models/StandaloneMongodb.php
+++ b/app/Models/StandaloneMongodb.php
@@ -244,13 +244,14 @@ class StandaloneMongodb extends BaseModel
{
return new Attribute(
get: function () {
- $url = "mongodb://{$this->mongo_initdb_root_username}:{$this->mongo_initdb_root_password}@{$this->uuid}:27017/?directConnection=true";
+ $encodedUser = rawurlencode($this->mongo_initdb_root_username);
+ $encodedPass = rawurlencode($this->mongo_initdb_root_password);
+ $url = "mongodb://{$encodedUser}:{$encodedPass}@{$this->uuid}:27017/?directConnection=true";
if ($this->enable_ssl) {
$url .= '&tls=true';
if (in_array($this->ssl_mode, ['verify-full'])) {
$url .= '&tlsCAFile=/etc/ssl/certs/coolify-ca.crt';
}
-
}
return $url;
@@ -263,7 +264,9 @@ class StandaloneMongodb extends BaseModel
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
- $url = "mongodb://{$this->mongo_initdb_root_username}:{$this->mongo_initdb_root_password}@{$this->destination->server->getIp}:{$this->public_port}/?directConnection=true";
+ $encodedUser = rawurlencode($this->mongo_initdb_root_username);
+ $encodedPass = rawurlencode($this->mongo_initdb_root_password);
+ $url = "mongodb://{$encodedUser}:{$encodedPass}@{$this->destination->server->getIp}:{$this->public_port}/?directConnection=true";
if ($this->enable_ssl) {
$url .= '&tls=true';
if (in_array($this->ssl_mode, ['verify-full'])) {
diff --git a/app/Models/StandaloneMysql.php b/app/Models/StandaloneMysql.php
index cf45df578..dbb5b1ae6 100644
--- a/app/Models/StandaloneMysql.php
+++ b/app/Models/StandaloneMysql.php
@@ -225,7 +225,9 @@ class StandaloneMysql extends BaseModel
{
return new Attribute(
get: function () {
- $url = "mysql://{$this->mysql_user}:{$this->mysql_password}@{$this->uuid}:3306/{$this->mysql_database}";
+ $encodedUser = rawurlencode($this->mysql_user);
+ $encodedPass = rawurlencode($this->mysql_password);
+ $url = "mysql://{$encodedUser}:{$encodedPass}@{$this->uuid}:3306/{$this->mysql_database}";
if ($this->enable_ssl) {
$url .= "?ssl-mode={$this->ssl_mode}";
if (in_array($this->ssl_mode, ['VERIFY_CA', 'VERIFY_IDENTITY'])) {
@@ -243,7 +245,9 @@ class StandaloneMysql extends BaseModel
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
- $url = "mysql://{$this->mysql_user}:{$this->mysql_password}@{$this->destination->server->getIp}:{$this->public_port}/{$this->mysql_database}";
+ $encodedUser = rawurlencode($this->mysql_user);
+ $encodedPass = rawurlencode($this->mysql_password);
+ $url = "mysql://{$encodedUser}:{$encodedPass}@{$this->destination->server->getIp}:{$this->public_port}/{$this->mysql_database}";
if ($this->enable_ssl) {
$url .= "?ssl-mode={$this->ssl_mode}";
if (in_array($this->ssl_mode, ['VERIFY_CA', 'VERIFY_IDENTITY'])) {
diff --git a/app/Models/StandalonePostgresql.php b/app/Models/StandalonePostgresql.php
index 51b9d2c31..a74d567a0 100644
--- a/app/Models/StandalonePostgresql.php
+++ b/app/Models/StandalonePostgresql.php
@@ -220,7 +220,9 @@ class StandalonePostgresql extends BaseModel
{
return new Attribute(
get: function () {
- $url = "postgres://{$this->postgres_user}:{$this->postgres_password}@{$this->uuid}:5432/{$this->postgres_db}";
+ $encodedUser = rawurlencode($this->postgres_user);
+ $encodedPass = rawurlencode($this->postgres_password);
+ $url = "postgres://{$encodedUser}:{$encodedPass}@{$this->uuid}:5432/{$this->postgres_db}";
if ($this->enable_ssl) {
$url .= "?sslmode={$this->ssl_mode}";
if (in_array($this->ssl_mode, ['verify-ca', 'verify-full'])) {
@@ -238,7 +240,9 @@ class StandalonePostgresql extends BaseModel
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
- $url = "postgres://{$this->postgres_user}:{$this->postgres_password}@{$this->destination->server->getIp}:{$this->public_port}/{$this->postgres_db}";
+ $encodedUser = rawurlencode($this->postgres_user);
+ $encodedPass = rawurlencode($this->postgres_password);
+ $url = "postgres://{$encodedUser}:{$encodedPass}@{$this->destination->server->getIp}:{$this->public_port}/{$this->postgres_db}";
if ($this->enable_ssl) {
$url .= "?sslmode={$this->ssl_mode}";
if (in_array($this->ssl_mode, ['verify-ca', 'verify-full'])) {
diff --git a/app/Models/StandaloneRedis.php b/app/Models/StandaloneRedis.php
index 2b565aa4f..b40d8bb9d 100644
--- a/app/Models/StandaloneRedis.php
+++ b/app/Models/StandaloneRedis.php
@@ -221,10 +221,11 @@ class StandaloneRedis extends BaseModel
return new Attribute(
get: function () {
$redis_version = $this->getRedisVersion();
- $username_part = version_compare($redis_version, '6.0', '>=') ? "{$this->redis_username}:" : '';
+ $username_part = version_compare($redis_version, '6.0', '>=') ? rawurlencode($this->redis_username).':' : '';
+ $encodedPass = rawurlencode($this->redis_password);
$scheme = $this->enable_ssl ? 'rediss' : 'redis';
$port = $this->enable_ssl ? 6380 : 6379;
- $url = "{$scheme}://{$username_part}{$this->redis_password}@{$this->uuid}:{$port}/0";
+ $url = "{$scheme}://{$username_part}{$encodedPass}@{$this->uuid}:{$port}/0";
if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
@@ -241,9 +242,10 @@ class StandaloneRedis extends BaseModel
get: function () {
if ($this->is_public && $this->public_port) {
$redis_version = $this->getRedisVersion();
- $username_part = version_compare($redis_version, '6.0', '>=') ? "{$this->redis_username}:" : '';
+ $username_part = version_compare($redis_version, '6.0', '>=') ? rawurlencode($this->redis_username).':' : '';
+ $encodedPass = rawurlencode($this->redis_password);
$scheme = $this->enable_ssl ? 'rediss' : 'redis';
- $url = "{$scheme}://{$username_part}{$this->redis_password}@{$this->destination->server->getIp}:{$this->public_port}/0";
+ $url = "{$scheme}://{$username_part}{$encodedPass}@{$this->destination->server->getIp}:{$this->public_port}/0";
if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
diff --git a/database/migrations/2025_01_30_125223_encrypt_local_file_volumes_fields.php b/database/migrations/2025_01_30_125223_encrypt_local_file_volumes_fields.php
index f29cdaa23..c6b4f8514 100644
--- a/database/migrations/2025_01_30_125223_encrypt_local_file_volumes_fields.php
+++ b/database/migrations/2025_01_30_125223_encrypt_local_file_volumes_fields.php
@@ -19,18 +19,21 @@ return new class extends Migration
});
if (DB::table('local_file_volumes')->exists()) {
- $volumes = DB::table('local_file_volumes')->get();
- foreach ($volumes as $volume) {
- try {
- DB::table('local_file_volumes')->where('id', $volume->id)->update([
- 'fs_path' => $volume->fs_path ? Crypt::encryptString($volume->fs_path) : null,
- 'mount_path' => $volume->mount_path ? Crypt::encryptString($volume->mount_path) : null,
- 'content' => $volume->content ? Crypt::encryptString($volume->content) : null,
- ]);
- } catch (\Exception $e) {
- Log::error('Error encrypting local file volume fields: '.$e->getMessage());
- }
- }
+ DB::table('local_file_volumes')
+ ->orderBy('id')
+ ->chunk(100, function ($volumes) {
+ foreach ($volumes as $volume) {
+ try {
+ DB::table('local_file_volumes')->where('id', $volume->id)->update([
+ 'fs_path' => $volume->fs_path ? Crypt::encryptString($volume->fs_path) : null,
+ 'mount_path' => $volume->mount_path ? Crypt::encryptString($volume->mount_path) : null,
+ 'content' => $volume->content ? Crypt::encryptString($volume->content) : null,
+ ]);
+ } catch (\Exception $e) {
+ Log::error('Error encrypting local file volume fields: '.$e->getMessage());
+ }
+ }
+ });
}
}
@@ -46,18 +49,21 @@ return new class extends Migration
});
if (DB::table('local_file_volumes')->exists()) {
- $volumes = DB::table('local_file_volumes')->get();
- foreach ($volumes as $volume) {
- try {
- DB::table('local_file_volumes')->where('id', $volume->id)->update([
- 'fs_path' => $volume->fs_path ? Crypt::decryptString($volume->fs_path) : null,
- 'mount_path' => $volume->mount_path ? Crypt::decryptString($volume->mount_path) : null,
- 'content' => $volume->content ? Crypt::decryptString($volume->content) : null,
- ]);
- } catch (\Exception $e) {
- Log::error('Error decrypting local file volume fields: '.$e->getMessage());
- }
- }
+ DB::table('local_file_volumes')
+ ->orderBy('id')
+ ->chunk(100, function ($volumes) {
+ foreach ($volumes as $volume) {
+ try {
+ DB::table('local_file_volumes')->where('id', $volume->id)->update([
+ 'fs_path' => $volume->fs_path ? Crypt::decryptString($volume->fs_path) : null,
+ 'mount_path' => $volume->mount_path ? Crypt::decryptString($volume->mount_path) : null,
+ 'content' => $volume->content ? Crypt::decryptString($volume->content) : null,
+ ]);
+ } catch (\Exception $e) {
+ Log::error('Error decrypting local file volume fields: '.$e->getMessage());
+ }
+ }
+ });
}
}
};
diff --git a/database/seeders/CaSslCertSeeder.php b/database/seeders/CaSslCertSeeder.php
index b869ff96a..09f6cc984 100644
--- a/database/seeders/CaSslCertSeeder.php
+++ b/database/seeders/CaSslCertSeeder.php
@@ -20,7 +20,7 @@ class CaSslCertSeeder extends Seeder
commonName: 'Coolify CA Certificate',
serverId: $server->id,
isCaCertificate: true,
- validityDays: 15 * 365
+ validityDays: 10 * 365
);
} else {
$caCert = $existingCaCert;
From 2df6b344d47680da187bba455ade42f4a22f1c5d Mon Sep 17 00:00:00 2001
From: Manish Gupta <59428681+mguptahub@users.noreply.github.com>
Date: Tue, 25 Feb 2025 14:32:13 +0530
Subject: [PATCH 095/145] updated plane version to v0.25.0
---
templates/compose/plane.yaml | 20 ++++++++++----------
1 file changed, 10 insertions(+), 10 deletions(-)
diff --git a/templates/compose/plane.yaml b/templates/compose/plane.yaml
index d1fcf78fa..c90e15a1a 100644
--- a/templates/compose/plane.yaml
+++ b/templates/compose/plane.yaml
@@ -5,7 +5,7 @@
x-app-env: &app-env
environment:
- - APP_RELEASE=${APP_RELEASE:-v0.24.1}
+ - APP_RELEASE=${APP_RELEASE:-v0.25.0}
- WEB_URL=${SERVICE_FQDN_PLANE}
- DEBUG=${DEBUG:-0}
- CORS_ALLOWED_ORIGINS=${CORS_ALLOWED_ORIGIN:-http://localhost}
@@ -55,7 +55,7 @@ services:
- SERVICE_FQDN_PLANE
- FILE_SIZE_LIMIT=${FILE_SIZE_LIMIT:-5242880}
- BUCKET_NAME=${BUCKET_NAME:-uploads}
- image: makeplane/plane-proxy:${APP_RELEASE:-v0.24.1}
+ image: makeplane/plane-proxy:${APP_RELEASE:-v0.25.0}
depends_on:
- web
- api
@@ -67,7 +67,7 @@ services:
retries: 15
web:
- image: makeplane/plane-frontend:${APP_RELEASE:-v0.24.1}
+ image: makeplane/plane-frontend:${APP_RELEASE:-v0.25.0}
command: node web/server.js web
depends_on:
- api
@@ -78,7 +78,7 @@ services:
timeout: 10s
retries: 15
space:
- image: makeplane/plane-space:${APP_RELEASE:-v0.24.1}
+ image: makeplane/plane-space:${APP_RELEASE:-v0.25.0}
command: node space/server.js space
depends_on:
- api
@@ -91,7 +91,7 @@ services:
retries: 15
admin:
- image: makeplane/plane-admin:${APP_RELEASE:-v0.24.1}
+ image: makeplane/plane-admin:${APP_RELEASE:-v0.25.0}
command: node admin/server.js admin
depends_on:
- api
@@ -104,7 +104,7 @@ services:
live:
<<: *app-env
- image: makeplane/plane-live:${APP_RELEASE:-v0.24.1}
+ image: makeplane/plane-live:${APP_RELEASE:-v0.25.0}
command: node live/dist/server.js live
depends_on:
- api
@@ -117,7 +117,7 @@ services:
api:
<<: *app-env
- image: makeplane/plane-backend:${APP_RELEASE:-v0.24.1}
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.25.0}
command: ./bin/docker-entrypoint-api.sh
volumes:
- logs_api:/code/plane/logs
@@ -132,7 +132,7 @@ services:
worker:
<<: *app-env
- image: makeplane/plane-backend:${APP_RELEASE:-v0.24.1}
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.25.0}
command: ./bin/docker-entrypoint-worker.sh
volumes:
- logs_worker:/code/plane/logs
@@ -148,7 +148,7 @@ services:
beat-worker:
<<: *app-env
- image: makeplane/plane-backend:${APP_RELEASE:-v0.24.1}
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.25.0}
command: ./bin/docker-entrypoint-beat.sh
volumes:
- logs_beat-worker:/code/plane/logs
@@ -164,7 +164,7 @@ services:
migrator:
<<: *app-env
- image: makeplane/plane-backend:${APP_RELEASE:-v0.24.1}
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.25.0}
restart: "no"
command: ./bin/docker-entrypoint-migrator.sh
volumes:
From 37553e79b7a3f8bb72f42efee410213ad08d3f52 Mon Sep 17 00:00:00 2001
From: janwiebe-jump <64576907+janwiebe-jump@users.noreply.github.com>
Date: Thu, 27 Feb 2025 17:25:33 +0100
Subject: [PATCH 096/145] Gitea webhook sends action synchronized
---
app/Http/Controllers/Webhook/Gitea.php | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/app/Http/Controllers/Webhook/Gitea.php b/app/Http/Controllers/Webhook/Gitea.php
index cc53f2034..b5ad5607e 100644
--- a/app/Http/Controllers/Webhook/Gitea.php
+++ b/app/Http/Controllers/Webhook/Gitea.php
@@ -152,7 +152,7 @@ class Gitea extends Controller
}
}
if ($x_gitea_event === 'pull_request') {
- if ($action === 'opened' || $action === 'synchronize' || $action === 'reopened') {
+ if ($action === 'opened' || $action === 'synchronized' || $action === 'reopened') {
if ($application->isPRDeployable()) {
$deployment_uuid = new Cuid2;
$found = ApplicationPreview::where('application_id', $application->id)->where('pull_request_id', $pull_request_id)->first();
From e3b419257d1b5733ead1204647ea08d335f3f767 Mon Sep 17 00:00:00 2001
From: think <31487797+ThinkFar@users.noreply.github.com>
Date: Sun, 2 Mar 2025 22:23:02 -0700
Subject: [PATCH 097/145] fix(ui): Correct grammatical error in 404 page
---
resources/views/errors/404.blade.php | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/resources/views/errors/404.blade.php b/resources/views/errors/404.blade.php
index 3b84bafd8..569488d19 100644
--- a/resources/views/errors/404.blade.php
+++ b/resources/views/errors/404.blade.php
@@ -2,7 +2,7 @@
404
-
How did you got here?
+
How did you get here?
Sorry, we couldn’t find the page you’re looking
for.
From 1ef84f973634cecf3b619b4706adb39c1e1dd1d3 Mon Sep 17 00:00:00 2001
From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com>
Date: Wed, 5 Mar 2025 23:47:08 +0000
Subject: [PATCH 098/145] chore(deps): bump laravel/framework from 11.44.0 to
11.44.1
Bumps [laravel/framework](https://github.com/laravel/framework) from 11.44.0 to 11.44.1.
- [Release notes](https://github.com/laravel/framework/releases)
- [Changelog](https://github.com/laravel/framework/blob/12.x/CHANGELOG.md)
- [Commits](https://github.com/laravel/framework/compare/v11.44.0...v11.44.1)
---
updated-dependencies:
- dependency-name: laravel/framework
dependency-type: direct:production
...
Signed-off-by: dependabot[bot]
---
composer.lock | 145 +++++++++++++++++++++++---------------------------
1 file changed, 66 insertions(+), 79 deletions(-)
diff --git a/composer.lock b/composer.lock
index 65271cb1a..d070b919f 100644
--- a/composer.lock
+++ b/composer.lock
@@ -1079,16 +1079,16 @@
},
{
"name": "brick/math",
- "version": "0.12.1",
+ "version": "0.12.3",
"source": {
"type": "git",
"url": "https://github.com/brick/math.git",
- "reference": "f510c0a40911935b77b86859eb5223d58d660df1"
+ "reference": "866551da34e9a618e64a819ee1e01c20d8a588ba"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/brick/math/zipball/f510c0a40911935b77b86859eb5223d58d660df1",
- "reference": "f510c0a40911935b77b86859eb5223d58d660df1",
+ "url": "https://api.github.com/repos/brick/math/zipball/866551da34e9a618e64a819ee1e01c20d8a588ba",
+ "reference": "866551da34e9a618e64a819ee1e01c20d8a588ba",
"shasum": ""
},
"require": {
@@ -1097,7 +1097,7 @@
"require-dev": {
"php-coveralls/php-coveralls": "^2.2",
"phpunit/phpunit": "^10.1",
- "vimeo/psalm": "5.16.0"
+ "vimeo/psalm": "6.8.8"
},
"type": "library",
"autoload": {
@@ -1127,7 +1127,7 @@
],
"support": {
"issues": "https://github.com/brick/math/issues",
- "source": "https://github.com/brick/math/tree/0.12.1"
+ "source": "https://github.com/brick/math/tree/0.12.3"
},
"funding": [
{
@@ -1135,7 +1135,7 @@
"type": "github"
}
],
- "time": "2023-11-29T23:19:16+00:00"
+ "time": "2025-02-28T13:11:00+00:00"
},
{
"name": "carbonphp/carbon-doctrine-types",
@@ -2732,16 +2732,16 @@
},
{
"name": "laravel/framework",
- "version": "v11.44.0",
+ "version": "v11.44.1",
"source": {
"type": "git",
"url": "https://github.com/laravel/framework.git",
- "reference": "e9a33da34815ac1ed46c7e4c477a775f4592f0a7"
+ "reference": "0883d4175f4e2b5c299e7087ad3c74f2ce195c6d"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/laravel/framework/zipball/e9a33da34815ac1ed46c7e4c477a775f4592f0a7",
- "reference": "e9a33da34815ac1ed46c7e4c477a775f4592f0a7",
+ "url": "https://api.github.com/repos/laravel/framework/zipball/0883d4175f4e2b5c299e7087ad3c74f2ce195c6d",
+ "reference": "0883d4175f4e2b5c299e7087ad3c74f2ce195c6d",
"shasum": ""
},
"require": {
@@ -2849,7 +2849,7 @@
"league/flysystem-read-only": "^3.25.1",
"league/flysystem-sftp-v3": "^3.25.1",
"mockery/mockery": "^1.6.10",
- "orchestra/testbench-core": "^9.9.4",
+ "orchestra/testbench-core": "^9.11.2",
"pda/pheanstalk": "^5.0.6",
"php-http/discovery": "^1.15",
"phpstan/phpstan": "^2.0",
@@ -2943,7 +2943,7 @@
"issues": "https://github.com/laravel/framework/issues",
"source": "https://github.com/laravel/framework"
},
- "time": "2025-02-24T13:08:54+00:00"
+ "time": "2025-03-05T15:34:10+00:00"
},
{
"name": "laravel/horizon",
@@ -6944,16 +6944,16 @@
},
{
"name": "ramsey/collection",
- "version": "2.0.0",
+ "version": "2.1.0",
"source": {
"type": "git",
"url": "https://github.com/ramsey/collection.git",
- "reference": "a4b48764bfbb8f3a6a4d1aeb1a35bb5e9ecac4a5"
+ "reference": "3c5990b8a5e0b79cd1cf11c2dc1229e58e93f109"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/ramsey/collection/zipball/a4b48764bfbb8f3a6a4d1aeb1a35bb5e9ecac4a5",
- "reference": "a4b48764bfbb8f3a6a4d1aeb1a35bb5e9ecac4a5",
+ "url": "https://api.github.com/repos/ramsey/collection/zipball/3c5990b8a5e0b79cd1cf11c2dc1229e58e93f109",
+ "reference": "3c5990b8a5e0b79cd1cf11c2dc1229e58e93f109",
"shasum": ""
},
"require": {
@@ -6961,25 +6961,22 @@
},
"require-dev": {
"captainhook/plugin-composer": "^5.3",
- "ergebnis/composer-normalize": "^2.28.3",
- "fakerphp/faker": "^1.21",
+ "ergebnis/composer-normalize": "^2.45",
+ "fakerphp/faker": "^1.24",
"hamcrest/hamcrest-php": "^2.0",
- "jangregor/phpstan-prophecy": "^1.0",
- "mockery/mockery": "^1.5",
+ "jangregor/phpstan-prophecy": "^2.1",
+ "mockery/mockery": "^1.6",
"php-parallel-lint/php-console-highlighter": "^1.0",
- "php-parallel-lint/php-parallel-lint": "^1.3",
- "phpcsstandards/phpcsutils": "^1.0.0-rc1",
- "phpspec/prophecy-phpunit": "^2.0",
- "phpstan/extension-installer": "^1.2",
- "phpstan/phpstan": "^1.9",
- "phpstan/phpstan-mockery": "^1.1",
- "phpstan/phpstan-phpunit": "^1.3",
- "phpunit/phpunit": "^9.5",
- "psalm/plugin-mockery": "^1.1",
- "psalm/plugin-phpunit": "^0.18.4",
- "ramsey/coding-standard": "^2.0.3",
- "ramsey/conventional-commits": "^1.3",
- "vimeo/psalm": "^5.4"
+ "php-parallel-lint/php-parallel-lint": "^1.4",
+ "phpspec/prophecy-phpunit": "^2.3",
+ "phpstan/extension-installer": "^1.4",
+ "phpstan/phpstan": "^2.1",
+ "phpstan/phpstan-mockery": "^2.0",
+ "phpstan/phpstan-phpunit": "^2.0",
+ "phpunit/phpunit": "^10.5",
+ "ramsey/coding-standard": "^2.3",
+ "ramsey/conventional-commits": "^1.6",
+ "roave/security-advisories": "dev-latest"
},
"type": "library",
"extra": {
@@ -7017,19 +7014,9 @@
],
"support": {
"issues": "https://github.com/ramsey/collection/issues",
- "source": "https://github.com/ramsey/collection/tree/2.0.0"
+ "source": "https://github.com/ramsey/collection/tree/2.1.0"
},
- "funding": [
- {
- "url": "https://github.com/ramsey",
- "type": "github"
- },
- {
- "url": "https://tidelift.com/funding/github/packagist/ramsey/collection",
- "type": "tidelift"
- }
- ],
- "time": "2022-12-31T21:50:55+00:00"
+ "time": "2025-03-02T04:48:29+00:00"
},
{
"name": "ramsey/uuid",
@@ -8887,16 +8874,16 @@
},
{
"name": "symfony/error-handler",
- "version": "v7.2.3",
+ "version": "v7.2.4",
"source": {
"type": "git",
"url": "https://github.com/symfony/error-handler.git",
- "reference": "959a74d044a6db21f4caa6d695648dcb5584cb49"
+ "reference": "aabf79938aa795350c07ce6464dd1985607d95d5"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/symfony/error-handler/zipball/959a74d044a6db21f4caa6d695648dcb5584cb49",
- "reference": "959a74d044a6db21f4caa6d695648dcb5584cb49",
+ "url": "https://api.github.com/repos/symfony/error-handler/zipball/aabf79938aa795350c07ce6464dd1985607d95d5",
+ "reference": "aabf79938aa795350c07ce6464dd1985607d95d5",
"shasum": ""
},
"require": {
@@ -8942,7 +8929,7 @@
"description": "Provides tools to manage errors and ease debugging PHP code",
"homepage": "https://symfony.com",
"support": {
- "source": "https://github.com/symfony/error-handler/tree/v7.2.3"
+ "source": "https://github.com/symfony/error-handler/tree/v7.2.4"
},
"funding": [
{
@@ -8958,7 +8945,7 @@
"type": "tidelift"
}
],
- "time": "2025-01-07T09:39:55+00:00"
+ "time": "2025-02-02T20:27:07+00:00"
},
{
"name": "symfony/event-dispatcher",
@@ -9260,16 +9247,16 @@
},
{
"name": "symfony/http-kernel",
- "version": "v7.2.3",
+ "version": "v7.2.4",
"source": {
"type": "git",
"url": "https://github.com/symfony/http-kernel.git",
- "reference": "caae9807f8e25a9b43ce8cc6fafab6cf91f0cc9b"
+ "reference": "9f1103734c5789798fefb90e91de4586039003ed"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/symfony/http-kernel/zipball/caae9807f8e25a9b43ce8cc6fafab6cf91f0cc9b",
- "reference": "caae9807f8e25a9b43ce8cc6fafab6cf91f0cc9b",
+ "url": "https://api.github.com/repos/symfony/http-kernel/zipball/9f1103734c5789798fefb90e91de4586039003ed",
+ "reference": "9f1103734c5789798fefb90e91de4586039003ed",
"shasum": ""
},
"require": {
@@ -9354,7 +9341,7 @@
"description": "Provides a structured process for converting a Request into a Response",
"homepage": "https://symfony.com",
"support": {
- "source": "https://github.com/symfony/http-kernel/tree/v7.2.3"
+ "source": "https://github.com/symfony/http-kernel/tree/v7.2.4"
},
"funding": [
{
@@ -9370,7 +9357,7 @@
"type": "tidelift"
}
],
- "time": "2025-01-29T07:40:13+00:00"
+ "time": "2025-02-26T11:01:22+00:00"
},
{
"name": "symfony/mailer",
@@ -9454,16 +9441,16 @@
},
{
"name": "symfony/mime",
- "version": "v7.2.3",
+ "version": "v7.2.4",
"source": {
"type": "git",
"url": "https://github.com/symfony/mime.git",
- "reference": "2fc3b4bd67e4747e45195bc4c98bea4628476204"
+ "reference": "87ca22046b78c3feaff04b337f33b38510fd686b"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/symfony/mime/zipball/2fc3b4bd67e4747e45195bc4c98bea4628476204",
- "reference": "2fc3b4bd67e4747e45195bc4c98bea4628476204",
+ "url": "https://api.github.com/repos/symfony/mime/zipball/87ca22046b78c3feaff04b337f33b38510fd686b",
+ "reference": "87ca22046b78c3feaff04b337f33b38510fd686b",
"shasum": ""
},
"require": {
@@ -9518,7 +9505,7 @@
"mime-type"
],
"support": {
- "source": "https://github.com/symfony/mime/tree/v7.2.3"
+ "source": "https://github.com/symfony/mime/tree/v7.2.4"
},
"funding": [
{
@@ -9534,7 +9521,7 @@
"type": "tidelift"
}
],
- "time": "2025-01-27T11:08:17+00:00"
+ "time": "2025-02-19T08:51:20+00:00"
},
{
"name": "symfony/options-resolver",
@@ -10321,16 +10308,16 @@
},
{
"name": "symfony/process",
- "version": "v7.2.0",
+ "version": "v7.2.4",
"source": {
"type": "git",
"url": "https://github.com/symfony/process.git",
- "reference": "d34b22ba9390ec19d2dd966c40aa9e8462f27a7e"
+ "reference": "d8f411ff3c7ddc4ae9166fb388d1190a2df5b5cf"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/symfony/process/zipball/d34b22ba9390ec19d2dd966c40aa9e8462f27a7e",
- "reference": "d34b22ba9390ec19d2dd966c40aa9e8462f27a7e",
+ "url": "https://api.github.com/repos/symfony/process/zipball/d8f411ff3c7ddc4ae9166fb388d1190a2df5b5cf",
+ "reference": "d8f411ff3c7ddc4ae9166fb388d1190a2df5b5cf",
"shasum": ""
},
"require": {
@@ -10362,7 +10349,7 @@
"description": "Executes commands in sub-processes",
"homepage": "https://symfony.com",
"support": {
- "source": "https://github.com/symfony/process/tree/v7.2.0"
+ "source": "https://github.com/symfony/process/tree/v7.2.4"
},
"funding": [
{
@@ -10378,7 +10365,7 @@
"type": "tidelift"
}
],
- "time": "2024-11-06T14:24:19+00:00"
+ "time": "2025-02-05T08:33:46+00:00"
},
{
"name": "symfony/psr-http-message-bridge",
@@ -10778,16 +10765,16 @@
},
{
"name": "symfony/translation",
- "version": "v7.2.2",
+ "version": "v7.2.4",
"source": {
"type": "git",
"url": "https://github.com/symfony/translation.git",
- "reference": "e2674a30132b7cc4d74540d6c2573aa363f05923"
+ "reference": "283856e6981286cc0d800b53bd5703e8e363f05a"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/symfony/translation/zipball/e2674a30132b7cc4d74540d6c2573aa363f05923",
- "reference": "e2674a30132b7cc4d74540d6c2573aa363f05923",
+ "url": "https://api.github.com/repos/symfony/translation/zipball/283856e6981286cc0d800b53bd5703e8e363f05a",
+ "reference": "283856e6981286cc0d800b53bd5703e8e363f05a",
"shasum": ""
},
"require": {
@@ -10853,7 +10840,7 @@
"description": "Provides tools to internationalize your application",
"homepage": "https://symfony.com",
"support": {
- "source": "https://github.com/symfony/translation/tree/v7.2.2"
+ "source": "https://github.com/symfony/translation/tree/v7.2.4"
},
"funding": [
{
@@ -10869,7 +10856,7 @@
"type": "tidelift"
}
],
- "time": "2024-12-07T08:18:10+00:00"
+ "time": "2025-02-13T10:27:23+00:00"
},
{
"name": "symfony/translation-contracts",
@@ -15569,12 +15556,12 @@
],
"aliases": [],
"minimum-stability": "stable",
- "stability-flags": {},
+ "stability-flags": [],
"prefer-stable": true,
"prefer-lowest": false,
"platform": {
"php": "^8.4"
},
- "platform-dev": {},
- "plugin-api-version": "2.6.0"
+ "platform-dev": [],
+ "plugin-api-version": "2.3.0"
}
From 291e7d0a9cc0524cc83de690dd0a9969bf1c518c Mon Sep 17 00:00:00 2001
From: Manish Gupta <59428681+mguptahub@users.noreply.github.com>
Date: Mon, 10 Mar 2025 11:04:28 +0530
Subject: [PATCH 099/145] updated version to v0.25.1
---
templates/compose/plane.yaml | 20 ++++++++++----------
1 file changed, 10 insertions(+), 10 deletions(-)
diff --git a/templates/compose/plane.yaml b/templates/compose/plane.yaml
index c90e15a1a..f765015da 100644
--- a/templates/compose/plane.yaml
+++ b/templates/compose/plane.yaml
@@ -5,7 +5,7 @@
x-app-env: &app-env
environment:
- - APP_RELEASE=${APP_RELEASE:-v0.25.0}
+ - APP_RELEASE=${APP_RELEASE:-v0.25.1}
- WEB_URL=${SERVICE_FQDN_PLANE}
- DEBUG=${DEBUG:-0}
- CORS_ALLOWED_ORIGINS=${CORS_ALLOWED_ORIGIN:-http://localhost}
@@ -55,7 +55,7 @@ services:
- SERVICE_FQDN_PLANE
- FILE_SIZE_LIMIT=${FILE_SIZE_LIMIT:-5242880}
- BUCKET_NAME=${BUCKET_NAME:-uploads}
- image: makeplane/plane-proxy:${APP_RELEASE:-v0.25.0}
+ image: makeplane/plane-proxy:${APP_RELEASE:-v0.25.1}
depends_on:
- web
- api
@@ -67,7 +67,7 @@ services:
retries: 15
web:
- image: makeplane/plane-frontend:${APP_RELEASE:-v0.25.0}
+ image: makeplane/plane-frontend:${APP_RELEASE:-v0.25.1}
command: node web/server.js web
depends_on:
- api
@@ -78,7 +78,7 @@ services:
timeout: 10s
retries: 15
space:
- image: makeplane/plane-space:${APP_RELEASE:-v0.25.0}
+ image: makeplane/plane-space:${APP_RELEASE:-v0.25.1}
command: node space/server.js space
depends_on:
- api
@@ -91,7 +91,7 @@ services:
retries: 15
admin:
- image: makeplane/plane-admin:${APP_RELEASE:-v0.25.0}
+ image: makeplane/plane-admin:${APP_RELEASE:-v0.25.1}
command: node admin/server.js admin
depends_on:
- api
@@ -104,7 +104,7 @@ services:
live:
<<: *app-env
- image: makeplane/plane-live:${APP_RELEASE:-v0.25.0}
+ image: makeplane/plane-live:${APP_RELEASE:-v0.25.1}
command: node live/dist/server.js live
depends_on:
- api
@@ -117,7 +117,7 @@ services:
api:
<<: *app-env
- image: makeplane/plane-backend:${APP_RELEASE:-v0.25.0}
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.25.1}
command: ./bin/docker-entrypoint-api.sh
volumes:
- logs_api:/code/plane/logs
@@ -132,7 +132,7 @@ services:
worker:
<<: *app-env
- image: makeplane/plane-backend:${APP_RELEASE:-v0.25.0}
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.25.1}
command: ./bin/docker-entrypoint-worker.sh
volumes:
- logs_worker:/code/plane/logs
@@ -148,7 +148,7 @@ services:
beat-worker:
<<: *app-env
- image: makeplane/plane-backend:${APP_RELEASE:-v0.25.0}
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.25.1}
command: ./bin/docker-entrypoint-beat.sh
volumes:
- logs_beat-worker:/code/plane/logs
@@ -164,7 +164,7 @@ services:
migrator:
<<: *app-env
- image: makeplane/plane-backend:${APP_RELEASE:-v0.25.0}
+ image: makeplane/plane-backend:${APP_RELEASE:-v0.25.1}
restart: "no"
command: ./bin/docker-entrypoint-migrator.sh
volumes:
From 1160b3312ec4827d329efc92a5d5550ddc60f1fb Mon Sep 17 00:00:00 2001
From: Andras Bacsai
Date: Tue, 11 Mar 2025 13:28:26 +0100
Subject: [PATCH 100/145] fix(seeder): Update GitHub app name in
GithubAppSeeder
---
database/seeders/GithubAppSeeder.php | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/database/seeders/GithubAppSeeder.php b/database/seeders/GithubAppSeeder.php
index 3cfb82e64..b34c00473 100644
--- a/database/seeders/GithubAppSeeder.php
+++ b/database/seeders/GithubAppSeeder.php
@@ -21,7 +21,7 @@ class GithubAppSeeder extends Seeder
'team_id' => 0,
]);
GithubApp::create([
- 'name' => 'coolify-laravel-development-public',
+ 'name' => 'coolify-laravel-dev-public',
'uuid' => '69420',
'organization' => 'coollabsio',
'api_url' => 'https://api.github.com',
From f73c74bd4409d94f5b07b25a93baaffabd0e21fa Mon Sep 17 00:00:00 2001
From: Andras Bacsai
Date: Tue, 11 Mar 2025 14:15:22 +0100
Subject: [PATCH 101/145] feat(github-source): Enhance GitHub App configuration
with manual and private key support
- Add support for manual GitHub App configuration
- Introduce private key selection for GitHub Apps
- Enable editing of previously disabled GitHub App fields
- Add error handling for permission checks
- Implement a manual GitHub App creation method
---
app/Livewire/Source/Github/Change.php | 24 +-
.../livewire/source/github/change.blade.php | 267 +++++++++---------
2 files changed, 162 insertions(+), 129 deletions(-)
diff --git a/app/Livewire/Source/Github/Change.php b/app/Livewire/Source/Github/Change.php
index 20f52c322..e73c9dc73 100644
--- a/app/Livewire/Source/Github/Change.php
+++ b/app/Livewire/Source/Github/Change.php
@@ -37,6 +37,8 @@ class Change extends Component
public $applications;
+ public $privateKeys;
+
protected $rules = [
'github_app.name' => 'required|string',
'github_app.organization' => 'nullable|string',
@@ -54,6 +56,7 @@ class Change extends Component
'github_app.metadata' => 'nullable|string',
'github_app.pull_requests' => 'nullable|string',
'github_app.administration' => 'nullable|string',
+ 'github_app.private_key_id' => 'required|int',
];
public function boot()
@@ -65,9 +68,13 @@ class Change extends Component
public function checkPermissions()
{
- GithubAppPermissionJob::dispatchSync($this->github_app);
- $this->github_app->refresh()->makeVisible('client_secret')->makeVisible('webhook_secret');
- $this->dispatch('success', 'Github App permissions updated.');
+ try {
+ GithubAppPermissionJob::dispatchSync($this->github_app);
+ $this->github_app->refresh()->makeVisible('client_secret')->makeVisible('webhook_secret');
+ $this->dispatch('success', 'Github App permissions updated.');
+ } catch (\Throwable $e) {
+ return handleError($e, $this);
+ }
}
// public function check()
@@ -109,6 +116,7 @@ class Change extends Component
$github_app_uuid = request()->github_app_uuid;
$this->github_app = GithubApp::ownedByCurrentTeam()->whereUuid($github_app_uuid)->firstOrFail();
$this->github_app->makeVisible(['client_secret', 'webhook_secret']);
+ $this->privateKeys = PrivateKey::ownedByCurrentTeam()->get();
$this->applications = $this->github_app->applications;
$settings = instanceSettings();
@@ -243,6 +251,7 @@ class Change extends Component
'github_app.client_secret' => 'required|string',
'github_app.webhook_secret' => 'required|string',
'github_app.is_system_wide' => 'required|bool',
+ 'github_app.private_key_id' => 'required|int',
]);
$this->github_app->save();
$this->dispatch('success', 'Github App updated.');
@@ -251,6 +260,15 @@ class Change extends Component
}
}
+ public function createGithubAppManually()
+ {
+ $this->github_app->makeVisible('client_secret')->makeVisible('webhook_secret');
+ $this->github_app->app_id = '1234567890';
+ $this->github_app->installation_id = '1234567890';
+ $this->github_app->save();
+ $this->dispatch('success', 'Github App updated.');
+ }
+
public function instantSave()
{
try {
diff --git a/resources/views/livewire/source/github/change.blade.php b/resources/views/livewire/source/github/change.blade.php
index 5a37fa47a..1b5493c58 100644
--- a/resources/views/livewire/source/github/change.blade.php
+++ b/resources/views/livewire/source/github/change.blade.php
@@ -27,6 +27,7 @@
confirmationText="{{ data_get($github_app, 'name') }}" :confirmWithPassword="false"
step2ButtonText="Permanently Delete" />
@endif
+
Your Private GitHub App for private repositories.
@@ -46,7 +47,7 @@
-
+
Sync Name
@@ -57,7 +58,7 @@
-
@if (!isCloud())
@@ -68,27 +69,32 @@
@endif
-
-
+
+
- @if ($github_app->html_url === 'https://github.com')
-
-
- @else
-
-
- @endif
+
+
-
+
+ required />
-
-
-
+
+
+
+
+
+
+ @if (blank($github_app->private_key_id))
+
+ @endif
+ @foreach ($privateKeys as $privateKey)
+
+ @endforeach
+
Permissions
@@ -182,120 +188,129 @@
shortConfirmationLabel="GitHub App Name" :confirmWithPassword="false" step2ButtonText="Permanently Delete" />
-
-
-
You must complete this step before you can use this source!
-
-
-
- @if (!isCloud() || isDev())
-
-
- @if ($ipv4)
-
- @endif
- @if ($ipv6)
-
- @endif
- @if ($fqdn)
-
- @endif
- @if (config('app.url'))
-
- @endif
-
-
- Register Now
-
-
- @else
-
-
Register a GitHub App
-
- Register Now
-
-
-
You need to register a GitHub App before using this source.
- @endif
+
+
Manual Installation
+
+ If you want to fill the form manually, you can continue below. Only for advanced users.
+
+ Continue
+
+
+
Automated Installation
+
+
+
You must complete this step before you can use this source!
+
+
+
+ @if (!isCloud() || isDev())
+
+
+ @if ($ipv4)
+
+ @endif
+ @if ($ipv6)
+
+ @endif
+ @if ($fqdn)
+
+ @endif
+ @if (config('app.url'))
+
+ @endif
+
+
+ Register Now
+
+
+ @else
+
+
Register a GitHub App
+
+ Register Now
+
+
+
You need to register a GitHub App before using this source.
+ @endif
-
-
-
- {{--
+
+
+ {{-- --}}
+
-
-
+
@endif
From 911957ff66d7053116e04c9b3f3bd38b6bb23594 Mon Sep 17 00:00:00 2001
From: Andras Bacsai
Date: Tue, 11 Mar 2025 18:41:03 +0100
Subject: [PATCH 102/145] chore(supabase): Update Supabase service template and
Postgres image version
- Bump Supabase Postgres image from 15.6.1.146 to 15.8.1.048
---
templates/compose/supabase.yaml | 2 +-
templates/service-templates.json | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/templates/compose/supabase.yaml b/templates/compose/supabase.yaml
index b60870f8a..9ec7c1dea 100644
--- a/templates/compose/supabase.yaml
+++ b/templates/compose/supabase.yaml
@@ -318,7 +318,7 @@ services:
# NEXT_ANALYTICS_BACKEND_PROVIDER=bigquery
- 'OPENAI_API_KEY=${OPENAI_API_KEY}'
supabase-db:
- image: supabase/postgres:15.6.1.146
+ image: supabase/postgres:15.8.1.048
healthcheck:
test: pg_isready -U postgres -h 127.0.0.1
interval: 5s
diff --git a/templates/service-templates.json b/templates/service-templates.json
index 112748c1a..d88ad79fa 100644
--- a/templates/service-templates.json
+++ b/templates/service-templates.json
@@ -2821,7 +2821,7 @@
"supabase": {
"documentation": "https://supabase.io?utm_source=coolify.io",
"slogan": "The open source Firebase alternative.",
- "compose": "services:
  supabase-kong:
    image: 'kong:2.8.1'
    entrypoint: 'bash -c ''eval "echo \"$$(cat ~/temp.yml)\"" > ~/kong.yml && /docker-entrypoint.sh kong docker-start'''
    depends_on:
      supabase-analytics:
        condition: service_healthy
    environment:
      - SERVICE_FQDN_SUPABASEKONG_8000
      - 'KONG_PORT_MAPS=443:8000'
      - 'JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - KONG_DATABASE=off
      - KONG_DECLARATIVE_CONFIG=/home/kong/kong.yml
      - 'KONG_DNS_ORDER=LAST,A,CNAME'
      - 'KONG_PLUGINS=request-transformer,cors,key-auth,acl,basic-auth'
      - KONG_NGINX_PROXY_PROXY_BUFFER_SIZE=160k
      - 'KONG_NGINX_PROXY_PROXY_BUFFERS=64 160k'
      - 'SUPABASE_ANON_KEY=${SERVICE_SUPABASEANON_KEY}'
      - 'SUPABASE_SERVICE_KEY=${SERVICE_SUPABASESERVICE_KEY}'
      - 'DASHBOARD_USERNAME=${SERVICE_USER_ADMIN}'
      - 'DASHBOARD_PASSWORD=${SERVICE_PASSWORD_ADMIN}'
    volumes:
      -
        type: bind
        source: ./volumes/api/kong.yml
        target: /home/kong/temp.yml
        content: "_format_version: '2.1'\n_transform: true\n\n###\n### Consumers / Users\n###\nconsumers:\n  - username: DASHBOARD\n  - username: anon\n    keyauth_credentials:\n      - key: $SUPABASE_ANON_KEY\n  - username: service_role\n    keyauth_credentials:\n      - key: $SUPABASE_SERVICE_KEY\n\n###\n### Access Control List\n###\nacls:\n  - consumer: anon\n    group: anon\n  - consumer: service_role\n    group: admin\n\n###\n### Dashboard credentials\n###\nbasicauth_credentials:\n- consumer: DASHBOARD\n  username: $DASHBOARD_USERNAME\n  password: $DASHBOARD_PASSWORD\n\n\n###\n### API Routes\n###\nservices:\n\n  ## Open Auth routes\n  - name: auth-v1-open\n    url: http://supabase-auth:9999/verify\n    routes:\n      - name: auth-v1-open\n        strip_path: true\n        paths:\n          - /auth/v1/verify\n    plugins:\n      - name: cors\n  - name: auth-v1-open-callback\n    url: http://supabase-auth:9999/callback\n    routes:\n      - name: auth-v1-open-callback\n        strip_path: true\n        paths:\n          - /auth/v1/callback\n    plugins:\n      - name: cors\n  - name: auth-v1-open-authorize\n    url: http://supabase-auth:9999/authorize\n    routes:\n      - name: auth-v1-open-authorize\n        strip_path: true\n        paths:\n          - /auth/v1/authorize\n    plugins:\n      - name: cors\n\n  ## Secure Auth routes\n  - name: auth-v1\n    _comment: 'GoTrue: /auth/v1/* -> http://supabase-auth:9999/*'\n    url: http://supabase-auth:9999/\n    routes:\n      - name: auth-v1-all\n        strip_path: true\n        paths:\n          - /auth/v1/\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: false\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n\n  ## Secure REST routes\n  - name: rest-v1\n    _comment: 'PostgREST: /rest/v1/* -> http://supabase-rest:3000/*'\n    url: http://supabase-rest:3000/\n    routes:\n      - name: rest-v1-all\n        strip_path: true\n        paths:\n          - /rest/v1/\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: true\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n\n  ## Secure GraphQL routes\n  - name: graphql-v1\n    _comment: 'PostgREST: /graphql/v1/* -> http://supabase-rest:3000/rpc/graphql'\n    url: http://supabase-rest:3000/rpc/graphql\n    routes:\n      - name: graphql-v1-all\n        strip_path: true\n        paths:\n          - /graphql/v1\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: true\n      - name: request-transformer\n        config:\n          add:\n            headers:\n              - Content-Profile:graphql_public\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n\n  ## Secure Realtime routes\n  - name: realtime-v1-ws\n    _comment: 'Realtime: /realtime/v1/* -> ws://realtime:4000/socket/*'\n    url: http://realtime-dev:4000/socket\n    protocol: ws\n    routes:\n      - name: realtime-v1-ws\n        strip_path: true\n        paths:\n          - /realtime/v1/\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: false\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n  - name: realtime-v1-rest\n    _comment: 'Realtime: /realtime/v1/* -> ws://realtime:4000/socket/*'\n    url: http://realtime-dev:4000/api\n    protocol: http\n    routes:\n      - name: realtime-v1-rest\n        strip_path: true\n        paths:\n          - /realtime/v1/api\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: false\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n\n  ## Storage routes: the storage server manages its own auth\n  - name: storage-v1\n    _comment: 'Storage: /storage/v1/* -> http://supabase-storage:5000/*'\n    url: http://supabase-storage:5000/\n    routes:\n      - name: storage-v1-all\n        strip_path: true\n        paths:\n          - /storage/v1/\n    plugins:\n      - name: cors\n\n  ## Edge Functions routes\n  - name: functions-v1\n    _comment: 'Edge Functions: /functions/v1/* -> http://supabase-edge-functions:9000/*'\n    url: http://supabase-edge-functions:9000/\n    routes:\n      - name: functions-v1-all\n        strip_path: true\n        paths:\n          - /functions/v1/\n    plugins:\n      - name: cors\n\n  ## Analytics routes\n  - name: analytics-v1\n    _comment: 'Analytics: /analytics/v1/* -> http://logflare:4000/*'\n    url: http://supabase-analytics:4000/\n    routes:\n      - name: analytics-v1-all\n        strip_path: true\n        paths:\n          - /analytics/v1/\n\n  ## Secure Database routes\n  - name: meta\n    _comment: 'pg-meta: /pg/* -> http://supabase-meta:8080/*'\n    url: http://supabase-meta:8080/\n    routes:\n      - name: meta-all\n        strip_path: true\n        paths:\n          - /pg/\n    plugins:\n      - name: key-auth\n        config:\n          hide_credentials: false\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n\n  ## Protected Dashboard - catch all remaining routes\n  - name: dashboard\n    _comment: 'Studio: /* -> http://studio:3000/*'\n    url: http://supabase-studio:3000/\n    routes:\n      - name: dashboard-all\n        strip_path: true\n        paths:\n          - /\n    plugins:\n      - name: cors\n      - name: basic-auth\n        config:\n          hide_credentials: true\n"
  supabase-studio:
    image: 'supabase/studio:20241202-71e5240'
    healthcheck:
      test:
        - CMD
        - node
        - '-e'
        - "require('http').get('http://127.0.0.1:3000/api/profile', (r) => {if (r.statusCode !== 200) process.exit(1); else process.exit(0); }).on('error', () => process.exit(1))"
      timeout: 5s
      interval: 5s
      retries: 3
    depends_on:
      supabase-analytics:
        condition: service_healthy
    environment:
      - HOSTNAME=0.0.0.0
      - 'STUDIO_PG_META_URL=http://supabase-meta:8080'
      - 'POSTGRES_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'DEFAULT_ORGANIZATION_NAME=${STUDIO_DEFAULT_ORGANIZATION:-Default Organization}'
      - 'DEFAULT_PROJECT_NAME=${STUDIO_DEFAULT_PROJECT:-Default Project}'
      - 'SUPABASE_URL=http://supabase-kong:8000'
      - 'SUPABASE_PUBLIC_URL=${SERVICE_FQDN_SUPABASEKONG}'
      - 'SUPABASE_ANON_KEY=${SERVICE_SUPABASEANON_KEY}'
      - 'SUPABASE_SERVICE_KEY=${SERVICE_SUPABASESERVICE_KEY}'
      - 'AUTH_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'LOGFLARE_API_KEY=${SERVICE_PASSWORD_LOGFLARE}'
      - 'LOGFLARE_URL=http://supabase-analytics:4000'
      - 'SUPABASE_PUBLIC_API=${SERVICE_FQDN_SUPABASEKONG}'
      - NEXT_PUBLIC_ENABLE_LOGS=true
      - NEXT_ANALYTICS_BACKEND_PROVIDER=postgres
      - 'OPENAI_API_KEY=${OPENAI_API_KEY}'
  supabase-db:
    image: 'supabase/postgres:15.6.1.146'
    healthcheck:
      test: 'pg_isready -U postgres -h 127.0.0.1'
      interval: 5s
      timeout: 5s
      retries: 10
    depends_on:
      supabase-vector:
        condition: service_healthy
    command:
      - postgres
      - '-c'
      - config_file=/etc/postgresql/postgresql.conf
      - '-c'
      - log_min_messages=fatal
    environment:
      - POSTGRES_HOST=/var/run/postgresql
      - 'PGPORT=${POSTGRES_PORT:-5432}'
      - 'POSTGRES_PORT=${POSTGRES_PORT:-5432}'
      - 'PGPASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'POSTGRES_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'PGDATABASE=${POSTGRES_DB:-postgres}'
      - 'POSTGRES_DB=${POSTGRES_DB:-postgres}'
      - 'JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'JWT_EXP=${JWT_EXPIRY:-3600}'
    volumes:
      - 'supabase-db-data:/var/lib/postgresql/data'
      -
        type: bind
        source: ./volumes/db/realtime.sql
        target: /docker-entrypoint-initdb.d/migrations/99-realtime.sql
        content: "\\set pguser `echo \"supabase_admin\"`\n\ncreate schema if not exists _realtime;\nalter schema _realtime owner to :pguser;\n"
      -
        type: bind
        source: ./volumes/db/_supabase.sql
        target: /docker-entrypoint-initdb.d/migrations/97-_supabase.sql
        content: "\\set pguser `echo \"$POSTGRES_USER\"`\n\nCREATE DATABASE _supabase WITH OWNER :pguser;\n"
      -
        type: bind
        source: ./volumes/db/pooler.sql
        target: /docker-entrypoint-initdb.d/migrations/99-pooler.sql
        content: "\\set pguser `echo \"supabase_admin\"`\n\\c _supabase\ncreate schema if not exists _supavisor;\nalter schema _supavisor owner to :pguser;\n\\c postgres\n"
      -
        type: bind
        source: ./volumes/db/webhooks.sql
        target: /docker-entrypoint-initdb.d/init-scripts/98-webhooks.sql
        content: "BEGIN;\n-- Create pg_net extension\nCREATE EXTENSION IF NOT EXISTS pg_net SCHEMA extensions;\n-- Create supabase_functions schema\nCREATE SCHEMA supabase_functions AUTHORIZATION supabase_admin;\nGRANT USAGE ON SCHEMA supabase_functions TO postgres, anon, authenticated, service_role;\nALTER DEFAULT PRIVILEGES IN SCHEMA supabase_functions GRANT ALL ON TABLES TO postgres, anon, authenticated, service_role;\nALTER DEFAULT PRIVILEGES IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO postgres, anon, authenticated, service_role;\nALTER DEFAULT PRIVILEGES IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO postgres, anon, authenticated, service_role;\n-- supabase_functions.migrations definition\nCREATE TABLE supabase_functions.migrations (\n  version text PRIMARY KEY,\n  inserted_at timestamptz NOT NULL DEFAULT NOW()\n);\n-- Initial supabase_functions migration\nINSERT INTO supabase_functions.migrations (version) VALUES ('initial');\n-- supabase_functions.hooks definition\nCREATE TABLE supabase_functions.hooks (\n  id bigserial PRIMARY KEY,\n  hook_table_id integer NOT NULL,\n  hook_name text NOT NULL,\n  created_at timestamptz NOT NULL DEFAULT NOW(),\n  request_id bigint\n);\nCREATE INDEX supabase_functions_hooks_request_id_idx ON supabase_functions.hooks USING btree (request_id);\nCREATE INDEX supabase_functions_hooks_h_table_id_h_name_idx ON supabase_functions.hooks USING btree (hook_table_id, hook_name);\nCOMMENT ON TABLE supabase_functions.hooks IS 'Supabase Functions Hooks: Audit trail for triggered hooks.';\nCREATE FUNCTION supabase_functions.http_request()\n  RETURNS trigger\n  LANGUAGE plpgsql\n  AS $function$\n  DECLARE\n    request_id bigint;\n    payload jsonb;\n    url text := TG_ARGV[0]::text;\n    method text := TG_ARGV[1]::text;\n    headers jsonb DEFAULT '{}'::jsonb;\n    params jsonb DEFAULT '{}'::jsonb;\n    timeout_ms integer DEFAULT 1000;\n  BEGIN\n    IF url IS NULL OR url = 'null' THEN\n      RAISE EXCEPTION 'url argument is missing';\n    END IF;\n\n    IF method IS NULL OR method = 'null' THEN\n      RAISE EXCEPTION 'method argument is missing';\n    END IF;\n\n    IF TG_ARGV[2] IS NULL OR TG_ARGV[2] = 'null' THEN\n      headers = '{\"Content-Type\": \"application/json\"}'::jsonb;\n    ELSE\n      headers = TG_ARGV[2]::jsonb;\n    END IF;\n\n    IF TG_ARGV[3] IS NULL OR TG_ARGV[3] = 'null' THEN\n      params = '{}'::jsonb;\n    ELSE\n      params = TG_ARGV[3]::jsonb;\n    END IF;\n\n    IF TG_ARGV[4] IS NULL OR TG_ARGV[4] = 'null' THEN\n      timeout_ms = 1000;\n    ELSE\n      timeout_ms = TG_ARGV[4]::integer;\n    END IF;\n\n    CASE\n      WHEN method = 'GET' THEN\n        SELECT http_get INTO request_id FROM net.http_get(\n          url,\n          params,\n          headers,\n          timeout_ms\n        );\n      WHEN method = 'POST' THEN\n        payload = jsonb_build_object(\n          'old_record', OLD,\n          'record', NEW,\n          'type', TG_OP,\n          'table', TG_TABLE_NAME,\n          'schema', TG_TABLE_SCHEMA\n        );\n\n        SELECT http_post INTO request_id FROM net.http_post(\n          url,\n          payload,\n          params,\n          headers,\n          timeout_ms\n        );\n      ELSE\n        RAISE EXCEPTION 'method argument % is invalid', method;\n    END CASE;\n\n    INSERT INTO supabase_functions.hooks\n      (hook_table_id, hook_name, request_id)\n    VALUES\n      (TG_RELID, TG_NAME, request_id);\n\n    RETURN NEW;\n  END\n$function$;\n-- Supabase super admin\nDO\n$$\nBEGIN\n  IF NOT EXISTS (\n    SELECT 1\n    FROM pg_roles\n    WHERE rolname = 'supabase_functions_admin'\n  )\n  THEN\n    CREATE USER supabase_functions_admin NOINHERIT CREATEROLE LOGIN NOREPLICATION;\n  END IF;\nEND\n$$;\nGRANT ALL PRIVILEGES ON SCHEMA supabase_functions TO supabase_functions_admin;\nGRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA supabase_functions TO supabase_functions_admin;\nGRANT ALL PRIVILEGES ON ALL SEQUENCES IN SCHEMA supabase_functions TO supabase_functions_admin;\nALTER USER supabase_functions_admin SET search_path = \"supabase_functions\";\nALTER table \"supabase_functions\".migrations OWNER TO supabase_functions_admin;\nALTER table \"supabase_functions\".hooks OWNER TO supabase_functions_admin;\nALTER function \"supabase_functions\".http_request() OWNER TO supabase_functions_admin;\nGRANT supabase_functions_admin TO postgres;\n-- Remove unused supabase_pg_net_admin role\nDO\n$$\nBEGIN\n  IF EXISTS (\n    SELECT 1\n    FROM pg_roles\n    WHERE rolname = 'supabase_pg_net_admin'\n  )\n  THEN\n    REASSIGN OWNED BY supabase_pg_net_admin TO supabase_admin;\n    DROP OWNED BY supabase_pg_net_admin;\n    DROP ROLE supabase_pg_net_admin;\n  END IF;\nEND\n$$;\n-- pg_net grants when extension is already enabled\nDO\n$$\nBEGIN\n  IF EXISTS (\n    SELECT 1\n    FROM pg_extension\n    WHERE extname = 'pg_net'\n  )\n  THEN\n    GRANT USAGE ON SCHEMA net TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n    ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;\n    ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;\n    ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;\n    ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;\n    REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;\n    REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;\n    GRANT EXECUTE ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n    GRANT EXECUTE ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n  END IF;\nEND\n$$;\n-- Event trigger for pg_net\nCREATE OR REPLACE FUNCTION extensions.grant_pg_net_access()\nRETURNS event_trigger\nLANGUAGE plpgsql\nAS $$\nBEGIN\n  IF EXISTS (\n    SELECT 1\n    FROM pg_event_trigger_ddl_commands() AS ev\n    JOIN pg_extension AS ext\n    ON ev.objid = ext.oid\n    WHERE ext.extname = 'pg_net'\n  )\n  THEN\n    GRANT USAGE ON SCHEMA net TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n    ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;\n    ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;\n    ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;\n    ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;\n    REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;\n    REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;\n    GRANT EXECUTE ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n    GRANT EXECUTE ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n  END IF;\nEND;\n$$;\nCOMMENT ON FUNCTION extensions.grant_pg_net_access IS 'Grants access to pg_net';\nDO\n$$\nBEGIN\n  IF NOT EXISTS (\n    SELECT 1\n    FROM pg_event_trigger\n    WHERE evtname = 'issue_pg_net_access'\n  ) THEN\n    CREATE EVENT TRIGGER issue_pg_net_access ON ddl_command_end WHEN TAG IN ('CREATE EXTENSION')\n    EXECUTE PROCEDURE extensions.grant_pg_net_access();\n  END IF;\nEND\n$$;\nINSERT INTO supabase_functions.migrations (version) VALUES ('20210809183423_update_grants');\nALTER function supabase_functions.http_request() SECURITY DEFINER;\nALTER function supabase_functions.http_request() SET search_path = supabase_functions;\nREVOKE ALL ON FUNCTION supabase_functions.http_request() FROM PUBLIC;\nGRANT EXECUTE ON FUNCTION supabase_functions.http_request() TO postgres, anon, authenticated, service_role;\nCOMMIT;\n"
      -
        type: bind
        source: ./volumes/db/roles.sql
        target: /docker-entrypoint-initdb.d/init-scripts/99-roles.sql
        content: "-- NOTE: change to your own passwords for production environments\n \\set pgpass `echo \"$POSTGRES_PASSWORD\"`\n\n ALTER USER authenticator WITH PASSWORD :'pgpass';\n ALTER USER pgbouncer WITH PASSWORD :'pgpass';\n ALTER USER supabase_auth_admin WITH PASSWORD :'pgpass';\n ALTER USER supabase_functions_admin WITH PASSWORD :'pgpass';\n ALTER USER supabase_storage_admin WITH PASSWORD :'pgpass';\n"
      -
        type: bind
        source: ./volumes/db/jwt.sql
        target: /docker-entrypoint-initdb.d/init-scripts/99-jwt.sql
        content: "\\set jwt_secret `echo \"$JWT_SECRET\"`\n\\set jwt_exp `echo \"$JWT_EXP\"`\n\\set db_name `echo \"${POSTGRES_DB:-postgres}\"`\n\nALTER DATABASE :db_name SET \"app.settings.jwt_secret\" TO :'jwt_secret';\nALTER DATABASE :db_name SET \"app.settings.jwt_exp\" TO :'jwt_exp';\n"
      -
        type: bind
        source: ./volumes/db/logs.sql
        target: /docker-entrypoint-initdb.d/migrations/99-logs.sql
        content: "\\set pguser `echo \"supabase_admin\"`\n\\c _supabase\ncreate schema if not exists _analytics;\nalter schema _analytics owner to :pguser;\n\\c postgres\n"
      - 'supabase-db-config:/etc/postgresql-custom'
  supabase-analytics:
    image: 'supabase/logflare:1.4.0'
    healthcheck:
      test:
        - CMD
        - curl
        - 'http://127.0.0.1:4000/health'
      timeout: 5s
      interval: 5s
      retries: 10
    depends_on:
      supabase-db:
        condition: service_healthy
    environment:
      - LOGFLARE_NODE_HOST=127.0.0.1
      - DB_USERNAME=supabase_admin
      - DB_DATABASE=_supabase
      - 'DB_HOSTNAME=${POSTGRES_HOSTNAME:-supabase-db}'
      - 'DB_PORT=${POSTGRES_PORT:-5432}'
      - 'DB_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - DB_SCHEMA=_analytics
      - 'LOGFLARE_API_KEY=${SERVICE_PASSWORD_LOGFLARE}'
      - LOGFLARE_SINGLE_TENANT=true
      - LOGFLARE_SINGLE_TENANT_MODE=true
      - LOGFLARE_SUPABASE_MODE=true
      - LOGFLARE_MIN_CLUSTER_SIZE=1
      - 'POSTGRES_BACKEND_URL=postgresql://supabase_admin:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/_supabase'
      - POSTGRES_BACKEND_SCHEMA=_analytics
      - LOGFLARE_FEATURE_FLAG_OVERRIDE=multibackend=true
  supabase-vector:
    image: 'timberio/vector:0.28.1-alpine'
    healthcheck:
      test:
        - CMD
        - wget
        - '--no-verbose'
        - '--tries=1'
        - '--spider'
        - 'http://supabase-vector:9001/health'
      timeout: 5s
      interval: 5s
      retries: 3
    volumes:
      -
        type: bind
        source: ./volumes/logs/vector.yml
        target: /etc/vector/vector.yml
        read_only: true
        content: "api:\n  enabled: true\n  address: 0.0.0.0:9001\n\nsources:\n  docker_host:\n    type: docker_logs\n    exclude_containers:\n      - supabase-vector\n\ntransforms:\n  project_logs:\n    type: remap\n    inputs:\n      - docker_host\n    source: |-\n      .project = \"default\"\n      .event_message = del(.message)\n      .appname = del(.container_name)\n      del(.container_created_at)\n      del(.container_id)\n      del(.source_type)\n      del(.stream)\n      del(.label)\n      del(.image)\n      del(.host)\n      del(.stream)\n  router:\n    type: route\n    inputs:\n      - project_logs\n    route:\n      kong: 'starts_with(string!(.appname), \"supabase-kong\")'\n      auth: 'starts_with(string!(.appname), \"supabase-auth\")'\n      rest: 'starts_with(string!(.appname), \"supabase-rest\")'\n      realtime: 'starts_with(string!(.appname), \"realtime-dev\")'\n      storage: 'starts_with(string!(.appname), \"supabase-storage\")'\n      functions: 'starts_with(string!(.appname), \"supabase-functions\")'\n      db: 'starts_with(string!(.appname), \"supabase-db\")'\n  # Ignores non nginx errors since they are related with kong booting up\n  kong_logs:\n    type: remap\n    inputs:\n      - router.kong\n    source: |-\n      req, err = parse_nginx_log(.event_message, \"combined\")\n      if err == null {\n          .timestamp = req.timestamp\n          .metadata.request.headers.referer = req.referer\n          .metadata.request.headers.user_agent = req.agent\n          .metadata.request.headers.cf_connecting_ip = req.client\n          .metadata.request.method = req.method\n          .metadata.request.path = req.path\n          .metadata.request.protocol = req.protocol\n          .metadata.response.status_code = req.status\n      }\n      if err != null {\n        abort\n      }\n  # Ignores non nginx errors since they are related with kong booting up\n  kong_err:\n    type: remap\n    inputs:\n      - router.kong\n    source: |-\n      .metadata.request.method = \"GET\"\n      .metadata.response.status_code = 200\n      parsed, err = parse_nginx_log(.event_message, \"error\")\n      if err == null {\n          .timestamp = parsed.timestamp\n          .severity = parsed.severity\n          .metadata.request.host = parsed.host\n          .metadata.request.headers.cf_connecting_ip = parsed.client\n          url, err = split(parsed.request, \" \")\n          if err == null {\n              .metadata.request.method = url[0]\n              .metadata.request.path = url[1]\n              .metadata.request.protocol = url[2]\n          }\n      }\n      if err != null {\n        abort\n      }\n  # Gotrue logs are structured json strings which frontend parses directly. But we keep metadata for consistency.\n  auth_logs:\n    type: remap\n    inputs:\n      - router.auth\n    source: |-\n      parsed, err = parse_json(.event_message)\n      if err == null {\n          .metadata.timestamp = parsed.time\n          .metadata = merge!(.metadata, parsed)\n      }\n  # PostgREST logs are structured so we separate timestamp from message using regex\n  rest_logs:\n    type: remap\n    inputs:\n      - router.rest\n    source: |-\n      parsed, err = parse_regex(.event_message, r'^(?P<time>.*): (?P<msg>.*)$')\n      if err == null {\n          .event_message = parsed.msg\n          .timestamp = to_timestamp!(parsed.time)\n          .metadata.host = .project\n      }\n  # Realtime logs are structured so we parse the severity level using regex (ignore time because it has no date)\n  realtime_logs:\n    type: remap\n    inputs:\n      - router.realtime\n    source: |-\n      .metadata.project = del(.project)\n      .metadata.external_id = .metadata.project\n      parsed, err = parse_regex(.event_message, r'^(?P<time>\\d+:\\d+:\\d+\\.\\d+) \\[(?P<level>\\w+)\\] (?P<msg>.*)$')\n      if err == null {\n          .event_message = parsed.msg\n          .metadata.level = parsed.level\n      }\n  # Storage logs may contain json objects so we parse them for completeness\n  storage_logs:\n    type: remap\n    inputs:\n      - router.storage\n    source: |-\n      .metadata.project = del(.project)\n      .metadata.tenantId = .metadata.project\n      parsed, err = parse_json(.event_message)\n      if err == null {\n          .event_message = parsed.msg\n          .metadata.level = parsed.level\n          .metadata.timestamp = parsed.time\n          .metadata.context[0].host = parsed.hostname\n          .metadata.context[0].pid = parsed.pid\n      }\n  # Postgres logs some messages to stderr which we map to warning severity level\n  db_logs:\n    type: remap\n    inputs:\n      - router.db\n    source: |-\n      .metadata.host = \"db-default\"\n      .metadata.parsed.timestamp = .timestamp\n\n      parsed, err = parse_regex(.event_message, r'.*(?P<level>INFO|NOTICE|WARNING|ERROR|LOG|FATAL|PANIC?):.*', numeric_groups: true)\n\n      if err != null || parsed == null {\n        .metadata.parsed.error_severity = \"info\"\n      }\n      if parsed != null {\n      .metadata.parsed.error_severity = parsed.level\n      }\n      if .metadata.parsed.error_severity == \"info\" {\n          .metadata.parsed.error_severity = \"log\"\n      }\n      .metadata.parsed.error_severity = upcase!(.metadata.parsed.error_severity)\n\nsinks:\n  logflare_auth:\n    type: 'http'\n    inputs:\n      - auth_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=gotrue.logs.prod&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_realtime:\n    type: 'http'\n    inputs:\n      - realtime_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=realtime.logs.prod&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_rest:\n    type: 'http'\n    inputs:\n      - rest_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=postgREST.logs.prod&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_db:\n    type: 'http'\n    inputs:\n      - db_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    # We must route the sink through kong because ingesting logs before logflare is fully initialised will\n    # lead to broken queries from studio. This works by the assumption that containers are started in the\n    # following order: vector > db > logflare > kong\n    uri: 'http://supabase-kong:8000/analytics/v1/api/logs?source_name=postgres.logs&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_functions:\n    type: 'http'\n    inputs:\n      - router.functions\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=deno-relay-logs&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_storage:\n    type: 'http'\n    inputs:\n      - storage_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=storage.logs.prod.2&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_kong:\n    type: 'http'\n    inputs:\n      - kong_logs\n      - kong_err\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=cloudflare.logs.prod&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n"
      - '/var/run/docker.sock:/var/run/docker.sock:ro'
    environment:
      - 'LOGFLARE_API_KEY=${SERVICE_PASSWORD_LOGFLARE}'
    command:
      - '--config'
      - etc/vector/vector.yml
  supabase-rest:
    image: 'postgrest/postgrest:v12.2.0'
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    environment:
      - 'PGRST_DB_URI=postgres://authenticator:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/${POSTGRES_DB:-postgres}'
      - 'PGRST_DB_SCHEMAS=${PGRST_DB_SCHEMAS:-public,storage,graphql_public}'
      - PGRST_DB_ANON_ROLE=anon
      - 'PGRST_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - PGRST_DB_USE_LEGACY_GUCS=false
      - 'PGRST_APP_SETTINGS_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'PGRST_APP_SETTINGS_JWT_EXP=${JWT_EXPIRY:-3600}'
    command: postgrest
    exclude_from_hc: true
  supabase-auth:
    image: 'supabase/gotrue:v2.164.0'
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    healthcheck:
      test:
        - CMD
        - wget
        - '--no-verbose'
        - '--tries=1'
        - '--spider'
        - 'http://127.0.0.1:9999/health'
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - GOTRUE_API_HOST=0.0.0.0
      - GOTRUE_API_PORT=9999
      - 'API_EXTERNAL_URL=${API_EXTERNAL_URL:-http://supabase-kong:8000}'
      - GOTRUE_DB_DRIVER=postgres
      - 'GOTRUE_DB_DATABASE_URL=postgres://supabase_auth_admin:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/${POSTGRES_DB:-postgres}'
      - 'GOTRUE_SITE_URL=${SERVICE_FQDN_SUPABASEKONG}'
      - 'GOTRUE_URI_ALLOW_LIST=${ADDITIONAL_REDIRECT_URLS}'
      - 'GOTRUE_DISABLE_SIGNUP=${DISABLE_SIGNUP:-false}'
      - GOTRUE_JWT_ADMIN_ROLES=service_role
      - GOTRUE_JWT_AUD=authenticated
      - GOTRUE_JWT_DEFAULT_GROUP_NAME=authenticated
      - 'GOTRUE_JWT_EXP=${JWT_EXPIRY:-3600}'
      - 'GOTRUE_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'GOTRUE_EXTERNAL_EMAIL_ENABLED=${ENABLE_EMAIL_SIGNUP:-true}'
      - 'GOTRUE_EXTERNAL_ANONYMOUS_USERS_ENABLED=${ENABLE_ANONYMOUS_USERS:-false}'
      - 'GOTRUE_MAILER_AUTOCONFIRM=${ENABLE_EMAIL_AUTOCONFIRM:-false}'
      - 'GOTRUE_SMTP_ADMIN_EMAIL=${SMTP_ADMIN_EMAIL}'
      - 'GOTRUE_SMTP_HOST=${SMTP_HOST}'
      - 'GOTRUE_SMTP_PORT=${SMTP_PORT:-587}'
      - 'GOTRUE_SMTP_USER=${SMTP_USER}'
      - 'GOTRUE_SMTP_PASS=${SMTP_PASS}'
      - 'GOTRUE_SMTP_SENDER_NAME=${SMTP_SENDER_NAME}'
      - 'GOTRUE_MAILER_URLPATHS_INVITE=${MAILER_URLPATHS_INVITE:-/auth/v1/verify}'
      - 'GOTRUE_MAILER_URLPATHS_CONFIRMATION=${MAILER_URLPATHS_CONFIRMATION:-/auth/v1/verify}'
      - 'GOTRUE_MAILER_URLPATHS_RECOVERY=${MAILER_URLPATHS_RECOVERY:-/auth/v1/verify}'
      - 'GOTRUE_MAILER_URLPATHS_EMAIL_CHANGE=${MAILER_URLPATHS_EMAIL_CHANGE:-/auth/v1/verify}'
      - 'GOTRUE_MAILER_TEMPLATES_INVITE=${MAILER_TEMPLATES_INVITE}'
      - 'GOTRUE_MAILER_TEMPLATES_CONFIRMATION=${MAILER_TEMPLATES_CONFIRMATION}'
      - 'GOTRUE_MAILER_TEMPLATES_RECOVERY=${MAILER_TEMPLATES_RECOVERY}'
      - 'GOTRUE_MAILER_TEMPLATES_MAGIC_LINK=${MAILER_TEMPLATES_MAGIC_LINK}'
      - 'GOTRUE_MAILER_TEMPLATES_EMAIL_CHANGE=${MAILER_TEMPLATES_EMAIL_CHANGE}'
      - 'GOTRUE_MAILER_SUBJECTS_CONFIRMATION=${MAILER_SUBJECTS_CONFIRMATION}'
      - 'GOTRUE_MAILER_SUBJECTS_RECOVERY=${MAILER_SUBJECTS_RECOVERY}'
      - 'GOTRUE_MAILER_SUBJECTS_MAGIC_LINK=${MAILER_SUBJECTS_MAGIC_LINK}'
      - 'GOTRUE_MAILER_SUBJECTS_EMAIL_CHANGE=${MAILER_SUBJECTS_EMAIL_CHANGE}'
      - 'GOTRUE_MAILER_SUBJECTS_INVITE=${MAILER_SUBJECTS_INVITE}'
      - 'GOTRUE_EXTERNAL_PHONE_ENABLED=${ENABLE_PHONE_SIGNUP:-true}'
      - 'GOTRUE_SMS_AUTOCONFIRM=${ENABLE_PHONE_AUTOCONFIRM:-true}'
  realtime-dev:
    image: 'supabase/realtime:v2.33.70'
    container_name: realtime-dev.supabase-realtime
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    healthcheck:
      test:
        - CMD
        - curl
        - '-sSfL'
        - '--head'
        - '-o'
        - /dev/null
        - '-H'
        - 'Authorization: Bearer ${SERVICE_SUPABASEANON_KEY}'
        - 'http://127.0.0.1:4000/api/tenants/realtime-dev/health'
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - PORT=4000
      - 'DB_HOST=${POSTGRES_HOSTNAME:-supabase-db}'
      - 'DB_PORT=${POSTGRES_PORT:-5432}'
      - DB_USER=supabase_admin
      - 'DB_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'DB_NAME=${POSTGRES_DB:-postgres}'
      - 'DB_AFTER_CONNECT_QUERY=SET search_path TO _realtime'
      - DB_ENC_KEY=supabaserealtime
      - 'API_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - FLY_ALLOC_ID=fly123
      - FLY_APP_NAME=realtime
      - 'SECRET_KEY_BASE=${SECRET_PASSWORD_REALTIME}'
      - 'ERL_AFLAGS=-proto_dist inet_tcp'
      - ENABLE_TAILSCALE=false
      - "DNS_NODES=''"
      - RLIMIT_NOFILE=10000
      - APP_NAME=realtime
      - SEED_SELF_HOST=true
      - LOG_LEVEL=error
      - RUN_JANITOR=true
      - JANITOR_INTERVAL=60000
    command: "sh -c \"/app/bin/migrate && /app/bin/realtime eval 'Realtime.Release.seeds(Realtime.Repo)' && /app/bin/server\"\n"
  supabase-minio:
    image: minio/minio
    environment:
      - 'MINIO_ROOT_USER=${SERVICE_USER_MINIO}'
      - 'MINIO_ROOT_PASSWORD=${SERVICE_PASSWORD_MINIO}'
    command: 'server --console-address ":9001" /data'
    healthcheck:
      test: 'sleep 5 && exit 0'
      interval: 2s
      timeout: 10s
      retries: 5
    volumes:
      - './volumes/storage:/data'
  minio-createbucket:
    image: minio/mc
    restart: 'no'
    environment:
      - 'MINIO_ROOT_USER=${SERVICE_USER_MINIO}'
      - 'MINIO_ROOT_PASSWORD=${SERVICE_PASSWORD_MINIO}'
    depends_on:
      supabase-minio:
        condition: service_healthy
    entrypoint:
      - /entrypoint.sh
    volumes:
      -
        type: bind
        source: ./entrypoint.sh
        target: /entrypoint.sh
        content: "#!/bin/sh\n/usr/bin/mc alias set supabase-minio http://supabase-minio:9000 ${MINIO_ROOT_USER} ${MINIO_ROOT_PASSWORD};\n/usr/bin/mc mb --ignore-existing supabase-minio/stub;\nexit 0\n"
  supabase-storage:
    image: 'supabase/storage-api:v1.14.6'
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-rest:
        condition: service_started
      imgproxy:
        condition: service_started
    healthcheck:
      test:
        - CMD
        - wget
        - '--no-verbose'
        - '--tries=1'
        - '--spider'
        - 'http://127.0.0.1:5000/status'
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - SERVER_PORT=5000
      - SERVER_REGION=local
      - MULTI_TENANT=false
      - 'AUTH_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'DATABASE_URL=postgres://supabase_storage_admin:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/${POSTGRES_DB:-postgres}'
      - DB_INSTALL_ROLES=false
      - STORAGE_BACKEND=s3
      - STORAGE_S3_BUCKET=stub
      - 'STORAGE_S3_ENDPOINT=http://supabase-minio:9000'
      - STORAGE_S3_FORCE_PATH_STYLE=true
      - STORAGE_S3_REGION=us-east-1
      - 'AWS_ACCESS_KEY_ID=${SERVICE_USER_MINIO}'
      - 'AWS_SECRET_ACCESS_KEY=${SERVICE_PASSWORD_MINIO}'
      - UPLOAD_FILE_SIZE_LIMIT=524288000
      - UPLOAD_FILE_SIZE_LIMIT_STANDARD=524288000
      - UPLOAD_SIGNED_URL_EXPIRATION_TIME=120
      - TUS_URL_PATH=upload/resumable
      - TUS_MAX_SIZE=3600000
      - ENABLE_IMAGE_TRANSFORMATION=true
      - 'IMGPROXY_URL=http://imgproxy:8080'
      - IMGPROXY_REQUEST_TIMEOUT=15
      - DATABASE_SEARCH_PATH=storage
      - NODE_ENV=production
      - REQUEST_ALLOW_X_FORWARDED_PATH=true
    volumes:
      - './volumes/storage:/var/lib/storage'
  imgproxy:
    image: 'darthsim/imgproxy:v3.8.0'
    healthcheck:
      test:
        - CMD
        - imgproxy
        - health
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - IMGPROXY_LOCAL_FILESYSTEM_ROOT=/
      - IMGPROXY_USE_ETAG=true
      - 'IMGPROXY_ENABLE_WEBP_DETECTION=${IMGPROXY_ENABLE_WEBP_DETECTION:-true}'
    volumes:
      - './volumes/storage:/var/lib/storage'
  supabase-meta:
    image: 'supabase/postgres-meta:v0.84.2'
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    environment:
      - PG_META_PORT=8080
      - 'PG_META_DB_HOST=${POSTGRES_HOSTNAME:-supabase-db}'
      - 'PG_META_DB_PORT=${POSTGRES_PORT:-5432}'
      - 'PG_META_DB_NAME=${POSTGRES_DB:-postgres}'
      - PG_META_DB_USER=supabase_admin
      - 'PG_META_DB_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
  supabase-edge-functions:
    image: 'supabase/edge-runtime:v1.65.3'
    depends_on:
      supabase-analytics:
        condition: service_healthy
    healthcheck:
      test:
        - CMD
        - echo
        - 'Edge Functions is healthy'
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - 'JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'SUPABASE_URL=${SERVICE_FQDN_SUPABASEKONG}'
      - 'SUPABASE_ANON_KEY=${SERVICE_SUPABASEANON_KEY}'
      - 'SUPABASE_SERVICE_ROLE_KEY=${SERVICE_SUPABASESERVICE_KEY}'
      - 'SUPABASE_DB_URL=postgresql://postgres:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/${POSTGRES_DB:-postgres}'
      - 'VERIFY_JWT=${FUNCTIONS_VERIFY_JWT:-false}'
    volumes:
      - './volumes/functions:/home/deno/functions'
      -
        type: bind
        source: ./volumes/functions/main/index.ts
        target: /home/deno/functions/main/index.ts
        content: "import { serve } from 'https://deno.land/std@0.131.0/http/server.ts'\nimport * as jose from 'https://deno.land/x/jose@v4.14.4/index.ts'\n\nconsole.log('main function started')\n\nconst JWT_SECRET = Deno.env.get('JWT_SECRET')\nconst VERIFY_JWT = Deno.env.get('VERIFY_JWT') === 'true'\n\nfunction getAuthToken(req: Request) {\n  const authHeader = req.headers.get('authorization')\n  if (!authHeader) {\n    throw new Error('Missing authorization header')\n  }\n  const [bearer, token] = authHeader.split(' ')\n  if (bearer !== 'Bearer') {\n    throw new Error(`Auth header is not 'Bearer {token}'`)\n  }\n  return token\n}\n\nasync function verifyJWT(jwt: string): Promise<boolean> {\n  const encoder = new TextEncoder()\n  const secretKey = encoder.encode(JWT_SECRET)\n  try {\n    await jose.jwtVerify(jwt, secretKey)\n  } catch (err) {\n    console.error(err)\n    return false\n  }\n  return true\n}\n\nserve(async (req: Request) => {\n  if (req.method !== 'OPTIONS' && VERIFY_JWT) {\n    try {\n      const token = getAuthToken(req)\n      const isValidJWT = await verifyJWT(token)\n\n      if (!isValidJWT) {\n        return new Response(JSON.stringify({ msg: 'Invalid JWT' }), {\n          status: 401,\n          headers: { 'Content-Type': 'application/json' },\n        })\n      }\n    } catch (e) {\n      console.error(e)\n      return new Response(JSON.stringify({ msg: e.toString() }), {\n        status: 401,\n        headers: { 'Content-Type': 'application/json' },\n      })\n    }\n  }\n\n  const url = new URL(req.url)\n  const { pathname } = url\n  const path_parts = pathname.split('/')\n  const service_name = path_parts[1]\n\n  if (!service_name || service_name === '') {\n    const error = { msg: 'missing function name in request' }\n    return new Response(JSON.stringify(error), {\n      status: 400,\n      headers: { 'Content-Type': 'application/json' },\n    })\n  }\n\n  const servicePath = `/home/deno/functions/${service_name}`\n  console.error(`serving the request with ${servicePath}`)\n\n  const memoryLimitMb = 150\n  const workerTimeoutMs = 1 * 60 * 1000\n  const noModuleCache = false\n  const importMapPath = null\n  const envVarsObj = Deno.env.toObject()\n  const envVars = Object.keys(envVarsObj).map((k) => [k, envVarsObj[k]])\n\n  try {\n    const worker = await EdgeRuntime.userWorkers.create({\n      servicePath,\n      memoryLimitMb,\n      workerTimeoutMs,\n      noModuleCache,\n      importMapPath,\n      envVars,\n    })\n    return await worker.fetch(req)\n  } catch (e) {\n    const error = { msg: e.toString() }\n    return new Response(JSON.stringify(error), {\n      status: 500,\n      headers: { 'Content-Type': 'application/json' },\n    })\n  }\n})\n"
      -
        type: bind
        source: ./volumes/functions/hello/index.ts
        target: /home/deno/functions/hello/index.ts
        content: "// Follow this setup guide to integrate the Deno language server with your editor:\n// https://deno.land/manual/getting_started/setup_your_environment\n// This enables autocomplete, go to definition, etc.\n\nimport { serve } from \"https://deno.land/std@0.177.1/http/server.ts\"\n\nserve(async () => {\n  return new Response(\n    `\"Hello from Edge Functions!\"`,\n    { headers: { \"Content-Type\": \"application/json\" } },\n  )\n})\n\n// To invoke:\n// curl 'http://localhost:<KONG_HTTP_PORT>/functions/v1/hello' \\\n//   --header 'Authorization: Bearer <anon/service_role API key>'\n"
    command:
      - start
      - '--main-service'
      - /home/deno/functions/main
  supabase-supavisor:
    image: 'supabase/supavisor:1.1.56'
    healthcheck:
      test:
        - CMD
        - curl
        - '-sSfL'
        - '-o'
        - /dev/null
        - 'http://127.0.0.1:4000/api/health'
      timeout: 5s
      interval: 5s
      retries: 10
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    environment:
      - POOLER_TENANT_ID=dev_tenant
      - POOLER_POOL_MODE=transaction
      - 'POOLER_DEFAULT_POOL_SIZE=${POOLER_DEFAULT_POOL_SIZE:-20}'
      - 'POOLER_MAX_CLIENT_CONN=${POOLER_MAX_CLIENT_CONN:-100}'
      - PORT=4000
      - 'POSTGRES_PORT=${POSTGRES_PORT:-5432}'
      - 'POSTGRES_HOSTNAME=${POSTGRES_HOSTNAME:-supabase-db}'
      - 'POSTGRES_DB=${POSTGRES_DB:-postgres}'
      - 'POSTGRES_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'DATABASE_URL=ecto://supabase_admin:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/_supabase'
      - CLUSTER_POSTGRES=true
      - 'SECRET_KEY_BASE=${SERVICE_PASSWORD_SUPAVISORSECRET}'
      - 'VAULT_ENC_KEY=${SERVICE_PASSWORD_VAULTENC}'
      - 'API_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'METRICS_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - REGION=local
      - 'ERL_AFLAGS=-proto_dist inet_tcp'
    command:
      - /bin/sh
      - '-c'
      - '/app/bin/migrate && /app/bin/supavisor eval "$$(cat /etc/pooler/pooler.exs)" && /app/bin/server'
    volumes:
      -
        type: bind
        source: ./volumes/pooler/pooler.exs
        target: /etc/pooler/pooler.exs
        content: "{:ok, _} = Application.ensure_all_started(:supavisor)\n{:ok, version} =\n    case Supavisor.Repo.query!(\"select version()\") do\n    %{rows: [[ver]]} -> Supavisor.Helpers.parse_pg_version(ver)\n    _ -> nil\n    end\nparams = %{\n    \"external_id\" => System.get_env(\"POOLER_TENANT_ID\"),\n    \"db_host\" => System.get_env(\"POSTGRES_HOSTNAME\"),\n    \"db_port\" => System.get_env(\"POSTGRES_PORT\") |> String.to_integer(),\n    \"db_database\" => System.get_env(\"POSTGRES_DB\"),\n    \"require_user\" => false,\n    \"auth_query\" => \"SELECT * FROM pgbouncer.get_auth($1)\",\n    \"default_max_clients\" => System.get_env(\"POOLER_MAX_CLIENT_CONN\"),\n    \"default_pool_size\" => System.get_env(\"POOLER_DEFAULT_POOL_SIZE\"),\n    \"default_parameter_status\" => %{\"server_version\" => version},\n    \"users\" => [%{\n    \"db_user\" => \"pgbouncer\",\n    \"db_password\" => System.get_env(\"POSTGRES_PASSWORD\"),\n    \"mode_type\" => System.get_env(\"POOLER_POOL_MODE\"),\n    \"pool_size\" => System.get_env(\"POOLER_DEFAULT_POOL_SIZE\"),\n    \"is_manager\" => true\n    }]\n}\n\ntenant = Supavisor.Tenants.get_tenant_by_external_id(params[\"external_id\"])\n\nif tenant do\n  {:ok, _} = Supavisor.Tenants.update_tenant(tenant, params)\nelse\n  {:ok, _} = Supavisor.Tenants.create_tenant(params)\nend\n"
",
+ "compose": "services:
  supabase-kong:
    image: 'kong:2.8.1'
    entrypoint: 'bash -c ''eval "echo \"$$(cat ~/temp.yml)\"" > ~/kong.yml && /docker-entrypoint.sh kong docker-start'''
    depends_on:
      supabase-analytics:
        condition: service_healthy
    environment:
      - SERVICE_FQDN_SUPABASEKONG_8000
      - 'KONG_PORT_MAPS=443:8000'
      - 'JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - KONG_DATABASE=off
      - KONG_DECLARATIVE_CONFIG=/home/kong/kong.yml
      - 'KONG_DNS_ORDER=LAST,A,CNAME'
      - 'KONG_PLUGINS=request-transformer,cors,key-auth,acl,basic-auth'
      - KONG_NGINX_PROXY_PROXY_BUFFER_SIZE=160k
      - 'KONG_NGINX_PROXY_PROXY_BUFFERS=64 160k'
      - 'SUPABASE_ANON_KEY=${SERVICE_SUPABASEANON_KEY}'
      - 'SUPABASE_SERVICE_KEY=${SERVICE_SUPABASESERVICE_KEY}'
      - 'DASHBOARD_USERNAME=${SERVICE_USER_ADMIN}'
      - 'DASHBOARD_PASSWORD=${SERVICE_PASSWORD_ADMIN}'
    volumes:
      -
        type: bind
        source: ./volumes/api/kong.yml
        target: /home/kong/temp.yml
        content: "_format_version: '2.1'\n_transform: true\n\n###\n### Consumers / Users\n###\nconsumers:\n  - username: DASHBOARD\n  - username: anon\n    keyauth_credentials:\n      - key: $SUPABASE_ANON_KEY\n  - username: service_role\n    keyauth_credentials:\n      - key: $SUPABASE_SERVICE_KEY\n\n###\n### Access Control List\n###\nacls:\n  - consumer: anon\n    group: anon\n  - consumer: service_role\n    group: admin\n\n###\n### Dashboard credentials\n###\nbasicauth_credentials:\n- consumer: DASHBOARD\n  username: $DASHBOARD_USERNAME\n  password: $DASHBOARD_PASSWORD\n\n\n###\n### API Routes\n###\nservices:\n\n  ## Open Auth routes\n  - name: auth-v1-open\n    url: http://supabase-auth:9999/verify\n    routes:\n      - name: auth-v1-open\n        strip_path: true\n        paths:\n          - /auth/v1/verify\n    plugins:\n      - name: cors\n  - name: auth-v1-open-callback\n    url: http://supabase-auth:9999/callback\n    routes:\n      - name: auth-v1-open-callback\n        strip_path: true\n        paths:\n          - /auth/v1/callback\n    plugins:\n      - name: cors\n  - name: auth-v1-open-authorize\n    url: http://supabase-auth:9999/authorize\n    routes:\n      - name: auth-v1-open-authorize\n        strip_path: true\n        paths:\n          - /auth/v1/authorize\n    plugins:\n      - name: cors\n\n  ## Secure Auth routes\n  - name: auth-v1\n    _comment: 'GoTrue: /auth/v1/* -> http://supabase-auth:9999/*'\n    url: http://supabase-auth:9999/\n    routes:\n      - name: auth-v1-all\n        strip_path: true\n        paths:\n          - /auth/v1/\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: false\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n\n  ## Secure REST routes\n  - name: rest-v1\n    _comment: 'PostgREST: /rest/v1/* -> http://supabase-rest:3000/*'\n    url: http://supabase-rest:3000/\n    routes:\n      - name: rest-v1-all\n        strip_path: true\n        paths:\n          - /rest/v1/\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: true\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n\n  ## Secure GraphQL routes\n  - name: graphql-v1\n    _comment: 'PostgREST: /graphql/v1/* -> http://supabase-rest:3000/rpc/graphql'\n    url: http://supabase-rest:3000/rpc/graphql\n    routes:\n      - name: graphql-v1-all\n        strip_path: true\n        paths:\n          - /graphql/v1\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: true\n      - name: request-transformer\n        config:\n          add:\n            headers:\n              - Content-Profile:graphql_public\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n\n  ## Secure Realtime routes\n  - name: realtime-v1-ws\n    _comment: 'Realtime: /realtime/v1/* -> ws://realtime:4000/socket/*'\n    url: http://realtime-dev:4000/socket\n    protocol: ws\n    routes:\n      - name: realtime-v1-ws\n        strip_path: true\n        paths:\n          - /realtime/v1/\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: false\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n  - name: realtime-v1-rest\n    _comment: 'Realtime: /realtime/v1/* -> ws://realtime:4000/socket/*'\n    url: http://realtime-dev:4000/api\n    protocol: http\n    routes:\n      - name: realtime-v1-rest\n        strip_path: true\n        paths:\n          - /realtime/v1/api\n    plugins:\n      - name: cors\n      - name: key-auth\n        config:\n          hide_credentials: false\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n            - anon\n\n  ## Storage routes: the storage server manages its own auth\n  - name: storage-v1\n    _comment: 'Storage: /storage/v1/* -> http://supabase-storage:5000/*'\n    url: http://supabase-storage:5000/\n    routes:\n      - name: storage-v1-all\n        strip_path: true\n        paths:\n          - /storage/v1/\n    plugins:\n      - name: cors\n\n  ## Edge Functions routes\n  - name: functions-v1\n    _comment: 'Edge Functions: /functions/v1/* -> http://supabase-edge-functions:9000/*'\n    url: http://supabase-edge-functions:9000/\n    routes:\n      - name: functions-v1-all\n        strip_path: true\n        paths:\n          - /functions/v1/\n    plugins:\n      - name: cors\n\n  ## Analytics routes\n  - name: analytics-v1\n    _comment: 'Analytics: /analytics/v1/* -> http://logflare:4000/*'\n    url: http://supabase-analytics:4000/\n    routes:\n      - name: analytics-v1-all\n        strip_path: true\n        paths:\n          - /analytics/v1/\n\n  ## Secure Database routes\n  - name: meta\n    _comment: 'pg-meta: /pg/* -> http://supabase-meta:8080/*'\n    url: http://supabase-meta:8080/\n    routes:\n      - name: meta-all\n        strip_path: true\n        paths:\n          - /pg/\n    plugins:\n      - name: key-auth\n        config:\n          hide_credentials: false\n      - name: acl\n        config:\n          hide_groups_header: true\n          allow:\n            - admin\n\n  ## Protected Dashboard - catch all remaining routes\n  - name: dashboard\n    _comment: 'Studio: /* -> http://studio:3000/*'\n    url: http://supabase-studio:3000/\n    routes:\n      - name: dashboard-all\n        strip_path: true\n        paths:\n          - /\n    plugins:\n      - name: cors\n      - name: basic-auth\n        config:\n          hide_credentials: true\n"
  supabase-studio:
    image: 'supabase/studio:20241202-71e5240'
    healthcheck:
      test:
        - CMD
        - node
        - '-e'
        - "require('http').get('http://127.0.0.1:3000/api/profile', (r) => {if (r.statusCode !== 200) process.exit(1); else process.exit(0); }).on('error', () => process.exit(1))"
      timeout: 5s
      interval: 5s
      retries: 3
    depends_on:
      supabase-analytics:
        condition: service_healthy
    environment:
      - HOSTNAME=0.0.0.0
      - 'STUDIO_PG_META_URL=http://supabase-meta:8080'
      - 'POSTGRES_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'DEFAULT_ORGANIZATION_NAME=${STUDIO_DEFAULT_ORGANIZATION:-Default Organization}'
      - 'DEFAULT_PROJECT_NAME=${STUDIO_DEFAULT_PROJECT:-Default Project}'
      - 'SUPABASE_URL=http://supabase-kong:8000'
      - 'SUPABASE_PUBLIC_URL=${SERVICE_FQDN_SUPABASEKONG}'
      - 'SUPABASE_ANON_KEY=${SERVICE_SUPABASEANON_KEY}'
      - 'SUPABASE_SERVICE_KEY=${SERVICE_SUPABASESERVICE_KEY}'
      - 'AUTH_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'LOGFLARE_API_KEY=${SERVICE_PASSWORD_LOGFLARE}'
      - 'LOGFLARE_URL=http://supabase-analytics:4000'
      - 'SUPABASE_PUBLIC_API=${SERVICE_FQDN_SUPABASEKONG}'
      - NEXT_PUBLIC_ENABLE_LOGS=true
      - NEXT_ANALYTICS_BACKEND_PROVIDER=postgres
      - 'OPENAI_API_KEY=${OPENAI_API_KEY}'
  supabase-db:
    image: 'supabase/postgres:15.8.1.048'
    healthcheck:
      test: 'pg_isready -U postgres -h 127.0.0.1'
      interval: 5s
      timeout: 5s
      retries: 10
    depends_on:
      supabase-vector:
        condition: service_healthy
    command:
      - postgres
      - '-c'
      - config_file=/etc/postgresql/postgresql.conf
      - '-c'
      - log_min_messages=fatal
    environment:
      - POSTGRES_HOST=/var/run/postgresql
      - 'PGPORT=${POSTGRES_PORT:-5432}'
      - 'POSTGRES_PORT=${POSTGRES_PORT:-5432}'
      - 'PGPASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'POSTGRES_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'PGDATABASE=${POSTGRES_DB:-postgres}'
      - 'POSTGRES_DB=${POSTGRES_DB:-postgres}'
      - 'JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'JWT_EXP=${JWT_EXPIRY:-3600}'
    volumes:
      - 'supabase-db-data:/var/lib/postgresql/data'
      -
        type: bind
        source: ./volumes/db/realtime.sql
        target: /docker-entrypoint-initdb.d/migrations/99-realtime.sql
        content: "\\set pguser `echo \"supabase_admin\"`\n\ncreate schema if not exists _realtime;\nalter schema _realtime owner to :pguser;\n"
      -
        type: bind
        source: ./volumes/db/_supabase.sql
        target: /docker-entrypoint-initdb.d/migrations/97-_supabase.sql
        content: "\\set pguser `echo \"$POSTGRES_USER\"`\n\nCREATE DATABASE _supabase WITH OWNER :pguser;\n"
      -
        type: bind
        source: ./volumes/db/pooler.sql
        target: /docker-entrypoint-initdb.d/migrations/99-pooler.sql
        content: "\\set pguser `echo \"supabase_admin\"`\n\\c _supabase\ncreate schema if not exists _supavisor;\nalter schema _supavisor owner to :pguser;\n\\c postgres\n"
      -
        type: bind
        source: ./volumes/db/webhooks.sql
        target: /docker-entrypoint-initdb.d/init-scripts/98-webhooks.sql
        content: "BEGIN;\n-- Create pg_net extension\nCREATE EXTENSION IF NOT EXISTS pg_net SCHEMA extensions;\n-- Create supabase_functions schema\nCREATE SCHEMA supabase_functions AUTHORIZATION supabase_admin;\nGRANT USAGE ON SCHEMA supabase_functions TO postgres, anon, authenticated, service_role;\nALTER DEFAULT PRIVILEGES IN SCHEMA supabase_functions GRANT ALL ON TABLES TO postgres, anon, authenticated, service_role;\nALTER DEFAULT PRIVILEGES IN SCHEMA supabase_functions GRANT ALL ON FUNCTIONS TO postgres, anon, authenticated, service_role;\nALTER DEFAULT PRIVILEGES IN SCHEMA supabase_functions GRANT ALL ON SEQUENCES TO postgres, anon, authenticated, service_role;\n-- supabase_functions.migrations definition\nCREATE TABLE supabase_functions.migrations (\n  version text PRIMARY KEY,\n  inserted_at timestamptz NOT NULL DEFAULT NOW()\n);\n-- Initial supabase_functions migration\nINSERT INTO supabase_functions.migrations (version) VALUES ('initial');\n-- supabase_functions.hooks definition\nCREATE TABLE supabase_functions.hooks (\n  id bigserial PRIMARY KEY,\n  hook_table_id integer NOT NULL,\n  hook_name text NOT NULL,\n  created_at timestamptz NOT NULL DEFAULT NOW(),\n  request_id bigint\n);\nCREATE INDEX supabase_functions_hooks_request_id_idx ON supabase_functions.hooks USING btree (request_id);\nCREATE INDEX supabase_functions_hooks_h_table_id_h_name_idx ON supabase_functions.hooks USING btree (hook_table_id, hook_name);\nCOMMENT ON TABLE supabase_functions.hooks IS 'Supabase Functions Hooks: Audit trail for triggered hooks.';\nCREATE FUNCTION supabase_functions.http_request()\n  RETURNS trigger\n  LANGUAGE plpgsql\n  AS $function$\n  DECLARE\n    request_id bigint;\n    payload jsonb;\n    url text := TG_ARGV[0]::text;\n    method text := TG_ARGV[1]::text;\n    headers jsonb DEFAULT '{}'::jsonb;\n    params jsonb DEFAULT '{}'::jsonb;\n    timeout_ms integer DEFAULT 1000;\n  BEGIN\n    IF url IS NULL OR url = 'null' THEN\n      RAISE EXCEPTION 'url argument is missing';\n    END IF;\n\n    IF method IS NULL OR method = 'null' THEN\n      RAISE EXCEPTION 'method argument is missing';\n    END IF;\n\n    IF TG_ARGV[2] IS NULL OR TG_ARGV[2] = 'null' THEN\n      headers = '{\"Content-Type\": \"application/json\"}'::jsonb;\n    ELSE\n      headers = TG_ARGV[2]::jsonb;\n    END IF;\n\n    IF TG_ARGV[3] IS NULL OR TG_ARGV[3] = 'null' THEN\n      params = '{}'::jsonb;\n    ELSE\n      params = TG_ARGV[3]::jsonb;\n    END IF;\n\n    IF TG_ARGV[4] IS NULL OR TG_ARGV[4] = 'null' THEN\n      timeout_ms = 1000;\n    ELSE\n      timeout_ms = TG_ARGV[4]::integer;\n    END IF;\n\n    CASE\n      WHEN method = 'GET' THEN\n        SELECT http_get INTO request_id FROM net.http_get(\n          url,\n          params,\n          headers,\n          timeout_ms\n        );\n      WHEN method = 'POST' THEN\n        payload = jsonb_build_object(\n          'old_record', OLD,\n          'record', NEW,\n          'type', TG_OP,\n          'table', TG_TABLE_NAME,\n          'schema', TG_TABLE_SCHEMA\n        );\n\n        SELECT http_post INTO request_id FROM net.http_post(\n          url,\n          payload,\n          params,\n          headers,\n          timeout_ms\n        );\n      ELSE\n        RAISE EXCEPTION 'method argument % is invalid', method;\n    END CASE;\n\n    INSERT INTO supabase_functions.hooks\n      (hook_table_id, hook_name, request_id)\n    VALUES\n      (TG_RELID, TG_NAME, request_id);\n\n    RETURN NEW;\n  END\n$function$;\n-- Supabase super admin\nDO\n$$\nBEGIN\n  IF NOT EXISTS (\n    SELECT 1\n    FROM pg_roles\n    WHERE rolname = 'supabase_functions_admin'\n  )\n  THEN\n    CREATE USER supabase_functions_admin NOINHERIT CREATEROLE LOGIN NOREPLICATION;\n  END IF;\nEND\n$$;\nGRANT ALL PRIVILEGES ON SCHEMA supabase_functions TO supabase_functions_admin;\nGRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA supabase_functions TO supabase_functions_admin;\nGRANT ALL PRIVILEGES ON ALL SEQUENCES IN SCHEMA supabase_functions TO supabase_functions_admin;\nALTER USER supabase_functions_admin SET search_path = \"supabase_functions\";\nALTER table \"supabase_functions\".migrations OWNER TO supabase_functions_admin;\nALTER table \"supabase_functions\".hooks OWNER TO supabase_functions_admin;\nALTER function \"supabase_functions\".http_request() OWNER TO supabase_functions_admin;\nGRANT supabase_functions_admin TO postgres;\n-- Remove unused supabase_pg_net_admin role\nDO\n$$\nBEGIN\n  IF EXISTS (\n    SELECT 1\n    FROM pg_roles\n    WHERE rolname = 'supabase_pg_net_admin'\n  )\n  THEN\n    REASSIGN OWNED BY supabase_pg_net_admin TO supabase_admin;\n    DROP OWNED BY supabase_pg_net_admin;\n    DROP ROLE supabase_pg_net_admin;\n  END IF;\nEND\n$$;\n-- pg_net grants when extension is already enabled\nDO\n$$\nBEGIN\n  IF EXISTS (\n    SELECT 1\n    FROM pg_extension\n    WHERE extname = 'pg_net'\n  )\n  THEN\n    GRANT USAGE ON SCHEMA net TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n    ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;\n    ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;\n    ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;\n    ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;\n    REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;\n    REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;\n    GRANT EXECUTE ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n    GRANT EXECUTE ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n  END IF;\nEND\n$$;\n-- Event trigger for pg_net\nCREATE OR REPLACE FUNCTION extensions.grant_pg_net_access()\nRETURNS event_trigger\nLANGUAGE plpgsql\nAS $$\nBEGIN\n  IF EXISTS (\n    SELECT 1\n    FROM pg_event_trigger_ddl_commands() AS ev\n    JOIN pg_extension AS ext\n    ON ev.objid = ext.oid\n    WHERE ext.extname = 'pg_net'\n  )\n  THEN\n    GRANT USAGE ON SCHEMA net TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n    ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;\n    ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SECURITY DEFINER;\n    ALTER function net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;\n    ALTER function net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) SET search_path = net;\n    REVOKE ALL ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;\n    REVOKE ALL ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) FROM PUBLIC;\n    GRANT EXECUTE ON FUNCTION net.http_get(url text, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n    GRANT EXECUTE ON FUNCTION net.http_post(url text, body jsonb, params jsonb, headers jsonb, timeout_milliseconds integer) TO supabase_functions_admin, postgres, anon, authenticated, service_role;\n  END IF;\nEND;\n$$;\nCOMMENT ON FUNCTION extensions.grant_pg_net_access IS 'Grants access to pg_net';\nDO\n$$\nBEGIN\n  IF NOT EXISTS (\n    SELECT 1\n    FROM pg_event_trigger\n    WHERE evtname = 'issue_pg_net_access'\n  ) THEN\n    CREATE EVENT TRIGGER issue_pg_net_access ON ddl_command_end WHEN TAG IN ('CREATE EXTENSION')\n    EXECUTE PROCEDURE extensions.grant_pg_net_access();\n  END IF;\nEND\n$$;\nINSERT INTO supabase_functions.migrations (version) VALUES ('20210809183423_update_grants');\nALTER function supabase_functions.http_request() SECURITY DEFINER;\nALTER function supabase_functions.http_request() SET search_path = supabase_functions;\nREVOKE ALL ON FUNCTION supabase_functions.http_request() FROM PUBLIC;\nGRANT EXECUTE ON FUNCTION supabase_functions.http_request() TO postgres, anon, authenticated, service_role;\nCOMMIT;\n"
      -
        type: bind
        source: ./volumes/db/roles.sql
        target: /docker-entrypoint-initdb.d/init-scripts/99-roles.sql
        content: "-- NOTE: change to your own passwords for production environments\n \\set pgpass `echo \"$POSTGRES_PASSWORD\"`\n\n ALTER USER authenticator WITH PASSWORD :'pgpass';\n ALTER USER pgbouncer WITH PASSWORD :'pgpass';\n ALTER USER supabase_auth_admin WITH PASSWORD :'pgpass';\n ALTER USER supabase_functions_admin WITH PASSWORD :'pgpass';\n ALTER USER supabase_storage_admin WITH PASSWORD :'pgpass';\n"
      -
        type: bind
        source: ./volumes/db/jwt.sql
        target: /docker-entrypoint-initdb.d/init-scripts/99-jwt.sql
        content: "\\set jwt_secret `echo \"$JWT_SECRET\"`\n\\set jwt_exp `echo \"$JWT_EXP\"`\n\\set db_name `echo \"${POSTGRES_DB:-postgres}\"`\n\nALTER DATABASE :db_name SET \"app.settings.jwt_secret\" TO :'jwt_secret';\nALTER DATABASE :db_name SET \"app.settings.jwt_exp\" TO :'jwt_exp';\n"
      -
        type: bind
        source: ./volumes/db/logs.sql
        target: /docker-entrypoint-initdb.d/migrations/99-logs.sql
        content: "\\set pguser `echo \"supabase_admin\"`\n\\c _supabase\ncreate schema if not exists _analytics;\nalter schema _analytics owner to :pguser;\n\\c postgres\n"
      - 'supabase-db-config:/etc/postgresql-custom'
  supabase-analytics:
    image: 'supabase/logflare:1.4.0'
    healthcheck:
      test:
        - CMD
        - curl
        - 'http://127.0.0.1:4000/health'
      timeout: 5s
      interval: 5s
      retries: 10
    depends_on:
      supabase-db:
        condition: service_healthy
    environment:
      - LOGFLARE_NODE_HOST=127.0.0.1
      - DB_USERNAME=supabase_admin
      - DB_DATABASE=_supabase
      - 'DB_HOSTNAME=${POSTGRES_HOSTNAME:-supabase-db}'
      - 'DB_PORT=${POSTGRES_PORT:-5432}'
      - 'DB_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - DB_SCHEMA=_analytics
      - 'LOGFLARE_API_KEY=${SERVICE_PASSWORD_LOGFLARE}'
      - LOGFLARE_SINGLE_TENANT=true
      - LOGFLARE_SINGLE_TENANT_MODE=true
      - LOGFLARE_SUPABASE_MODE=true
      - LOGFLARE_MIN_CLUSTER_SIZE=1
      - 'POSTGRES_BACKEND_URL=postgresql://supabase_admin:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/_supabase'
      - POSTGRES_BACKEND_SCHEMA=_analytics
      - LOGFLARE_FEATURE_FLAG_OVERRIDE=multibackend=true
  supabase-vector:
    image: 'timberio/vector:0.28.1-alpine'
    healthcheck:
      test:
        - CMD
        - wget
        - '--no-verbose'
        - '--tries=1'
        - '--spider'
        - 'http://supabase-vector:9001/health'
      timeout: 5s
      interval: 5s
      retries: 3
    volumes:
      -
        type: bind
        source: ./volumes/logs/vector.yml
        target: /etc/vector/vector.yml
        read_only: true
        content: "api:\n  enabled: true\n  address: 0.0.0.0:9001\n\nsources:\n  docker_host:\n    type: docker_logs\n    exclude_containers:\n      - supabase-vector\n\ntransforms:\n  project_logs:\n    type: remap\n    inputs:\n      - docker_host\n    source: |-\n      .project = \"default\"\n      .event_message = del(.message)\n      .appname = del(.container_name)\n      del(.container_created_at)\n      del(.container_id)\n      del(.source_type)\n      del(.stream)\n      del(.label)\n      del(.image)\n      del(.host)\n      del(.stream)\n  router:\n    type: route\n    inputs:\n      - project_logs\n    route:\n      kong: 'starts_with(string!(.appname), \"supabase-kong\")'\n      auth: 'starts_with(string!(.appname), \"supabase-auth\")'\n      rest: 'starts_with(string!(.appname), \"supabase-rest\")'\n      realtime: 'starts_with(string!(.appname), \"realtime-dev\")'\n      storage: 'starts_with(string!(.appname), \"supabase-storage\")'\n      functions: 'starts_with(string!(.appname), \"supabase-functions\")'\n      db: 'starts_with(string!(.appname), \"supabase-db\")'\n  # Ignores non nginx errors since they are related with kong booting up\n  kong_logs:\n    type: remap\n    inputs:\n      - router.kong\n    source: |-\n      req, err = parse_nginx_log(.event_message, \"combined\")\n      if err == null {\n          .timestamp = req.timestamp\n          .metadata.request.headers.referer = req.referer\n          .metadata.request.headers.user_agent = req.agent\n          .metadata.request.headers.cf_connecting_ip = req.client\n          .metadata.request.method = req.method\n          .metadata.request.path = req.path\n          .metadata.request.protocol = req.protocol\n          .metadata.response.status_code = req.status\n      }\n      if err != null {\n        abort\n      }\n  # Ignores non nginx errors since they are related with kong booting up\n  kong_err:\n    type: remap\n    inputs:\n      - router.kong\n    source: |-\n      .metadata.request.method = \"GET\"\n      .metadata.response.status_code = 200\n      parsed, err = parse_nginx_log(.event_message, \"error\")\n      if err == null {\n          .timestamp = parsed.timestamp\n          .severity = parsed.severity\n          .metadata.request.host = parsed.host\n          .metadata.request.headers.cf_connecting_ip = parsed.client\n          url, err = split(parsed.request, \" \")\n          if err == null {\n              .metadata.request.method = url[0]\n              .metadata.request.path = url[1]\n              .metadata.request.protocol = url[2]\n          }\n      }\n      if err != null {\n        abort\n      }\n  # Gotrue logs are structured json strings which frontend parses directly. But we keep metadata for consistency.\n  auth_logs:\n    type: remap\n    inputs:\n      - router.auth\n    source: |-\n      parsed, err = parse_json(.event_message)\n      if err == null {\n          .metadata.timestamp = parsed.time\n          .metadata = merge!(.metadata, parsed)\n      }\n  # PostgREST logs are structured so we separate timestamp from message using regex\n  rest_logs:\n    type: remap\n    inputs:\n      - router.rest\n    source: |-\n      parsed, err = parse_regex(.event_message, r'^(?P<time>.*): (?P<msg>.*)$')\n      if err == null {\n          .event_message = parsed.msg\n          .timestamp = to_timestamp!(parsed.time)\n          .metadata.host = .project\n      }\n  # Realtime logs are structured so we parse the severity level using regex (ignore time because it has no date)\n  realtime_logs:\n    type: remap\n    inputs:\n      - router.realtime\n    source: |-\n      .metadata.project = del(.project)\n      .metadata.external_id = .metadata.project\n      parsed, err = parse_regex(.event_message, r'^(?P<time>\\d+:\\d+:\\d+\\.\\d+) \\[(?P<level>\\w+)\\] (?P<msg>.*)$')\n      if err == null {\n          .event_message = parsed.msg\n          .metadata.level = parsed.level\n      }\n  # Storage logs may contain json objects so we parse them for completeness\n  storage_logs:\n    type: remap\n    inputs:\n      - router.storage\n    source: |-\n      .metadata.project = del(.project)\n      .metadata.tenantId = .metadata.project\n      parsed, err = parse_json(.event_message)\n      if err == null {\n          .event_message = parsed.msg\n          .metadata.level = parsed.level\n          .metadata.timestamp = parsed.time\n          .metadata.context[0].host = parsed.hostname\n          .metadata.context[0].pid = parsed.pid\n      }\n  # Postgres logs some messages to stderr which we map to warning severity level\n  db_logs:\n    type: remap\n    inputs:\n      - router.db\n    source: |-\n      .metadata.host = \"db-default\"\n      .metadata.parsed.timestamp = .timestamp\n\n      parsed, err = parse_regex(.event_message, r'.*(?P<level>INFO|NOTICE|WARNING|ERROR|LOG|FATAL|PANIC?):.*', numeric_groups: true)\n\n      if err != null || parsed == null {\n        .metadata.parsed.error_severity = \"info\"\n      }\n      if parsed != null {\n      .metadata.parsed.error_severity = parsed.level\n      }\n      if .metadata.parsed.error_severity == \"info\" {\n          .metadata.parsed.error_severity = \"log\"\n      }\n      .metadata.parsed.error_severity = upcase!(.metadata.parsed.error_severity)\n\nsinks:\n  logflare_auth:\n    type: 'http'\n    inputs:\n      - auth_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=gotrue.logs.prod&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_realtime:\n    type: 'http'\n    inputs:\n      - realtime_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=realtime.logs.prod&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_rest:\n    type: 'http'\n    inputs:\n      - rest_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=postgREST.logs.prod&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_db:\n    type: 'http'\n    inputs:\n      - db_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    # We must route the sink through kong because ingesting logs before logflare is fully initialised will\n    # lead to broken queries from studio. This works by the assumption that containers are started in the\n    # following order: vector > db > logflare > kong\n    uri: 'http://supabase-kong:8000/analytics/v1/api/logs?source_name=postgres.logs&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_functions:\n    type: 'http'\n    inputs:\n      - router.functions\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=deno-relay-logs&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_storage:\n    type: 'http'\n    inputs:\n      - storage_logs\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=storage.logs.prod.2&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n  logflare_kong:\n    type: 'http'\n    inputs:\n      - kong_logs\n      - kong_err\n    encoding:\n      codec: 'json'\n    method: 'post'\n    request:\n      retry_max_duration_secs: 10\n    uri: 'http://supabase-analytics:4000/api/logs?source_name=cloudflare.logs.prod&api_key=${LOGFLARE_API_KEY?LOGFLARE_API_KEY is required}'\n"
      - '/var/run/docker.sock:/var/run/docker.sock:ro'
    environment:
      - 'LOGFLARE_API_KEY=${SERVICE_PASSWORD_LOGFLARE}'
    command:
      - '--config'
      - etc/vector/vector.yml
  supabase-rest:
    image: 'postgrest/postgrest:v12.2.0'
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    environment:
      - 'PGRST_DB_URI=postgres://authenticator:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/${POSTGRES_DB:-postgres}'
      - 'PGRST_DB_SCHEMAS=${PGRST_DB_SCHEMAS:-public,storage,graphql_public}'
      - PGRST_DB_ANON_ROLE=anon
      - 'PGRST_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - PGRST_DB_USE_LEGACY_GUCS=false
      - 'PGRST_APP_SETTINGS_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'PGRST_APP_SETTINGS_JWT_EXP=${JWT_EXPIRY:-3600}'
    command: postgrest
    exclude_from_hc: true
  supabase-auth:
    image: 'supabase/gotrue:v2.164.0'
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    healthcheck:
      test:
        - CMD
        - wget
        - '--no-verbose'
        - '--tries=1'
        - '--spider'
        - 'http://127.0.0.1:9999/health'
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - GOTRUE_API_HOST=0.0.0.0
      - GOTRUE_API_PORT=9999
      - 'API_EXTERNAL_URL=${API_EXTERNAL_URL:-http://supabase-kong:8000}'
      - GOTRUE_DB_DRIVER=postgres
      - 'GOTRUE_DB_DATABASE_URL=postgres://supabase_auth_admin:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/${POSTGRES_DB:-postgres}'
      - 'GOTRUE_SITE_URL=${SERVICE_FQDN_SUPABASEKONG}'
      - 'GOTRUE_URI_ALLOW_LIST=${ADDITIONAL_REDIRECT_URLS}'
      - 'GOTRUE_DISABLE_SIGNUP=${DISABLE_SIGNUP:-false}'
      - GOTRUE_JWT_ADMIN_ROLES=service_role
      - GOTRUE_JWT_AUD=authenticated
      - GOTRUE_JWT_DEFAULT_GROUP_NAME=authenticated
      - 'GOTRUE_JWT_EXP=${JWT_EXPIRY:-3600}'
      - 'GOTRUE_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'GOTRUE_EXTERNAL_EMAIL_ENABLED=${ENABLE_EMAIL_SIGNUP:-true}'
      - 'GOTRUE_EXTERNAL_ANONYMOUS_USERS_ENABLED=${ENABLE_ANONYMOUS_USERS:-false}'
      - 'GOTRUE_MAILER_AUTOCONFIRM=${ENABLE_EMAIL_AUTOCONFIRM:-false}'
      - 'GOTRUE_SMTP_ADMIN_EMAIL=${SMTP_ADMIN_EMAIL}'
      - 'GOTRUE_SMTP_HOST=${SMTP_HOST}'
      - 'GOTRUE_SMTP_PORT=${SMTP_PORT:-587}'
      - 'GOTRUE_SMTP_USER=${SMTP_USER}'
      - 'GOTRUE_SMTP_PASS=${SMTP_PASS}'
      - 'GOTRUE_SMTP_SENDER_NAME=${SMTP_SENDER_NAME}'
      - 'GOTRUE_MAILER_URLPATHS_INVITE=${MAILER_URLPATHS_INVITE:-/auth/v1/verify}'
      - 'GOTRUE_MAILER_URLPATHS_CONFIRMATION=${MAILER_URLPATHS_CONFIRMATION:-/auth/v1/verify}'
      - 'GOTRUE_MAILER_URLPATHS_RECOVERY=${MAILER_URLPATHS_RECOVERY:-/auth/v1/verify}'
      - 'GOTRUE_MAILER_URLPATHS_EMAIL_CHANGE=${MAILER_URLPATHS_EMAIL_CHANGE:-/auth/v1/verify}'
      - 'GOTRUE_MAILER_TEMPLATES_INVITE=${MAILER_TEMPLATES_INVITE}'
      - 'GOTRUE_MAILER_TEMPLATES_CONFIRMATION=${MAILER_TEMPLATES_CONFIRMATION}'
      - 'GOTRUE_MAILER_TEMPLATES_RECOVERY=${MAILER_TEMPLATES_RECOVERY}'
      - 'GOTRUE_MAILER_TEMPLATES_MAGIC_LINK=${MAILER_TEMPLATES_MAGIC_LINK}'
      - 'GOTRUE_MAILER_TEMPLATES_EMAIL_CHANGE=${MAILER_TEMPLATES_EMAIL_CHANGE}'
      - 'GOTRUE_MAILER_SUBJECTS_CONFIRMATION=${MAILER_SUBJECTS_CONFIRMATION}'
      - 'GOTRUE_MAILER_SUBJECTS_RECOVERY=${MAILER_SUBJECTS_RECOVERY}'
      - 'GOTRUE_MAILER_SUBJECTS_MAGIC_LINK=${MAILER_SUBJECTS_MAGIC_LINK}'
      - 'GOTRUE_MAILER_SUBJECTS_EMAIL_CHANGE=${MAILER_SUBJECTS_EMAIL_CHANGE}'
      - 'GOTRUE_MAILER_SUBJECTS_INVITE=${MAILER_SUBJECTS_INVITE}'
      - 'GOTRUE_EXTERNAL_PHONE_ENABLED=${ENABLE_PHONE_SIGNUP:-true}'
      - 'GOTRUE_SMS_AUTOCONFIRM=${ENABLE_PHONE_AUTOCONFIRM:-true}'
  realtime-dev:
    image: 'supabase/realtime:v2.33.70'
    container_name: realtime-dev.supabase-realtime
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    healthcheck:
      test:
        - CMD
        - curl
        - '-sSfL'
        - '--head'
        - '-o'
        - /dev/null
        - '-H'
        - 'Authorization: Bearer ${SERVICE_SUPABASEANON_KEY}'
        - 'http://127.0.0.1:4000/api/tenants/realtime-dev/health'
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - PORT=4000
      - 'DB_HOST=${POSTGRES_HOSTNAME:-supabase-db}'
      - 'DB_PORT=${POSTGRES_PORT:-5432}'
      - DB_USER=supabase_admin
      - 'DB_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'DB_NAME=${POSTGRES_DB:-postgres}'
      - 'DB_AFTER_CONNECT_QUERY=SET search_path TO _realtime'
      - DB_ENC_KEY=supabaserealtime
      - 'API_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - FLY_ALLOC_ID=fly123
      - FLY_APP_NAME=realtime
      - 'SECRET_KEY_BASE=${SECRET_PASSWORD_REALTIME}'
      - 'ERL_AFLAGS=-proto_dist inet_tcp'
      - ENABLE_TAILSCALE=false
      - "DNS_NODES=''"
      - RLIMIT_NOFILE=10000
      - APP_NAME=realtime
      - SEED_SELF_HOST=true
      - LOG_LEVEL=error
      - RUN_JANITOR=true
      - JANITOR_INTERVAL=60000
    command: "sh -c \"/app/bin/migrate && /app/bin/realtime eval 'Realtime.Release.seeds(Realtime.Repo)' && /app/bin/server\"\n"
  supabase-minio:
    image: minio/minio
    environment:
      - 'MINIO_ROOT_USER=${SERVICE_USER_MINIO}'
      - 'MINIO_ROOT_PASSWORD=${SERVICE_PASSWORD_MINIO}'
    command: 'server --console-address ":9001" /data'
    healthcheck:
      test: 'sleep 5 && exit 0'
      interval: 2s
      timeout: 10s
      retries: 5
    volumes:
      - './volumes/storage:/data'
  minio-createbucket:
    image: minio/mc
    restart: 'no'
    environment:
      - 'MINIO_ROOT_USER=${SERVICE_USER_MINIO}'
      - 'MINIO_ROOT_PASSWORD=${SERVICE_PASSWORD_MINIO}'
    depends_on:
      supabase-minio:
        condition: service_healthy
    entrypoint:
      - /entrypoint.sh
    volumes:
      -
        type: bind
        source: ./entrypoint.sh
        target: /entrypoint.sh
        content: "#!/bin/sh\n/usr/bin/mc alias set supabase-minio http://supabase-minio:9000 ${MINIO_ROOT_USER} ${MINIO_ROOT_PASSWORD};\n/usr/bin/mc mb --ignore-existing supabase-minio/stub;\nexit 0\n"
  supabase-storage:
    image: 'supabase/storage-api:v1.14.6'
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-rest:
        condition: service_started
      imgproxy:
        condition: service_started
    healthcheck:
      test:
        - CMD
        - wget
        - '--no-verbose'
        - '--tries=1'
        - '--spider'
        - 'http://127.0.0.1:5000/status'
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - SERVER_PORT=5000
      - SERVER_REGION=local
      - MULTI_TENANT=false
      - 'AUTH_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'DATABASE_URL=postgres://supabase_storage_admin:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/${POSTGRES_DB:-postgres}'
      - DB_INSTALL_ROLES=false
      - STORAGE_BACKEND=s3
      - STORAGE_S3_BUCKET=stub
      - 'STORAGE_S3_ENDPOINT=http://supabase-minio:9000'
      - STORAGE_S3_FORCE_PATH_STYLE=true
      - STORAGE_S3_REGION=us-east-1
      - 'AWS_ACCESS_KEY_ID=${SERVICE_USER_MINIO}'
      - 'AWS_SECRET_ACCESS_KEY=${SERVICE_PASSWORD_MINIO}'
      - UPLOAD_FILE_SIZE_LIMIT=524288000
      - UPLOAD_FILE_SIZE_LIMIT_STANDARD=524288000
      - UPLOAD_SIGNED_URL_EXPIRATION_TIME=120
      - TUS_URL_PATH=upload/resumable
      - TUS_MAX_SIZE=3600000
      - ENABLE_IMAGE_TRANSFORMATION=true
      - 'IMGPROXY_URL=http://imgproxy:8080'
      - IMGPROXY_REQUEST_TIMEOUT=15
      - DATABASE_SEARCH_PATH=storage
      - NODE_ENV=production
      - REQUEST_ALLOW_X_FORWARDED_PATH=true
    volumes:
      - './volumes/storage:/var/lib/storage'
  imgproxy:
    image: 'darthsim/imgproxy:v3.8.0'
    healthcheck:
      test:
        - CMD
        - imgproxy
        - health
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - IMGPROXY_LOCAL_FILESYSTEM_ROOT=/
      - IMGPROXY_USE_ETAG=true
      - 'IMGPROXY_ENABLE_WEBP_DETECTION=${IMGPROXY_ENABLE_WEBP_DETECTION:-true}'
    volumes:
      - './volumes/storage:/var/lib/storage'
  supabase-meta:
    image: 'supabase/postgres-meta:v0.84.2'
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    environment:
      - PG_META_PORT=8080
      - 'PG_META_DB_HOST=${POSTGRES_HOSTNAME:-supabase-db}'
      - 'PG_META_DB_PORT=${POSTGRES_PORT:-5432}'
      - 'PG_META_DB_NAME=${POSTGRES_DB:-postgres}'
      - PG_META_DB_USER=supabase_admin
      - 'PG_META_DB_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
  supabase-edge-functions:
    image: 'supabase/edge-runtime:v1.65.3'
    depends_on:
      supabase-analytics:
        condition: service_healthy
    healthcheck:
      test:
        - CMD
        - echo
        - 'Edge Functions is healthy'
      timeout: 5s
      interval: 5s
      retries: 3
    environment:
      - 'JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'SUPABASE_URL=${SERVICE_FQDN_SUPABASEKONG}'
      - 'SUPABASE_ANON_KEY=${SERVICE_SUPABASEANON_KEY}'
      - 'SUPABASE_SERVICE_ROLE_KEY=${SERVICE_SUPABASESERVICE_KEY}'
      - 'SUPABASE_DB_URL=postgresql://postgres:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/${POSTGRES_DB:-postgres}'
      - 'VERIFY_JWT=${FUNCTIONS_VERIFY_JWT:-false}'
    volumes:
      - './volumes/functions:/home/deno/functions'
      -
        type: bind
        source: ./volumes/functions/main/index.ts
        target: /home/deno/functions/main/index.ts
        content: "import { serve } from 'https://deno.land/std@0.131.0/http/server.ts'\nimport * as jose from 'https://deno.land/x/jose@v4.14.4/index.ts'\n\nconsole.log('main function started')\n\nconst JWT_SECRET = Deno.env.get('JWT_SECRET')\nconst VERIFY_JWT = Deno.env.get('VERIFY_JWT') === 'true'\n\nfunction getAuthToken(req: Request) {\n  const authHeader = req.headers.get('authorization')\n  if (!authHeader) {\n    throw new Error('Missing authorization header')\n  }\n  const [bearer, token] = authHeader.split(' ')\n  if (bearer !== 'Bearer') {\n    throw new Error(`Auth header is not 'Bearer {token}'`)\n  }\n  return token\n}\n\nasync function verifyJWT(jwt: string): Promise<boolean> {\n  const encoder = new TextEncoder()\n  const secretKey = encoder.encode(JWT_SECRET)\n  try {\n    await jose.jwtVerify(jwt, secretKey)\n  } catch (err) {\n    console.error(err)\n    return false\n  }\n  return true\n}\n\nserve(async (req: Request) => {\n  if (req.method !== 'OPTIONS' && VERIFY_JWT) {\n    try {\n      const token = getAuthToken(req)\n      const isValidJWT = await verifyJWT(token)\n\n      if (!isValidJWT) {\n        return new Response(JSON.stringify({ msg: 'Invalid JWT' }), {\n          status: 401,\n          headers: { 'Content-Type': 'application/json' },\n        })\n      }\n    } catch (e) {\n      console.error(e)\n      return new Response(JSON.stringify({ msg: e.toString() }), {\n        status: 401,\n        headers: { 'Content-Type': 'application/json' },\n      })\n    }\n  }\n\n  const url = new URL(req.url)\n  const { pathname } = url\n  const path_parts = pathname.split('/')\n  const service_name = path_parts[1]\n\n  if (!service_name || service_name === '') {\n    const error = { msg: 'missing function name in request' }\n    return new Response(JSON.stringify(error), {\n      status: 400,\n      headers: { 'Content-Type': 'application/json' },\n    })\n  }\n\n  const servicePath = `/home/deno/functions/${service_name}`\n  console.error(`serving the request with ${servicePath}`)\n\n  const memoryLimitMb = 150\n  const workerTimeoutMs = 1 * 60 * 1000\n  const noModuleCache = false\n  const importMapPath = null\n  const envVarsObj = Deno.env.toObject()\n  const envVars = Object.keys(envVarsObj).map((k) => [k, envVarsObj[k]])\n\n  try {\n    const worker = await EdgeRuntime.userWorkers.create({\n      servicePath,\n      memoryLimitMb,\n      workerTimeoutMs,\n      noModuleCache,\n      importMapPath,\n      envVars,\n    })\n    return await worker.fetch(req)\n  } catch (e) {\n    const error = { msg: e.toString() }\n    return new Response(JSON.stringify(error), {\n      status: 500,\n      headers: { 'Content-Type': 'application/json' },\n    })\n  }\n})\n"
      -
        type: bind
        source: ./volumes/functions/hello/index.ts
        target: /home/deno/functions/hello/index.ts
        content: "// Follow this setup guide to integrate the Deno language server with your editor:\n// https://deno.land/manual/getting_started/setup_your_environment\n// This enables autocomplete, go to definition, etc.\n\nimport { serve } from \"https://deno.land/std@0.177.1/http/server.ts\"\n\nserve(async () => {\n  return new Response(\n    `\"Hello from Edge Functions!\"`,\n    { headers: { \"Content-Type\": \"application/json\" } },\n  )\n})\n\n// To invoke:\n// curl 'http://localhost:<KONG_HTTP_PORT>/functions/v1/hello' \\\n//   --header 'Authorization: Bearer <anon/service_role API key>'\n"
    command:
      - start
      - '--main-service'
      - /home/deno/functions/main
  supabase-supavisor:
    image: 'supabase/supavisor:1.1.56'
    healthcheck:
      test:
        - CMD
        - curl
        - '-sSfL'
        - '-o'
        - /dev/null
        - 'http://127.0.0.1:4000/api/health'
      timeout: 5s
      interval: 5s
      retries: 10
    depends_on:
      supabase-db:
        condition: service_healthy
      supabase-analytics:
        condition: service_healthy
    environment:
      - POOLER_TENANT_ID=dev_tenant
      - POOLER_POOL_MODE=transaction
      - 'POOLER_DEFAULT_POOL_SIZE=${POOLER_DEFAULT_POOL_SIZE:-20}'
      - 'POOLER_MAX_CLIENT_CONN=${POOLER_MAX_CLIENT_CONN:-100}'
      - PORT=4000
      - 'POSTGRES_PORT=${POSTGRES_PORT:-5432}'
      - 'POSTGRES_HOSTNAME=${POSTGRES_HOSTNAME:-supabase-db}'
      - 'POSTGRES_DB=${POSTGRES_DB:-postgres}'
      - 'POSTGRES_PASSWORD=${SERVICE_PASSWORD_POSTGRES}'
      - 'DATABASE_URL=ecto://supabase_admin:${SERVICE_PASSWORD_POSTGRES}@${POSTGRES_HOSTNAME:-supabase-db}:${POSTGRES_PORT:-5432}/_supabase'
      - CLUSTER_POSTGRES=true
      - 'SECRET_KEY_BASE=${SERVICE_PASSWORD_SUPAVISORSECRET}'
      - 'VAULT_ENC_KEY=${SERVICE_PASSWORD_VAULTENC}'
      - 'API_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - 'METRICS_JWT_SECRET=${SERVICE_PASSWORD_JWT}'
      - REGION=local
      - 'ERL_AFLAGS=-proto_dist inet_tcp'
    command:
      - /bin/sh
      - '-c'
      - '/app/bin/migrate && /app/bin/supavisor eval "$$(cat /etc/pooler/pooler.exs)" && /app/bin/server'
    volumes:
      -
        type: bind
        source: ./volumes/pooler/pooler.exs
        target: /etc/pooler/pooler.exs
        content: "{:ok, _} = Application.ensure_all_started(:supavisor)\n{:ok, version} =\n    case Supavisor.Repo.query!(\"select version()\") do\n    %{rows: [[ver]]} -> Supavisor.Helpers.parse_pg_version(ver)\n    _ -> nil\n    end\nparams = %{\n    \"external_id\" => System.get_env(\"POOLER_TENANT_ID\"),\n    \"db_host\" => System.get_env(\"POSTGRES_HOSTNAME\"),\n    \"db_port\" => System.get_env(\"POSTGRES_PORT\") |> String.to_integer(),\n    \"db_database\" => System.get_env(\"POSTGRES_DB\"),\n    \"require_user\" => false,\n    \"auth_query\" => \"SELECT * FROM pgbouncer.get_auth($1)\",\n    \"default_max_clients\" => System.get_env(\"POOLER_MAX_CLIENT_CONN\"),\n    \"default_pool_size\" => System.get_env(\"POOLER_DEFAULT_POOL_SIZE\"),\n    \"default_parameter_status\" => %{\"server_version\" => version},\n    \"users\" => [%{\n    \"db_user\" => \"pgbouncer\",\n    \"db_password\" => System.get_env(\"POSTGRES_PASSWORD\"),\n    \"mode_type\" => System.get_env(\"POOLER_POOL_MODE\"),\n    \"pool_size\" => System.get_env(\"POOLER_DEFAULT_POOL_SIZE\"),\n    \"is_manager\" => true\n    }]\n}\n\ntenant = Supavisor.Tenants.get_tenant_by_external_id(params[\"external_id\"])\n\nif tenant do\n  {:ok, _} = Supavisor.Tenants.update_tenant(tenant, params)\nelse\n  {:ok, _} = Supavisor.Tenants.create_tenant(params)\nend\n"
",
"tags": [
"firebase",
"alternative",
From e8b3f68e66083eeacaa0b3d9b7fd2d68b4446a45 Mon Sep 17 00:00:00 2001
From: Andras Bacsai
Date: Tue, 11 Mar 2025 22:29:17 +0100
Subject: [PATCH 103/145] feat(ui): Improve GitHub repository selection and
styling
---
resources/css/app.css | 11 +++----
.../new/github-private-repository.blade.php | 31 ++++++++++---------
2 files changed, 22 insertions(+), 20 deletions(-)
diff --git a/resources/css/app.css b/resources/css/app.css
index f89d65d80..175ac3259 100644
--- a/resources/css/app.css
+++ b/resources/css/app.css
@@ -25,11 +25,6 @@ body {
@apply hidden !important;
}
-.input,
-.select {
- @apply text-black dark:bg-coolgray-100 dark:text-white ring-neutral-200 dark:ring-coolgray-300;
-}
-
.input-sticky {
@apply text-black dark:bg-coolgray-100 dark:text-white ring-neutral-200 dark:ring-coolgray-300 focus:ring-2 dark:focus:ring-coolgray-300 focus:ring-neutral-400 block w-full py-1.5 rounded border-0 text-sm ring-1 ring-inset;
}
@@ -51,7 +46,11 @@ body {
.input,
.select {
- @apply block w-full py-1.5 rounded border-0 text-sm ring-1 ring-inset;
+ @apply text-black dark:bg-coolgray-100 dark:text-white ring-neutral-200 dark:ring-coolgray-300 block w-full py-1.5 rounded border-0 text-sm ring-1 ring-inset;
+}
+
+.select {
+ @apply w-full;
}
.input[type="password"] {
diff --git a/resources/views/livewire/project/new/github-private-repository.blade.php b/resources/views/livewire/project/new/github-private-repository.blade.php
index 94779e714..f4175cf21 100644
--- a/resources/views/livewire/project/new/github-private-repository.blade.php
+++ b/resources/views/livewire/project/new/github-private-repository.blade.php
@@ -15,9 +15,9 @@
Deploy any public or private Git repositories through a GitHub App.
@if ($github_apps->count() !== 0)
-
Select a Github App
@if ($current_step === 'github_apps')
+
Select a Github App
@foreach ($github_apps as $ghapp)
@@ -43,25 +43,28 @@
@endif
@if ($current_step === 'repository')
@if ($repositories->count() > 0)
-
-
- @foreach ($repositories as $repo)
- @if ($loop->first)
-
- @else
-
- @endif
- @endforeach
-
+
+
+
+ @foreach ($repositories as $repo)
+ @if ($loop->first)
+
+ @else
+
+ @endif
+ @endforeach
+
+
Load Repository
@else
No repositories found. Check your GitHub App configuration.
@endif
@if ($branches->count() > 0)
+
Configuration