coolify/app/Models/Server.php

995 lines
34 KiB
PHP
Raw Normal View History

<?php
namespace App\Models;
use App\Actions\Server\InstallDocker;
2023-09-21 17:48:31 +02:00
use App\Enums\ProxyTypes;
use App\Jobs\PullSentinelImageJob;
use App\Notifications\Server\Revived;
use App\Notifications\Server\Unreachable;
2023-05-03 07:23:45 +02:00
use Illuminate\Database\Eloquent\Builder;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Support\Collection;
use Illuminate\Support\Facades\DB;
use Illuminate\Support\Facades\Storage;
use Illuminate\Support\Str;
use Illuminate\Support\Stringable;
2024-06-10 22:43:34 +02:00
use Spatie\SchemalessAttributes\Casts\SchemalessAttributes;
use Spatie\SchemalessAttributes\SchemalessAttributesTrait;
2024-03-11 17:17:34 +01:00
use Spatie\Url\Url;
use Symfony\Component\Yaml\Yaml;
2023-05-03 07:23:45 +02:00
class Server extends BaseModel
{
2023-06-20 20:19:31 +02:00
use SchemalessAttributesTrait;
2024-06-10 22:43:34 +02:00
2023-11-22 15:18:49 +01:00
public static $batch_counter = 0;
2023-08-23 10:14:39 +02:00
protected static function booted()
{
2023-10-09 11:00:18 +02:00
static::saving(function ($server) {
2023-10-09 20:12:03 +02:00
$payload = [];
if ($server->user) {
$payload['user'] = Str::of($server->user)->trim();
}
if ($server->ip) {
$payload['ip'] = Str::of($server->ip)->trim();
}
$server->forceFill($payload);
});
2023-08-23 10:14:39 +02:00
static::created(function ($server) {
ServerSetting::create([
'server_id' => $server->id,
]);
});
static::deleting(function ($server) {
2023-08-29 15:51:30 +02:00
$server->destinations()->each(function ($destination) {
$destination->delete();
});
2023-08-23 10:14:39 +02:00
$server->settings()->delete();
});
}
public $casts = [
'proxy' => SchemalessAttributes::class,
'logdrain_axiom_api_key' => 'encrypted',
'logdrain_newrelic_license_key' => 'encrypted',
];
2024-06-10 22:43:34 +02:00
2023-06-20 20:19:31 +02:00
protected $schemalessAttributes = [
'proxy',
];
2024-06-10 22:43:34 +02:00
2023-08-23 10:14:39 +02:00
protected $guarded = [];
2024-06-10 22:43:34 +02:00
public static function isReachable()
{
return Server::ownedByCurrentTeam()->whereRelation('settings', 'is_reachable', true);
}
2024-06-10 22:43:34 +02:00
public static function ownedByCurrentTeam(array $select = ['*'])
{
2023-08-22 17:44:49 +02:00
$teamId = currentTeam()->id;
$selectArray = collect($select)->concat(['id']);
2024-06-10 22:43:34 +02:00
2023-12-04 15:08:24 +01:00
return Server::whereTeamId($teamId)->with('settings', 'swarmDockers', 'standaloneDockers')->select($selectArray->all())->orderBy('name');
}
2024-06-10 22:43:34 +02:00
public static function isUsable()
{
return Server::ownedByCurrentTeam()->whereRelation('settings', 'is_reachable', true)->whereRelation('settings', 'is_usable', true)->whereRelation('settings', 'is_swarm_worker', false)->whereRelation('settings', 'is_build_server', false)->whereRelation('settings', 'force_disabled', false);
}
2024-06-10 22:43:34 +02:00
public static function destinationsByServer(string $server_id)
{
$server = Server::ownedByCurrentTeam()->get()->where('id', $server_id)->firstOrFail();
$standaloneDocker = collect($server->standaloneDockers->all());
$swarmDocker = collect($server->swarmDockers->all());
2024-06-10 22:43:34 +02:00
return $standaloneDocker->concat($swarmDocker);
}
2024-06-10 22:43:34 +02:00
public function settings()
{
return $this->hasOne(ServerSetting::class);
}
2024-06-10 22:43:34 +02:00
2023-12-04 15:08:24 +01:00
public function addInitialNetwork()
{
2023-11-28 15:49:24 +01:00
if ($this->id === 0) {
if ($this->isSwarm()) {
SwarmDocker::create([
'id' => 0,
'name' => 'coolify',
'network' => 'coolify-overlay',
'server_id' => $this->id,
]);
} else {
StandaloneDocker::create([
'id' => 0,
'name' => 'coolify',
'network' => 'coolify',
'server_id' => $this->id,
]);
}
} else {
if ($this->isSwarm()) {
SwarmDocker::create([
2023-11-28 18:31:04 +01:00
'name' => 'coolify-overlay',
2023-11-28 15:49:24 +01:00
'network' => 'coolify-overlay',
'server_id' => $this->id,
]);
} else {
StandaloneDocker::create([
'name' => 'coolify',
2023-11-28 15:49:24 +01:00
'network' => 'coolify',
'server_id' => $this->id,
]);
}
}
}
2024-06-10 22:43:34 +02:00
2024-03-12 10:42:56 +01:00
public function setupDefault404Redirect()
{
2024-06-10 22:43:34 +02:00
$dynamic_conf_path = $this->proxyPath().'/dynamic';
2024-03-12 10:42:56 +01:00
$proxy_type = $this->proxyType();
$redirect_url = $this->proxy->redirect_url;
if ($proxy_type === 'TRAEFIK_V2') {
$default_redirect_file = "$dynamic_conf_path/default_redirect_404.yaml";
2024-06-10 22:43:34 +02:00
} elseif ($proxy_type === 'CADDY') {
2024-03-12 10:42:56 +01:00
$default_redirect_file = "$dynamic_conf_path/default_redirect_404.caddy";
}
if (empty($redirect_url)) {
if ($proxy_type === 'CADDY') {
2024-06-10 22:43:34 +02:00
$conf = ':80, :443 {
respond 404
2024-06-10 22:43:34 +02:00
}';
$conf =
2024-06-10 22:43:34 +02:00
"# This file is automatically generated by Coolify.\n".
"# Do not edit it manually (only if you know what are you doing).\n\n".
$conf;
$base64 = base64_encode($conf);
instant_remote_process([
"mkdir -p $dynamic_conf_path",
"echo '$base64' | base64 -d | tee $default_redirect_file > /dev/null",
], $this);
$this->reloadCaddy();
2024-06-10 22:43:34 +02:00
return;
}
2024-03-12 10:42:56 +01:00
instant_remote_process([
"mkdir -p $dynamic_conf_path",
"rm -f $default_redirect_file",
], $this);
2024-06-10 22:43:34 +02:00
2024-03-12 10:42:56 +01:00
return;
}
if ($proxy_type === 'TRAEFIK_V2') {
$dynamic_conf = [
2024-06-10 22:43:34 +02:00
'http' => [
'routers' => [
'catchall' => [
2024-03-12 10:42:56 +01:00
'entryPoints' => [
0 => 'http',
1 => 'https',
],
'service' => 'noop',
2024-06-10 22:43:34 +02:00
'rule' => 'HostRegexp(`{catchall:.*}`)',
2024-03-12 10:42:56 +01:00
'priority' => 1,
'middlewares' => [
0 => 'redirect-regexp@file',
],
],
],
2024-06-10 22:43:34 +02:00
'services' => [
'noop' => [
'loadBalancer' => [
'servers' => [
0 => [
2024-03-12 10:42:56 +01:00
'url' => '',
],
],
],
],
],
2024-06-10 22:43:34 +02:00
'middlewares' => [
'redirect-regexp' => [
'redirectRegex' => [
2024-03-12 10:42:56 +01:00
'regex' => '(.*)',
'replacement' => $redirect_url,
'permanent' => false,
],
],
],
],
];
$conf = Yaml::dump($dynamic_conf, 12, 2);
$conf =
2024-06-10 22:43:34 +02:00
"# This file is automatically generated by Coolify.\n".
"# Do not edit it manually (only if you know what are you doing).\n\n".
2024-03-12 10:42:56 +01:00
$conf;
$base64 = base64_encode($conf);
2024-06-10 22:43:34 +02:00
} elseif ($proxy_type === 'CADDY') {
$conf = ":80, :443 {
2024-03-12 10:42:56 +01:00
redir $redirect_url
}";
$conf =
2024-06-10 22:43:34 +02:00
"# This file is automatically generated by Coolify.\n".
"# Do not edit it manually (only if you know what are you doing).\n\n".
2024-03-12 10:42:56 +01:00
$conf;
$base64 = base64_encode($conf);
}
instant_remote_process([
"mkdir -p $dynamic_conf_path",
"echo '$base64' | base64 -d | tee $default_redirect_file > /dev/null",
2024-03-12 10:42:56 +01:00
], $this);
if (config('app.env') == 'local') {
ray($conf);
}
if ($proxy_type === 'CADDY') {
$this->reloadCaddy();
}
}
2024-06-10 22:43:34 +02:00
2024-03-11 17:17:34 +01:00
public function setupDynamicProxyConfiguration()
{
$settings = InstanceSettings::get();
2024-06-10 22:43:34 +02:00
$dynamic_config_path = $this->proxyPath().'/dynamic';
2024-03-12 12:30:40 +01:00
if ($this->proxyType() === 'TRAEFIK_V2') {
$file = "$dynamic_config_path/coolify.yaml";
if (empty($settings->fqdn) || (isCloud() && $this->id !== 0)) {
2024-03-12 12:30:40 +01:00
instant_remote_process([
"rm -f $file",
], $this);
} else {
$url = Url::fromString($settings->fqdn);
$host = $url->getHost();
$schema = $url->getScheme();
$traefik_dynamic_conf = [
2024-06-10 22:43:34 +02:00
'http' => [
2024-03-12 12:30:40 +01:00
'middlewares' => [
'redirect-to-https' => [
'redirectscheme' => [
'scheme' => 'https',
],
],
'gzip' => [
'compress' => true,
],
],
2024-06-10 22:43:34 +02:00
'routers' => [
'coolify-http' => [
2024-03-12 12:30:40 +01:00
'middlewares' => [
0 => 'gzip',
2024-03-11 17:17:34 +01:00
],
2024-03-12 12:30:40 +01:00
'entryPoints' => [
0 => 'http',
2024-03-11 17:17:34 +01:00
],
2024-03-12 12:30:40 +01:00
'service' => 'coolify',
'rule' => "Host(`{$host}`)",
2024-03-11 17:17:34 +01:00
],
2024-06-10 22:43:34 +02:00
'coolify-realtime-ws' => [
2024-03-12 12:30:40 +01:00
'entryPoints' => [
0 => 'http',
2024-03-11 17:17:34 +01:00
],
2024-03-12 12:30:40 +01:00
'service' => 'coolify-realtime',
'rule' => "Host(`{$host}`) && PathPrefix(`/app`)",
2024-03-11 17:17:34 +01:00
],
2024-03-12 12:30:40 +01:00
],
2024-06-10 22:43:34 +02:00
'services' => [
'coolify' => [
'loadBalancer' => [
'servers' => [
0 => [
2024-03-12 12:30:40 +01:00
'url' => 'http://coolify:80',
2024-03-11 17:17:34 +01:00
],
],
],
2024-03-12 12:30:40 +01:00
],
2024-06-10 22:43:34 +02:00
'coolify-realtime' => [
'loadBalancer' => [
'servers' => [
0 => [
2024-03-12 12:30:40 +01:00
'url' => 'http://coolify-realtime:6001',
2024-03-11 17:17:34 +01:00
],
],
],
],
],
2024-03-12 12:30:40 +01:00
],
];
2024-03-11 17:17:34 +01:00
2024-03-12 12:30:40 +01:00
if ($schema === 'https') {
$traefik_dynamic_conf['http']['routers']['coolify-http']['middlewares'] = [
0 => 'redirect-to-https',
];
2024-03-11 17:17:34 +01:00
2024-03-12 12:30:40 +01:00
$traefik_dynamic_conf['http']['routers']['coolify-https'] = [
'entryPoints' => [
0 => 'https',
],
'service' => 'coolify',
'rule' => "Host(`{$host}`)",
'tls' => [
'certresolver' => 'letsencrypt',
],
];
$traefik_dynamic_conf['http']['routers']['coolify-realtime-wss'] = [
'entryPoints' => [
0 => 'https',
],
'service' => 'coolify-realtime',
'rule' => "Host(`{$host}`) && PathPrefix(`/app`)",
'tls' => [
'certresolver' => 'letsencrypt',
],
];
}
$yaml = Yaml::dump($traefik_dynamic_conf, 12, 2);
$yaml =
2024-06-10 22:43:34 +02:00
"# This file is automatically generated by Coolify.\n".
"# Do not edit it manually (only if you know what are you doing).\n\n".
2024-03-12 12:30:40 +01:00
$yaml;
2024-03-11 17:17:34 +01:00
2024-03-12 12:30:40 +01:00
$base64 = base64_encode($yaml);
instant_remote_process([
"mkdir -p $dynamic_config_path",
"echo '$base64' | base64 -d | tee $file > /dev/null",
2024-03-12 12:30:40 +01:00
], $this);
2024-03-11 17:17:34 +01:00
2024-03-12 12:30:40 +01:00
if (config('app.env') == 'local') {
// ray($yaml);
2024-03-11 17:17:34 +01:00
}
2024-03-12 12:30:40 +01:00
}
2024-06-10 22:43:34 +02:00
} elseif ($this->proxyType() === 'CADDY') {
2024-03-12 12:30:40 +01:00
$file = "$dynamic_config_path/coolify.caddy";
if (empty($settings->fqdn) || (isCloud() && $this->id !== 0)) {
2024-03-12 12:30:40 +01:00
instant_remote_process([
"rm -f $file",
], $this);
$this->reloadCaddy();
} else {
$url = Url::fromString($settings->fqdn);
$host = $url->getHost();
$schema = $url->getScheme();
$caddy_file = "
2024-03-11 17:17:34 +01:00
$schema://$host {
handle /app/* {
reverse_proxy coolify-realtime:6001
}
2024-03-11 17:17:34 +01:00
reverse_proxy coolify:80
}";
2024-03-12 12:30:40 +01:00
$base64 = base64_encode($caddy_file);
instant_remote_process([
"echo '$base64' | base64 -d | tee $file > /dev/null",
2024-03-12 12:30:40 +01:00
], $this);
$this->reloadCaddy();
2024-03-11 17:17:34 +01:00
}
}
}
2024-06-10 22:43:34 +02:00
2024-03-12 10:42:56 +01:00
public function reloadCaddy()
{
2024-03-11 17:31:28 +01:00
return instant_remote_process([
2024-06-10 22:43:34 +02:00
'docker exec coolify-proxy caddy reload --config /config/caddy/Caddyfile.autosave',
2024-03-11 17:31:28 +01:00
], $this);
}
2024-06-10 22:43:34 +02:00
2024-03-11 17:17:34 +01:00
public function proxyPath()
{
2024-03-11 15:08:05 +01:00
$base_path = config('coolify.base_config_path');
$proxyType = $this->proxyType();
$proxy_path = "$base_path/proxy";
// TODO: should use /traefik for already exisiting configurations?
// Should move everything except /caddy and /nginx to /traefik
// The code needs to be modified as well, so maybe it does not worth it
2024-03-11 15:08:05 +01:00
if ($proxyType === ProxyTypes::TRAEFIK_V2->value) {
$proxy_path = $proxy_path;
2024-06-10 22:43:34 +02:00
} elseif ($proxyType === ProxyTypes::CADDY->value) {
$proxy_path = $proxy_path.'/caddy';
} elseif ($proxyType === ProxyTypes::NGINX->value) {
$proxy_path = $proxy_path.'/nginx';
2024-03-11 15:08:05 +01:00
}
2024-06-10 22:43:34 +02:00
2024-03-11 15:08:05 +01:00
return $proxy_path;
}
2024-06-10 22:43:34 +02:00
2023-09-25 09:17:42 +02:00
public function proxyType()
{
2024-03-12 12:30:40 +01:00
// $proxyType = $this->proxy->get('type');
// if ($proxyType === ProxyTypes::NONE->value) {
// return $proxyType;
// }
2024-03-11 15:08:05 +01:00
// if (is_null($proxyType)) {
// $this->proxy->type = ProxyTypes::TRAEFIK_V2->value;
// $this->proxy->status = ProxyStatus::EXITED->value;
// $this->save();
// }
return data_get($this->proxy, 'type');
2023-09-20 15:42:41 +02:00
}
2024-06-10 22:43:34 +02:00
2023-06-20 20:19:31 +02:00
public function scopeWithProxy(): Builder
2023-05-30 15:52:17 +02:00
{
2023-06-20 20:19:31 +02:00
return $this->proxy->modelScope();
2023-05-30 15:52:17 +02:00
}
public function isLocalhost()
{
return $this->ip === 'host.docker.internal' || $this->id === 0;
}
2024-06-10 22:43:34 +02:00
public static function buildServers($teamId)
2024-01-17 11:52:56 +01:00
{
return Server::whereTeamId($teamId)->whereRelation('settings', 'is_reachable', true)->whereRelation('settings', 'is_build_server', true);
}
2024-06-10 22:43:34 +02:00
public function skipServer()
{
if ($this->ip === '1.2.3.4') {
2024-02-26 14:22:24 +01:00
// ray('skipping 1.2.3.4');
return true;
}
if ($this->settings->force_disabled === true) {
2024-02-26 14:22:24 +01:00
// ray('force_disabled');
return true;
}
2024-06-10 22:43:34 +02:00
return false;
}
2024-06-10 22:43:34 +02:00
public function isForceDisabled()
{
return $this->settings->force_disabled;
}
2024-06-10 22:43:34 +02:00
public function forceEnableServer()
{
$this->settings->update([
'force_disabled' => false,
]);
}
2024-06-10 22:43:34 +02:00
public function forceDisableServer()
{
2024-02-25 23:34:01 +01:00
$this->settings->update([
'force_disabled' => true,
2024-02-25 23:34:01 +01:00
]);
$sshKeyFileLocation = "id.root@{$this->uuid}";
Storage::disk('ssh-keys')->delete($sshKeyFileLocation);
Storage::disk('ssh-mux')->delete($this->muxFilename());
2024-02-25 23:34:01 +01:00
}
2024-06-10 22:43:34 +02:00
public function checkSentinel()
{
2024-05-08 14:22:35 +02:00
ray("Checking sentinel on server: {$this->name}");
if ($this->is_metrics_enabled) {
2024-06-10 22:43:34 +02:00
$sentinel_found = instant_remote_process(['docker inspect coolify-sentinel'], $this, false);
2024-05-08 14:22:35 +02:00
$sentinel_found = json_decode($sentinel_found, true);
$status = data_get($sentinel_found, '0.State.Status', 'exited');
if ($status !== 'running') {
ray('Sentinel is not running, starting it...');
PullSentinelImageJob::dispatch($this);
2024-05-08 14:22:35 +02:00
} else {
ray('Sentinel is running');
}
}
}
2024-06-10 22:43:34 +02:00
2024-05-09 13:25:18 +02:00
public function getMetrics()
{
if ($this->is_metrics_enabled) {
$from = now()->subMinutes(5)->toIso8601ZuluString();
$cpu = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl http://localhost:8888/api/cpu/history?from=$from'"], $this, false);
$cpu = str($cpu)->explode("\n")->skip(1)->all();
2024-05-09 13:25:18 +02:00
$parsedCollection = collect($cpu)->flatMap(function ($item) {
return collect(explode("\n", trim($item)))->map(function ($line) {
2024-06-10 22:43:34 +02:00
[$time, $value] = explode(',', trim($line));
2024-05-09 13:25:18 +02:00
return [(int) $time, (float) $value];
});
})->toArray();
2024-06-10 22:43:34 +02:00
2024-05-09 13:25:18 +02:00
return $parsedCollection;
}
}
2024-06-10 22:43:34 +02:00
2023-12-19 15:36:59 +01:00
public function isServerReady(int $tries = 3)
{
2023-12-20 11:21:17 +01:00
if ($this->skipServer()) {
return false;
}
2024-05-03 13:31:35 +02:00
$serverUptimeCheckNumber = $this->unreachable_count;
if ($this->unreachable_count < $tries) {
$serverUptimeCheckNumber = $this->unreachable_count + 1;
}
2024-05-03 13:31:35 +02:00
if ($this->unreachable_count > $tries) {
$serverUptimeCheckNumber = $tries;
}
2024-05-03 13:31:35 +02:00
$serverUptimeCheckNumberMax = $tries;
// ray('server: ' . $this->name);
// ray('serverUptimeCheckNumber: ' . $serverUptimeCheckNumber);
// ray('serverUptimeCheckNumberMax: ' . $serverUptimeCheckNumberMax);
['uptime' => $uptime] = $this->validateConnection();
if ($uptime) {
if ($this->unreachable_notification_sent === true) {
$this->update(['unreachable_notification_sent' => false]);
2023-12-19 15:16:08 +01:00
}
2024-06-10 22:43:34 +02:00
2024-05-03 13:31:35 +02:00
return true;
} else {
if ($serverUptimeCheckNumber >= $serverUptimeCheckNumberMax) {
// Reached max number of retries
if ($this->unreachable_notification_sent === false) {
ray('Server unreachable, sending notification...');
// $this->team?->notify(new Unreachable($this));
2024-05-03 13:31:35 +02:00
$this->update(['unreachable_notification_sent' => true]);
}
if ($this->settings->is_reachable === true) {
$this->settings()->update([
'is_reachable' => false,
]);
}
foreach ($this->applications() as $application) {
$application->update(['status' => 'exited']);
}
foreach ($this->databases() as $database) {
$database->update(['status' => 'exited']);
}
foreach ($this->services()->get() as $service) {
$apps = $service->applications()->get();
$dbs = $service->databases()->get();
foreach ($apps as $app) {
$app->update(['status' => 'exited']);
}
foreach ($dbs as $db) {
$db->update(['status' => 'exited']);
}
}
} else {
$this->update([
'unreachable_count' => $this->unreachable_count + 1,
]);
}
2024-06-10 22:43:34 +02:00
2024-05-03 13:31:35 +02:00
return false;
}
}
2024-06-10 22:43:34 +02:00
public function getDiskUsage()
{
return instant_remote_process(["df /| tail -1 | awk '{ print $5}' | sed 's/%//g'"], $this, false);
}
2024-06-10 22:43:34 +02:00
public function definedResources()
{
$applications = $this->applications();
$databases = $this->databases();
$services = $this->services();
2024-06-10 22:43:34 +02:00
return $applications->concat($databases)->concat($services->get());
}
2024-06-10 22:43:34 +02:00
2024-02-19 13:28:14 +01:00
public function stopUnmanaged($id)
{
return instant_remote_process(["docker stop -t 0 $id"], $this);
}
2024-06-10 22:43:34 +02:00
2024-02-19 13:28:14 +01:00
public function restartUnmanaged($id)
{
return instant_remote_process(["docker restart $id"], $this);
}
2024-06-10 22:43:34 +02:00
2024-02-19 13:28:14 +01:00
public function startUnmanaged($id)
{
return instant_remote_process(["docker start $id"], $this);
}
2024-06-10 22:43:34 +02:00
public function getContainers(): Collection
{
2024-06-10 22:43:34 +02:00
$sentinel_found = instant_remote_process(['docker inspect coolify-sentinel'], $this, false);
$sentinel_found = json_decode($sentinel_found, true);
$status = data_get($sentinel_found, '0.State.Status', 'exited');
if ($status === 'running') {
$containers = instant_remote_process(['docker exec coolify-sentinel sh -c "curl http://127.0.0.1:8888/api/containers"'], $this, false);
if (is_null($containers)) {
return collect([]);
}
$containers = data_get(json_decode($containers, true), 'containers', []);
2024-06-10 22:43:34 +02:00
return collect($containers);
} else {
if ($this->isSwarm()) {
$containers = instant_remote_process(["docker service inspect $(docker service ls -q) --format '{{json .}}'"], $this, false);
} else {
2024-06-10 22:43:34 +02:00
$containers = instant_remote_process(['docker container ls -q'], $this, false);
if (! $containers) {
return collect([]);
}
$containers = instant_remote_process(["docker container inspect $(docker container ls -q) --format '{{json .}}'"], $this, false);
}
if (is_null($containers)) {
return collect([]);
}
return format_docker_command_output_to_json($containers);
}
}
2024-06-10 22:43:34 +02:00
public function loadUnmanagedContainers(): Collection
{
if ($this->isFunctional()) {
2024-04-16 15:42:38 +02:00
$containers = instant_remote_process(["docker ps -a --format '{{json .}}'"], $this);
$containers = format_docker_command_output_to_json($containers);
$containers = $containers->map(function ($container) {
$labels = data_get($container, 'Labels');
2024-06-10 22:43:34 +02:00
if (! str($labels)->contains('coolify.managed')) {
return $container;
}
2024-06-10 22:43:34 +02:00
return null;
});
$containers = $containers->filter();
2024-06-10 22:43:34 +02:00
return collect($containers);
} else {
return collect([]);
}
}
2024-06-10 22:43:34 +02:00
2023-11-06 18:04:18 +01:00
public function hasDefinedResources()
2023-06-15 15:15:27 +02:00
{
$applications = $this->applications()->count() > 0;
$databases = $this->databases()->count() > 0;
$services = $this->services()->count() > 0;
2023-11-06 18:04:18 +01:00
if ($applications || $databases || $services) {
2023-06-15 15:15:27 +02:00
return true;
}
2024-06-10 22:43:34 +02:00
2023-06-15 15:15:27 +02:00
return false;
}
2023-09-11 22:29:34 +02:00
public function databases()
{
2023-08-29 15:51:30 +02:00
return $this->destinations()->map(function ($standaloneDocker) {
2023-10-24 14:31:28 +02:00
$postgresqls = data_get($standaloneDocker, 'postgresqls', collect([]));
$redis = data_get($standaloneDocker, 'redis', collect([]));
$mongodbs = data_get($standaloneDocker, 'mongodbs', collect([]));
$mysqls = data_get($standaloneDocker, 'mysqls', collect([]));
$mariadbs = data_get($standaloneDocker, 'mariadbs', collect([]));
2024-04-10 15:00:46 +02:00
$keydbs = data_get($standaloneDocker, 'keydbs', collect([]));
$dragonflies = data_get($standaloneDocker, 'dragonflies', collect([]));
$clickhouses = data_get($standaloneDocker, 'clickhouses', collect([]));
2024-06-10 22:43:34 +02:00
2024-04-10 15:00:46 +02:00
return $postgresqls->concat($redis)->concat($mongodbs)->concat($mysqls)->concat($mariadbs)->concat($keydbs)->concat($dragonflies)->concat($clickhouses);
})->filter(function ($item) {
2024-02-19 13:28:14 +01:00
return data_get($item, 'name') !== 'coolify-db';
2023-08-29 15:51:30 +02:00
})->flatten();
}
2024-06-10 22:43:34 +02:00
2023-06-15 15:15:27 +02:00
public function applications()
{
$applications = $this->destinations()->map(function ($standaloneDocker) {
2023-06-15 15:15:27 +02:00
return $standaloneDocker->applications;
})->flatten();
$additionalApplicationIds = DB::table('additional_destinations')->where('server_id', $this->id)->get('application_id');
$additionalApplicationIds = collect($additionalApplicationIds)->map(function ($item) {
return $item->application_id;
});
Application::whereIn('id', $additionalApplicationIds)->get()->each(function ($application) use ($applications) {
$applications->push($application);
});
2024-06-10 22:43:34 +02:00
return $applications;
2023-06-15 15:15:27 +02:00
}
2024-06-10 22:43:34 +02:00
public function dockerComposeBasedApplications()
{
return $this->applications()->filter(function ($application) {
return data_get($application, 'build_pack') === 'dockercompose';
});
}
2024-06-10 22:43:34 +02:00
public function dockerComposeBasedPreviewDeployments()
{
return $this->previews()->filter(function ($preview) {
$applicationId = data_get($preview, 'application_id');
$application = Application::find($applicationId);
2024-06-10 22:43:34 +02:00
if (! $application) {
return false;
}
2024-06-10 22:43:34 +02:00
return data_get($application, 'build_pack') === 'dockercompose';
});
}
2024-06-10 22:43:34 +02:00
2023-09-25 09:17:42 +02:00
public function services()
{
2023-09-21 17:48:31 +02:00
return $this->hasMany(Service::class);
}
2024-06-10 22:43:34 +02:00
public function getIp(): Attribute
{
return Attribute::make(
get: function () {
if (isDev()) {
return '127.0.0.1';
}
if ($this->isLocalhost()) {
return base_ip();
}
2024-06-10 22:43:34 +02:00
return $this->ip;
}
);
}
2024-06-10 22:43:34 +02:00
2023-09-25 09:17:42 +02:00
public function previews()
{
2023-09-14 15:52:04 +02:00
return $this->destinations()->map(function ($standaloneDocker) {
return $standaloneDocker->applications->map(function ($application) {
return $application->previews;
})->flatten();
})->flatten();
}
2023-06-13 10:02:58 +02:00
public function destinations()
{
$standalone_docker = $this->hasMany(StandaloneDocker::class)->get();
$swarm_docker = $this->hasMany(SwarmDocker::class)->get();
2024-06-10 22:43:34 +02:00
// $additional_dockers = $this->belongsToMany(StandaloneDocker::class, 'additional_destinations')->withPivot('server_id')->get();
// return $standalone_docker->concat($swarm_docker)->concat($additional_dockers);
return $standalone_docker->concat($swarm_docker);
2023-06-13 10:02:58 +02:00
}
2023-05-02 12:47:52 +02:00
public function standaloneDockers()
2023-04-25 14:43:35 +02:00
{
2023-05-02 12:47:52 +02:00
return $this->hasMany(StandaloneDocker::class);
}
2023-05-04 15:45:53 +02:00
2023-05-02 12:47:52 +02:00
public function swarmDockers()
{
return $this->hasMany(SwarmDocker::class);
2023-04-25 14:43:35 +02:00
}
2023-05-04 15:45:53 +02:00
2023-03-27 14:31:42 +02:00
public function privateKey()
{
2023-03-27 14:31:42 +02:00
return $this->belongsTo(PrivateKey::class);
}
2023-05-03 07:23:45 +02:00
2023-06-16 13:13:09 +02:00
public function muxFilename()
{
return "{$this->ip}_{$this->port}_{$this->user}";
}
2023-07-07 21:35:29 +02:00
public function team()
{
return $this->belongsTo(Team::class);
}
2024-06-10 22:43:34 +02:00
2023-09-11 22:29:34 +02:00
public function isProxyShouldRun()
{
if ($this->proxyType() === ProxyTypes::NONE->value || $this->settings->is_build_server) {
2023-09-25 09:17:42 +02:00
return false;
}
2024-06-10 22:43:34 +02:00
return true;
2023-09-11 22:29:34 +02:00
}
2024-06-10 22:43:34 +02:00
2023-09-25 09:17:42 +02:00
public function isFunctional()
{
2024-06-10 22:43:34 +02:00
$isFunctional = $this->settings->is_reachable && $this->settings->is_usable && ! $this->settings->force_disabled;
['private_key_filename' => $private_key_filename, 'mux_filename' => $mux_filename] = server_ssh_configuration($this);
if (! $isFunctional) {
Storage::disk('ssh-keys')->delete($private_key_filename);
Storage::disk('ssh-mux')->delete($mux_filename);
}
2024-06-10 22:43:34 +02:00
return $isFunctional;
2023-09-12 13:14:01 +02:00
}
2024-06-10 22:43:34 +02:00
public function isLogDrainEnabled()
{
2023-12-01 11:13:58 +01:00
return $this->settings->is_logdrain_newrelic_enabled || $this->settings->is_logdrain_highlight_enabled || $this->settings->is_logdrain_axiom_enabled || $this->settings->is_logdrain_custom_enabled;
}
2024-06-10 22:43:34 +02:00
public function validateOS(): bool|Stringable
{
$os_release = instant_remote_process(['cat /etc/os-release'], $this);
2024-01-08 21:59:26 +01:00
$releaseLines = collect(explode("\n", $os_release));
$collectedData = collect([]);
2024-01-08 21:59:26 +01:00
foreach ($releaseLines as $line) {
$item = Str::of($line)->trim();
$collectedData->put($item->before('=')->value(), $item->after('=')->lower()->replace('"', '')->value());
}
$ID = data_get($collectedData, 'ID');
// $ID_LIKE = data_get($collectedData, 'ID_LIKE');
// $VERSION_ID = data_get($collectedData, 'VERSION_ID');
$supported = collect(SUPPORTED_OS)->filter(function ($supportedOs) use ($ID) {
if (str($supportedOs)->contains($ID)) {
return str($ID);
}
});
if ($supported->count() === 1) {
2024-02-22 11:28:45 +01:00
// ray('supported');
2023-11-28 13:17:59 +01:00
return str($supported->first());
} else {
2024-02-22 11:28:45 +01:00
// ray('not supported');
return false;
}
}
2024-06-10 22:43:34 +02:00
2023-11-28 15:49:24 +01:00
public function isSwarm()
{
2023-11-29 10:06:52 +01:00
return data_get($this, 'settings.is_swarm_manager') || data_get($this, 'settings.is_swarm_worker');
2023-11-28 15:49:24 +01:00
}
2024-06-10 22:43:34 +02:00
2023-12-18 14:01:25 +01:00
public function isSwarmManager()
{
return data_get($this, 'settings.is_swarm_manager');
}
2024-06-10 22:43:34 +02:00
2023-12-18 14:01:25 +01:00
public function isSwarmWorker()
{
return data_get($this, 'settings.is_swarm_worker');
}
2024-06-10 22:43:34 +02:00
2023-10-09 11:00:18 +02:00
public function validateConnection()
{
config()->set('coolify.mux_enabled', false);
2023-11-28 15:49:24 +01:00
$server = Server::find($this->id);
2024-06-10 22:43:34 +02:00
if (! $server) {
2024-04-16 15:42:38 +02:00
return ['uptime' => false, 'error' => 'Server not found.'];
2023-12-19 12:24:43 +01:00
}
2023-12-04 20:47:32 +01:00
if ($server->skipServer()) {
2024-04-16 15:42:38 +02:00
return ['uptime' => false, 'error' => 'Server skipped.'];
}
2024-04-16 15:42:38 +02:00
try {
// EC2 does not have `uptime` command, lol
instant_remote_process(['ls /'], $server);
2023-12-04 20:47:32 +01:00
$server->settings()->update([
'is_reachable' => true,
]);
2023-11-28 15:49:24 +01:00
$server->update([
'unreachable_count' => 0,
]);
2024-04-16 15:42:38 +02:00
if (data_get($server, 'unreachable_notification_sent') === true) {
// $server->team?->notify(new Revived($server));
2024-04-16 15:42:38 +02:00
$server->update(['unreachable_notification_sent' => false]);
}
2024-06-10 22:43:34 +02:00
2024-04-16 15:42:38 +02:00
return ['uptime' => true, 'error' => null];
} catch (\Throwable $e) {
$server->settings()->update([
'is_reachable' => false,
]);
2024-06-10 22:43:34 +02:00
2024-04-16 15:42:38 +02:00
return ['uptime' => false, 'error' => $e->getMessage()];
2023-10-09 11:00:18 +02:00
}
}
2024-06-10 22:43:34 +02:00
public function installDocker()
{
$activity = InstallDocker::run($this);
2024-06-10 22:43:34 +02:00
return $activity;
}
2024-06-10 22:43:34 +02:00
2023-10-09 11:00:18 +02:00
public function validateDockerEngine($throwError = false)
{
2024-06-10 22:43:34 +02:00
$dockerBinary = instant_remote_process(['command -v docker'], $this, false, no_sudo: true);
2023-10-09 11:00:18 +02:00
if (is_null($dockerBinary)) {
$this->settings->is_usable = false;
$this->settings->save();
if ($throwError) {
throw new \Exception('Server is not usable. Docker Engine is not installed.');
2023-10-09 11:00:18 +02:00
}
2024-06-10 22:43:34 +02:00
2023-10-09 11:00:18 +02:00
return false;
}
2024-02-22 11:28:45 +01:00
try {
2024-06-10 22:43:34 +02:00
instant_remote_process(['docker version'], $this);
2024-02-22 11:28:45 +01:00
} catch (\Throwable $e) {
$this->settings->is_usable = false;
$this->settings->save();
if ($throwError) {
throw new \Exception('Server is not usable. Docker Engine is not running.');
}
2024-06-10 22:43:34 +02:00
2024-02-22 11:28:45 +01:00
return false;
}
2023-10-09 11:00:18 +02:00
$this->settings->is_usable = true;
$this->settings->save();
$this->validateCoolifyNetwork(isSwarm: false, isBuildServer: $this->settings->is_build_server);
2024-06-10 22:43:34 +02:00
2023-11-28 15:49:24 +01:00
return true;
}
2024-06-10 22:43:34 +02:00
public function validateDockerCompose($throwError = false)
{
2024-06-10 22:43:34 +02:00
$dockerCompose = instant_remote_process(['docker compose version'], $this, false);
if (is_null($dockerCompose)) {
$this->settings->is_usable = false;
$this->settings->save();
if ($throwError) {
throw new \Exception('Server is not usable. Docker Compose is not installed.');
}
2024-06-10 22:43:34 +02:00
return false;
}
$this->settings->is_usable = true;
$this->settings->save();
2024-06-10 22:43:34 +02:00
return true;
}
2024-06-10 22:43:34 +02:00
2023-11-28 15:49:24 +01:00
public function validateDockerSwarm()
{
2024-06-10 22:43:34 +02:00
$swarmStatus = instant_remote_process(['docker info|grep -i swarm'], $this, false);
2023-11-28 15:49:24 +01:00
$swarmStatus = str($swarmStatus)->trim()->after(':')->trim();
if ($swarmStatus === 'inactive') {
throw new \Exception('Docker Swarm is not initiated. Please join the server to a swarm before continuing.');
2024-06-10 22:43:34 +02:00
2023-11-28 15:49:24 +01:00
return false;
}
$this->settings->is_usable = true;
$this->settings->save();
$this->validateCoolifyNetwork(isSwarm: true);
2024-06-10 22:43:34 +02:00
2023-10-09 11:00:18 +02:00
return true;
}
2024-06-10 22:43:34 +02:00
2023-10-09 11:00:18 +02:00
public function validateDockerEngineVersion()
{
2024-06-10 22:43:34 +02:00
$dockerVersionRaw = instant_remote_process(['docker version --format json'], $this, false);
2024-05-31 09:41:34 +02:00
$dockerVersionJson = json_decode($dockerVersionRaw, true);
$dockerVersion = data_get($dockerVersionJson, 'Server.Version', '0.0.0');
2023-10-09 11:00:18 +02:00
$dockerVersion = checkMinimumDockerEngineVersion($dockerVersion);
if (is_null($dockerVersion)) {
$this->settings->is_usable = false;
$this->settings->save();
2024-06-10 22:43:34 +02:00
2023-10-09 11:00:18 +02:00
return false;
}
$this->settings->is_reachable = true;
2023-10-09 11:00:18 +02:00
$this->settings->is_usable = true;
$this->settings->save();
2024-06-10 22:43:34 +02:00
2023-10-09 11:00:18 +02:00
return true;
}
2024-06-10 22:43:34 +02:00
public function validateCoolifyNetwork($isSwarm = false, $isBuildServer = false)
2023-10-24 14:31:28 +02:00
{
if ($isBuildServer) {
return;
}
2023-11-28 15:49:24 +01:00
if ($isSwarm) {
2024-06-10 22:43:34 +02:00
return instant_remote_process(['docker network create --attachable --driver overlay coolify-overlay >/dev/null 2>&1 || true'], $this, false);
2023-11-28 15:49:24 +01:00
} else {
2024-06-10 22:43:34 +02:00
return instant_remote_process(['docker network create coolify --attachable >/dev/null 2>&1 || true'], $this, false);
2023-11-28 15:49:24 +01:00
}
2023-10-09 11:00:18 +02:00
}
2024-06-10 22:43:34 +02:00
2024-04-16 15:42:38 +02:00
public function isNonRoot()
{
if ($this->user instanceof Stringable) {
return $this->user->value() !== 'root';
}
2024-06-10 22:43:34 +02:00
2024-04-16 15:42:38 +02:00
return $this->user !== 'root';
}
2024-06-10 22:43:34 +02:00
public function isBuildServer()
{
return $this->settings->is_build_server;
}
2023-07-14 13:38:24 +02:00
}