Check leaked passwords
When creating an object with a password, such as a database user, check whether the filled password was leaked (e.g. using https://haveibeenpwned.com/API/v3). UX is comparable to that of Chrome (https://i.insider.com/61b3c4d214b9630018df4004?width=800&format=jpeg&auto=webp)
William David Edwards 15 days ago
Platform
Check leaked passwords
When creating an object with a password, such as a database user, check whether the filled password was leaked (e.g. using https://haveibeenpwned.com/API/v3). UX is comparable to that of Chrome (https://i.insider.com/61b3c4d214b9630018df4004?width=800&format=jpeg&auto=webp)
William David Edwards 15 days ago
Platform
Full output missing for corectl get commands
When running the command corectl crons get xxx, it should return all available information. Currently, only partial data is shown (e.g., missing fields like locking_enabled resource_limits); this applies to all GET commands, though summarized output is fine for LIST commands.
HenkJanH About 2 months ago
Core
Full output missing for corectl get commands
When running the command corectl crons get xxx, it should return all available information. Currently, only partial data is shown (e.g., missing fields like locking_enabled resource_limits); this applies to all GET commands, though summarized output is fine for LIST commands.
HenkJanH About 2 months ago
Core
Invoices: create support ticket from invoice
When viewing an invoice on the platform, click a button to create a support ticket about it. Could save some time. Drawback: what if you have questions about multiple invoices? That’s common, e.g. when processing quarterly tax return.
William David Edwards About 2 months ago
Platform
Invoices: create support ticket from invoice
When viewing an invoice on the platform, click a button to create a support ticket about it. Could save some time. Drawback: what if you have questions about multiple invoices? That’s common, e.g. when processing quarterly tax return.
William David Edwards About 2 months ago
Platform
Deploy with Git
Comparable to Envoyer / Laravel Cloud Specify Git repository, which is automatically deployed.
William David Edwards 2 months ago
Hosting
Deploy with Git
Comparable to Envoyer / Laravel Cloud Specify Git repository, which is automatically deployed.
William David Edwards 2 months ago
Hosting
Multiple sites
Note: this is about sites in the context of geographical regions / data centres, not websites. Offer additional sites, such as in Germany.
William David Edwards 2 months ago
Hosting
Multiple sites
Note: this is about sites in the context of geographical regions / data centres, not websites. Offer additional sites, such as in Germany.
William David Edwards 2 months ago
Hosting
Place to report and send in spam
Spam emails are constantly evolving, and getting past the spam filters. I would like to see something where we can send through spam so the system could learn and adapt.
FeliksAtNewlight 3 months ago
Security
Place to report and send in spam
Spam emails are constantly evolving, and getting past the spam filters. I would like to see something where we can send through spam so the system could learn and adapt.
FeliksAtNewlight 3 months ago
Security
Daemons: multiple processes
Add the ability to start multiple processes for a single daemon, with the same command, sharing the configured resource limits. Comparable to Supervisor’s numprocs setting.
William David Edwards 3 months ago
Core
Daemons: multiple processes
Add the ability to start multiple processes for a single daemon, with the same command, sharing the configured resource limits. Comparable to Supervisor’s numprocs setting.
William David Edwards 3 months ago
Core
WooCommerce hosting with slightly more resources
Now and then we need a bit more resources for WC shops. A booster is offered but we would like a step inbetween.
Remko 4 months ago
Hosting
WooCommerce hosting with slightly more resources
Now and then we need a bit more resources for WC shops. A booster is offered but we would like a step inbetween.
Remko 4 months ago
Hosting
Protection for staging environments
Staging environments usually are not intended to be publicly available, most likely just for a few users and/or developers/testers. For some you want IP whitelisting and for others you want to offer basic authentication. The perfect flow would be: IP whitelisted? - Yes → access - No → ask for basic auth
Dick 4 months ago
Hosting
Protection for staging environments
Staging environments usually are not intended to be publicly available, most likely just for a few users and/or developers/testers. For some you want IP whitelisting and for others you want to offer basic authentication. The perfect flow would be: IP whitelisted? - Yes → access - No → ask for basic auth
Dick 4 months ago
Hosting
Monitor Redis memory
For Redis instances, one sets a memory limit. When this memory limit is reached, send a notification.
William David Edwards 4 months ago
Hosting
Monitor Redis memory
For Redis instances, one sets a memory limit. When this memory limit is reached, send a notification.
William David Edwards 4 months ago
Hosting
Monitor robots.txt noindex/nofollow
Monitor that noindex and nofollow are not set in robots.txt files on production environments. This can severely harm search results. This prevents mistakes, e.g. when deploying from a staging environment on which these options are rightfully set.
William David Edwards 4 months ago
Optimisation
Monitor robots.txt noindex/nofollow
Monitor that noindex and nofollow are not set in robots.txt files on production environments. This can severely harm search results. This prevents mistakes, e.g. when deploying from a staging environment on which these options are rightfully set.
William David Edwards 4 months ago
Optimisation
Resource limit UNIX users
In addition to existing resource limits (crons, FPM pools, etc.), add the ability to resource-limit UNIX users. This would apply to SSH sessions.
William David Edwards 4 months ago
Core
Resource limit UNIX users
In addition to existing resource limits (crons, FPM pools, etc.), add the ability to resource-limit UNIX users. This would apply to SSH sessions.
William David Edwards 4 months ago
Core