Commit graph

121 commits

Author SHA1 Message Date
Andras Bacsai
158d54712f Remove webhook maintenance mode replay feature
This feature stored incoming webhooks during maintenance mode and replayed them
when maintenance ended. The behavior adds unnecessary complexity without clear
value. Standard approach is to let webhooks fail during maintenance and let
senders retry.

Removes:
- Listener classes that handled maintenance mode events and webhook replay
- Maintenance mode checks from all webhook controllers (Github, Gitea, Gitlab, Bitbucket, Stripe)
- webhooks-during-maintenance filesystem disk configuration
- Feature mention from CHANGELOG

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-12-02 13:36:32 +01:00
Andras Bacsai
9113ed714f feat: add validation methods for S3 bucket names, paths, and server paths; update import logic to prevent command injection 2025-11-25 16:40:35 +01:00
Andras Bacsai
65e5b2ecdb fix: correct login rate limiter key format to include IP address 2025-10-28 10:32:19 +01:00
Andras Bacsai
f300ba0118 fix: prevent login rate limit bypass via spoofed headers
The login and forgot-password rate limiters were vulnerable to bypass
by manipulating the X-Forwarded-For header. Attackers could rotate
this header value to circumvent the 5 attempts per minute limit.

Changed both rate limiters to use server('REMOTE_ADDR') instead of
ip() to prevent header spoofing. REMOTE_ADDR gives the actual
connecting IP before proxy headers are processed.

Also added comprehensive unit tests to verify the fix.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-28 09:47:13 +01:00
Andras Bacsai
eea372d702 fix: register WebhookNotificationSettings with NotificationPolicy
Add WebhookNotificationSettings to the policy mappings in
AuthServiceProvider to enable authorization checks for the
webhook notification settings.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-10 17:48:14 +02:00
Andras Bacsai
a1eaa046c9 feat(auth): enhance user login flow to handle team invitations, attaching users to invited teams upon first login and maintaining personal team logic for regular logins 2025-09-15 12:12:14 +02:00
Andras Bacsai
643343785a refactor(auth): simplify access control logic in CanAccessTerminal and ServerPolicy by allowing all users to perform actions 2025-08-28 10:48:24 +02:00
Andras Bacsai
d98b7ab7e0 feat(policies): add EnvironmentVariablePolicy for managing environment variables ( it was missing ) 2025-08-26 21:44:36 +02:00
Andras Bacsai
63fcc0ebc3 feat(acl): Change views/backend code to able to use proper ACL's later on. Currently it is not enabled. 2025-08-26 10:27:38 +02:00
Andras Bacsai
3e1f47a243 feat(auth): introduce resource creation authorization middleware and policies for enhanced access control 2025-08-26 10:27:38 +02:00
Andras Bacsai
b5fe5dd909 feat(auth): refine authorization checks for S3 storage and service management 2025-08-23 18:50:50 +02:00
Andras Bacsai
40f108d6e1 feat(auth): implement authorization checks for application management 2025-08-22 16:47:59 +02:00
Andras Bacsai
6772cfe603 feat(auth): implement authorization for Docker and server management
- Added authorization checks in Livewire components related to Docker and server management to ensure only authorized users can create, update, and manage Docker instances and server settings.
- Introduced new policies for StandaloneDocker and SwarmDocker to define access control rules based on user roles and team associations.
- Updated AuthServiceProvider to register the new policies, enhancing security and access control for Docker functionalities and server management operations.
2025-08-22 14:04:25 +02:00
Andras Bacsai
d8d01e6886 feat(auth): implement authorization for PrivateKey management
- Added authorization checks in the Create and Show Livewire components to ensure only authorized users can create, update, and delete PrivateKey instances.
- Introduced a new PrivateKeyPolicy to define access control rules for viewing, creating, updating, and deleting PrivateKey models based on user roles and team associations.
- Updated AuthServiceProvider to register the new PrivateKeyPolicy, enhancing security and access control for PrivateKey functionalities.
2025-08-22 13:02:20 +02:00
Andras Bacsai
ac4324e682
Update app/Providers/RouteServiceProvider.php
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
2025-06-26 09:10:44 +02:00
peaklabs-dev
04aec48495
refactor(core): rename API rate limit ENV 2025-06-18 15:23:44 +02:00
🏔️ Peak
e9f977443f
Merge branch 'v4.x' into next 2025-06-18 15:21:08 +02:00
Alfred Nutile
e0f16e9539
feat(core): set custom API rate limit (#5984) 2025-06-18 15:19:33 +02:00
Hauke Schnau
1968d4d494
feat(auth): add Zitadel OAuth Provider (#5490) 2025-06-18 14:35:54 +02:00
Yassir Elmarissi
a77bd88258
feat(auth): Add Clerk OAuth Provider (#5553) 2025-06-18 14:29:46 +02:00
Yassir Elmarissi
4375f52c5d
feat(auth): Add Discord OAuth Provider (#5552) 2025-06-18 14:19:01 +02:00
Andras Bacsai
ddcb14500d refactor(proxy-status): refactored how the proxy status is handled on the UI and on the backend
feat(cloudflare): improved cloudflare tunnel automated installation
2025-06-06 14:47:54 +02:00
Andras Bacsai
e891318396 refactor(configuration): centralize configuration management in ConfigurationRepository 2025-03-24 21:01:27 +01:00
Mike M
4a0cab8be3 Added support for passing hd parameter to Google via existing tenant column in oauth_settings 2025-02-16 16:44:22 -08:00
Andras Bacsai
a764a07e7e revert: remove Cloudflare async tag attributes 2025-01-28 14:38:55 +01:00
Andras Bacsai
98a9985dce feat(vite): add Cloudflare async script and style tag attributes 2025-01-28 14:30:11 +01:00
Andras Bacsai
3c83c7fd6c
Merge pull request #4754 from coollabsio/improve-git-and-service-provider
Improves: GitHub handling, AppServiceProvider and 500 error message rendering
2025-01-16 21:09:08 +01:00
Andras Bacsai
dd897a11fd disable model strict mode 2025-01-16 21:07:12 +01:00
peaklabs-dev
43d526b773
fix: production password rule and cleanup code 2025-01-16 18:06:46 +01:00
Andras Bacsai
a396d51452
Merge branch 'next' into hotfix 2025-01-10 20:23:29 +01:00
Andras Bacsai
3a3219394d refactor: enhance ApplicationDeploymentJob and HorizonServiceProvider for improved job handling
- Removed the private property for application deployment queue ID in ApplicationDeploymentJob and utilized constructor property promotion.
- Added a tags method in ApplicationDeploymentJob to properly identify the worker running the job.
- Updated HorizonServiceProvider to handle cases where the deployment queue ID is blank, preventing potential errors during job processing.
- Cleaned up the isAnyDeploymentInprogress function by removing unnecessary whitespace.
2025-01-10 20:07:01 +01:00
Andras Bacsai
a0fc46dee4 refactor: extend HorizonServiceProvider from HorizonApplicationServiceProvider
- Updated HorizonServiceProvider to extend from HorizonApplicationServiceProvider for improved functionality.
- Added a call to the parent boot method to ensure proper initialization.
- Cleaned up the gate method by removing unnecessary whitespace.
2025-01-10 19:15:57 +01:00
Andras Bacsai
925af53d3d horizon gate 2025-01-10 19:00:18 +01:00
Andras Bacsai
02400added fix: horizon job checker 2025-01-10 18:27:48 +01:00
Andras Bacsai
765e1ea04b feat: add horizon server details to queue 2025-01-10 15:39:22 +01:00
Andras Bacsai
b8f1ded9f8 horizon manage command 2025-01-10 14:28:46 +01:00
Andras Bacsai
1fe4dd722b Revert "rector: arrrrr"
This reverts commit 16c0cd10d8.
2025-01-07 15:31:43 +01:00
Andras Bacsai
16c0cd10d8 rector: arrrrr 2025-01-07 14:52:08 +01:00
peaklabs-dev
1a36e7b057 fix: add back letters to prod password requirement 2025-01-06 16:58:20 +01:00
peaklabs-dev
c6be293064 refactor: AppServiceProvider
- Remove unused authentik stuff
- Move things to separate functions
- Configure commands for production
- Configure modals for better error handling
- Improve password security by not allowing compromised passwords.
- Rename some things to make it clearer.
- Sort imports
2025-01-06 16:58:20 +01:00
Zao Soula
c5f365e384 feat: add infomaniak oauth 2024-12-15 01:30:37 +01:00
Andras Bacsai
b6ea36f74e fix: socialite for azure and authentik 2024-12-13 12:13:01 +01:00
peaklabs-dev
97b6257872
fix: provider error 2024-12-11 17:09:21 +01:00
🏔️ Peak
d9aefae207
Merge branch 'next' into feature/authentik-provider 2024-12-11 15:24:26 +01:00
peaklabs-dev
c27e2e328f
chore: remove waitlist redirect 2024-12-09 16:37:36 +01:00
peaklabs-dev
1c5ddab30d
use one constants file 2024-11-12 15:18:48 +01:00
Andras Bacsai
b8a35be095 fix: always authenticate with lowercase emails 2024-11-03 16:14:25 +01:00
Andras Bacsai
7296f726a7 fix: add telescope only in dev mode 2024-11-02 12:09:33 +01:00
Andras Bacsai
0938c60c1e
Merge branch 'next' into global-password-policy 2024-10-29 10:02:58 +01:00
Andras Bacsai
2eef8ee433 add dusk tests 2024-10-28 22:57:56 +01:00