Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Update 0.30 Causes Events to Disappear

    Unsolved Calendar
    7
    2 Votes
    7 Posts
    67 Views
    nebulonN
    @SirFiChi yes please send to support@cloudron.io I will see it there
  • 1 Votes
    4 Posts
    21 Views
    P
    @james Yes, I know very well that Repos is not managed by Cloudron, but whole process can interfere with Cloudron installations and be critical specially when configuring a new Cloudron in a case of disaster recovery or switching Cloudron instances with backup/recovery, or simply when installing a new Cloudron instance. In fact, if repository cannot be reached, Cloudron cannot be installed. Hetzner give a good guide on how to switch, and also their repository is always reachable, fast and stable. How @robi suggested, it could be interesting to add to Cloudron install script some strings to avoid this kind of issue. Could be a speedy mirror or ability to pass parameter in ./cloudron-setup eg. ./cloudron-setup -h or something where user can chose wich mirror to use. -h = Hetzner, and so on. At this point, script will manage all the whole process and continue installation of packages and Cloudron instance.
  • Email for pocketbase

    PocketBase
    24
    0 Votes
    24 Posts
    837 Views
    V
    Hi @james so the fix will be in the 9.2.0 release ? Do you know when this will be pushed ? I am now on 9.1.6 and cloudron says it's latest ? I am waiting for this fix to lauch a project to production
  • Metabase - Package Updates

    Pinned Metabase
    540
    1 Votes
    540 Posts
    473k Views
    Package UpdatesP
    [3.6.2] Update metabase to 0.60.1.3 Full Changelog
  • Kimai - Package Updates

    Pinned Kimai
    163
    0 Votes
    163 Posts
    138k Views
    Package UpdatesP
    [2.49.0] Update kimai to 2.55.0 Full Changelog System-Account flag should always be editable (#5907) Use absolute avatar URLs in Fixtures (#5907) Explain importance of TRUSTED_HOSTS in .env (#5907) Fix exporter column styles (duration, internal price and maybe more) (#5907) Translations update from Hosted Weblate (#5904)
  • WBO - Package Updates

    Pinned WBO
    44
    1 Votes
    44 Posts
    11k Views
    Package UpdatesP
    [1.26.1] Update whitebophir to 1.30.2 Full Changelog
  • 6 Votes
    4 Posts
    141 Views
    necrevistonnezrN
    @imc67 said: In “What’s coming in Cloudron 6.3”, I suggested features inspired by Wordfence including blocking by IP/location and geo-blocking, and specifically calls out the idea of geo-blocking of countries as a desirable security improvement. https://forum.cloudron.io/topic/4723/what-s-coming-in-cloudron-6-3/4 You got an upvote for me in any event, but for this feature: https://docs.cloudron.io/guides/community/blocklist-updates
  • 0 Votes
    24 Posts
    952 Views
    timconsidineT
    @LoudLemur well done, sounds like you have had fun (!). I'm not clear. You mentioned your production system - is that your own build or using my ALPHA community app ? Or you already cloned/fixed mine ? If the latter, I can try to make changes as you describe. But I am in the middle of a couple of big projects, so it won't be immediate. If timing is an issue, you might want to clone/fix and publish your own repo/community app.
  • Password auth for SSHFS

    Feature Requests
    5
    2 Votes
    5 Posts
    52 Views
    T
    Can’t answer for their business decisions - it is a slot you backup to. I’ll feed this back to them! Thanks for the reply. Edited to add: Turns out the slot was a jailed ssh so I could just ssh-copy-id from my machine instead of going through their client portal. All good, able to use sshkeys now!
  • Tymeslot

    Community Apps
    21
    1 Votes
    21 Posts
    699 Views
    E
    Via a custom script - when I change a version, I have to do this in several places in the app, so I wrote a script where I specify the version number and it does this automatically.
  • 2 Votes
    5 Posts
    59 Views
    E
    Both. I want to understand if both are correct programmatically, but I can't test them against having an existing docker image, because I find that counter-intuitive - why would I build the docker image before knowing if everything is correct?
  • CloudronVersions.json weirdness

    App Packaging & Development
    1
    3 Votes
    1 Posts
    18 Views
    No one has replied
  • Mastodon - Package Updates

    Pinned Mastodon
    86
    0 Votes
    86 Posts
    39k Views
    Package UpdatesP
    [1.17.9] Update mastodon to 4.5.9 Full Changelog Insufficient verification of email addresses (GHSA-5r37-qpwq-2jhh) Updated dependencies Add trademark warning to mastodon:setup task (#38548 by @ClearlyClaire) Fix definition for quote in JSON-LD context (#38686 by @ClearlyClaire) Fix being unable to disable sound for quote update notification (#38537 by @ClearlyClaire) Fix being able to quote someone you blocked (#38608 by @ClearlyClaire)
  • AdGuard Home - Package Updates

    Pinned AdGuard Home
    98
    1 Votes
    98 Posts
    56k Views
    Package UpdatesP
    [1.14.13] Update AdGuardHome to 0.107.74 Full Changelog Frontend libraries has been updated to prevent the possibility of exploiting the vulnerability described in CVE-2026-40175. Go version has been updated to prevent the possibility of exploiting the Go vulnerabilities fixed in 1.26.2. In this release, the schema version has changed from 33 to 34. Added a new field doh in http configuration. Incorrect forwarding of root domain requests when domain-specific upstreams are configured (#7058). The strict SNI check setting is not persisted when the TLS configuration is changed (#8327). Status reported by the launchd service implementation in cases of scheduled service restart. Fixed clients block/unblock when moving clients between allowed and disallowed lists.
  • FreeScout - Package Updates

    Pinned FreeScout
    270
    0 Votes
    270 Posts
    304k Views
    Package UpdatesP
    [1.16.7] Update freescout to 1.8.216 Full Changelog Fixed null parameter error in CheckBrowser middleware (#5342) Fixed moving conversations (#5343) Fixed OAuth disconnect link on PHP 7.1 (#5345) Fixed search.title hook (#5347) Fixed mute icon for non-admin users in Dashboard (#5348) Improved fetching into multiple mailboxes (#5350) Fixed error in MailHelper::isGeneratedMessageId() (#5351)
  • Forgejo - Package Updates

    Pinned Forgejo
    9
    0 Votes
    9 Posts
    500 Views
    Package UpdatesP
    [1.1.0] Update forgejo to 15.0.0 Full Changelog See https://codeberg.org/forgejo/forgejo/src/branch/forgejo/release-notes-published/15.0.0.md PR: remove admin-level permissions from repo-specific & public-only access tokens PR: The template generation (POST /repos/{template_owner}/{template_repo}/generate) and repository deletion (DELETE /repos/{username}/{reponame}) APIs have been updated to require the same permission scope as creating a new repository. Either write:user or write:organization is required, depending on the owner of the repository being created or deleted. PR: Accessing the /repositories/{id} API with a public-only access token did not restrict read access to only public repositories, which is now prevented. PR: Accessing the /repos/{owner}/{repo}/issues/{index}/dependencies and /repos/{owner}/{repo}/issues/{index}/blocks APIs with a public-only access token had access to modification operations against private repositories in the form component of the API (not the URL component), which is now prevented. PR: Accessing the /repos/{owner}/{repo}/issues/{index}/dependencies and /repos/{owner}/{repo}/issues/{index}/blocks APIs with a public-only access token could view dependencies or blocking issues from private repositories, which is now prevented. PR: Accessing the /repos/{owner}/{repo}/issues/{index}/timeline API with a public-only access token could view comment cross-references from private repositories, which is now prevented. PR: Accessing the /teams/{id}/repos/{org}/{repo} API with a public-only access token could view private repositories assigned to a team, which is now prevented.
  • Formbricks - Package Updates

    Pinned Formbricks
    69
    0 Votes
    69 Posts
    11k Views
    Package UpdatesP
    [2.9.2] Update formbricks to 4.9.2 Full Changelog fix: prevent offline replay from dropping survey blocks after completion by @Dhruwang in #7744 fix: [backport] remove dark: variant classes from survey-ui to prevent host page style leakage by @Dhruwang in #7748
  • RustFS - Package Updates

    Pinned RustFS
    10
    0 Votes
    10 Posts
    228 Views
    Package UpdatesP
    [0.8.0] Update rustfs to 1.0.0-alpha.94 Full Changelog fix(server): warn on default credentials with console enabled by @marshawcoco in #2448 fix(deploy): use standard rustfs log directory by @jlon in #2491 fix(storage): fix critical bug in range calculation by @zeapo in #2493 fix(get): validate fast path body before response commit by @houseme in #2495 fix(storage): align archive content-encoding with S3 semantics by @houseme in #2496 fix(get): remove GET chunk fast path by @overtrue in #2507 fix(admin): enforce event and audit target auth by @houseme in #2508 feat(oidc): add roles_claim and jwt:roles policy support by @GatewayJ in #2509 fix(admin): allow clearing group policy by @cxymds in #2527 feat(helm): add generic service and ingress annotation support by @Strangerxxx in #2541
  • Is it possible/safe to install Client Push App ?

    Nextcloud
    8
    0 Votes
    8 Posts
    1k Views
    WiseMetalheadW
    @andreasb said: it looks like notify_push is up and running I honestly don’t understand how you managed to get this working. I spent about 5 hours today trying to set it up and still didn’t get the result I expected. @reboot cron job simply doesn’t work. It’s mentioned in the docs but I’ve never seen it run in the logs. @service does run but only once. Аfter subsequent Nextcloud restarts the job never triggers again. My version of the script works fine if I run it manually from the terminal like this /app/data/notify_push.sh. The service starts and all checks pass. root@71780ea5-011c-4c09-886e-5f7e17e0b670:/app/code# /app/data/notify_push.sh ; sleep 1 ; ps aux | grep notify_push ; ss -tlnp | grep 7867 ✓ redis is configured ✓ push server is receiving redis messages ✓ push server can load mount info from database ✓ push server can connect to the Nextcloud server ✓ push server is a trusted proxy ✓ push server is running the same version as the app configuration saved => notify_push started on port 7867 root 265 0.3 0.0 25676 8796 ? Ssl 15:57 0:00 /app/code/apps/notify_push/bin/x86_64/notify_push --allow-self-signed --nextcloud-url http://172.18.20.152 --port 7867 /app/code/config/config.php root 286 0.0 0.0 4104 2100 pts/1 S+ 15:57 0:00 grep --color=auto notify_push LISTEN 0 128 0.0.0.0:7867 0.0.0.0:* users:(("notify_push",pid=265,fd=10)) If I set up a cron job to run every 5 minutes. */5 * * * * echo "=> Enabling notify_push" && /app/data/notify_push.sh I can see in the logs that everything looks fine: Apr 16 18:30:41 ✓ redis is configured Apr 16 18:30:41 ✓ push server is receiving redis messages Apr 16 18:30:41 ✓ push server can load mount info from database Apr 16 18:30:41 ✓ push server can connect to the Nextcloud server Apr 16 18:30:41 ✓ push server is a trusted proxy Apr 16 18:30:41 ✓ push server is running the same version as the app Apr 16 18:30:41 configuration saved Apr 16 18:30:41 => notify_push started on port 7867 But in reality the process doesn’t survive after the script finishes. If I check manually with ps aux | grep notify_push ; ss -tlnp | grep 7867 there’s nothing in the terminal. Claude suggested this might be a cgroup-related issue in containers. The process started from cron gets attached to its cgroup and when the cron job exits, the process is killed along with it. I’m not sure how accurate that is. Maybe most people who claimed to have notify_push working probably didn’t verify it properly, since the warning disappears from the Nextcloud admin panel. It looks like it’s working, even when it actually isn’t.
  • Baserow - Package Updates

    Pinned Baserow
    105
    2 Votes
    105 Posts
    39k Views
    Package UpdatesP
    [1.37.1] Update uv to 0.11.7 Full Changelog Upgrade CPython build to 2026041 including an OpenSSL security upgrade (#19004) Elevate configuration errors to required-version mismatches (#18977) Further improve TLS certificate validation messages (#18933) Improve --exclude-newer hints (#18952) Fix --script handling in uv audit (#18970) Fix traversal of extras in uv audit (#18970) De-quote workspace metadata in linehaul data (#18966) Avoid installing tool workspace member dependencies as editable (#18891) Emit JSON report for uv sync --check failures (#18976) Filter and warn on invalid TLS certificates (#18951)