Need help with maguttiCms?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

marcoax
217 Stars 75 Forks MIT License 1.0K Commits 1 Opened issues

Description

Laravel 8 CMS for Web Artisans

Services available

!
?

Need anything else?

Contributors list

maguttiCms

About maguttiCms

Open source multilingual Laravel 8.x Cms with shopping cart and social login.

Version

Laravel 8.x

maguttiCms is released using Laravel 8.x, Vue 3 and Boostrap 5. maguttiCms requires PHP 7.4 or 8.0 .

How to Install

  • copy files in your local directory
  • rename env.example to .env file and set your db connection data
  • run composer install (on PHP 8 if you have trouble try to run composer update)
  • run php artisan key:generate
  • create db tables importing framework_base.sql file located under the db folder
  • to login in the admin panel (http://yourpath/admin)
  • email: [email protected]
  • password: password
  • for shared hosting you can set ASSETPUBLICPATH in .env file (eg ASSETPUBLICPATH='public/')

Features

  • Free and open source
  • Multi languages
  • Different Authentication for Admin panel and Front-end with user roles access permission
  • Social login with Socialite
  • E-shop
  • PayPal Express Checkout Payment integration
  • Customizable payment and shipping methods
  • Seo friendly
  • Admin model form generator via artisan command magutticms:create-model

Server Requirements

  • PHP >= 7.4 | 8.0
  • BCMath PHP Extension
  • Ctype PHP Extension
  • Fileinfo PHP extension
  • JSON PHP Extension
  • Mbstring PHP Extension
  • OpenSSL PHP Extension
  • PDO PHP Extension
  • Tokenizer PHP Extension
  • XML PHP Extension

User Guide

See Wiki.

Commands

magutticms:create-model

Artisan helper to create a model and the related admin form configuration fields from a db table.

License

Code released under the MIT license.

Security Vulnerabilities

If you discover a security vulnerability within maguttiCms, please send an e-mail to at [email protected] All security vulnerabilities will be promptly addressed.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.