lasthourcloud/app/Models/Server.php

1081 lines
38 KiB
PHP
Raw Permalink Normal View History

<?php
namespace App\Models;
use App\Actions\Server\InstallDocker;
2023-09-21 15:48:31 +00:00
use App\Enums\ProxyTypes;
use App\Jobs\PullSentinelImageJob;
2023-05-03 05:23:45 +00:00
use Illuminate\Database\Eloquent\Builder;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Support\Collection;
use Illuminate\Support\Facades\DB;
2024-06-20 11:17:06 +00:00
use Illuminate\Support\Facades\Process;
use Illuminate\Support\Facades\Storage;
use Illuminate\Support\Stringable;
2024-07-09 08:45:10 +00:00
use OpenApi\Attributes as OA;
2024-06-10 20:43:34 +00:00
use Spatie\SchemalessAttributes\Casts\SchemalessAttributes;
use Spatie\SchemalessAttributes\SchemalessAttributesTrait;
2024-03-11 16:17:34 +00:00
use Spatie\Url\Url;
use Symfony\Component\Yaml\Yaml;
2023-05-03 05:23:45 +00:00
2024-07-09 08:45:10 +00:00
#[OA\Schema(
2024-07-23 12:20:53 +00:00
description: 'Server model',
2024-07-09 08:45:10 +00:00
type: 'object',
properties: [
'id' => ['type' => 'integer'],
'uuid' => ['type' => 'string'],
'name' => ['type' => 'string'],
2024-07-23 12:20:53 +00:00
'description' => ['type' => 'string'],
'ip' => ['type' => 'string'],
'user' => ['type' => 'string'],
'port' => ['type' => 'integer'],
'proxy' => ['type' => 'object'],
'high_disk_usage_notification_sent' => ['type' => 'boolean'],
'unreachable_notification_sent' => ['type' => 'boolean'],
'unreachable_count' => ['type' => 'integer'],
'validation_logs' => ['type' => 'string'],
'log_drain_notification_sent' => ['type' => 'boolean'],
'swarm_cluster' => ['type' => 'string'],
2024-07-09 08:45:10 +00:00
]
)]
class Server extends BaseModel
{
2023-06-20 18:19:31 +00:00
use SchemalessAttributesTrait;
2024-06-10 20:43:34 +00:00
2023-11-22 14:18:49 +00:00
public static $batch_counter = 0;
2023-08-23 08:14:39 +00:00
protected static function booted()
{
2023-10-09 09:00:18 +00:00
static::saving(function ($server) {
2023-10-09 18:12:03 +00:00
$payload = [];
if ($server->user) {
$payload['user'] = str($server->user)->trim();
2023-10-09 18:12:03 +00:00
}
if ($server->ip) {
$payload['ip'] = str($server->ip)->trim();
2023-10-09 18:12:03 +00:00
}
$server->forceFill($payload);
});
2023-08-23 08:14:39 +00:00
static::created(function ($server) {
ServerSetting::create([
'server_id' => $server->id,
]);
2024-07-23 12:20:53 +00:00
if ($server->id === 0) {
if ($server->isSwarm()) {
SwarmDocker::create([
'id' => 0,
'name' => 'coolify',
'network' => 'coolify-overlay',
'server_id' => $server->id,
]);
} else {
StandaloneDocker::create([
'id' => 0,
'name' => 'coolify',
'network' => 'coolify',
'server_id' => $server->id,
]);
}
} else {
if ($server->isSwarm()) {
SwarmDocker::create([
'name' => 'coolify-overlay',
'network' => 'coolify-overlay',
'server_id' => $server->id,
]);
} else {
StandaloneDocker::create([
'name' => 'coolify',
'network' => 'coolify',
'server_id' => $server->id,
]);
}
}
2023-08-23 08:14:39 +00:00
});
static::deleting(function ($server) {
2023-08-29 13:51:30 +00:00
$server->destinations()->each(function ($destination) {
$destination->delete();
});
2023-08-23 08:14:39 +00:00
$server->settings()->delete();
});
}
public $casts = [
'proxy' => SchemalessAttributes::class,
'logdrain_axiom_api_key' => 'encrypted',
'logdrain_newrelic_license_key' => 'encrypted',
];
2024-06-10 20:43:34 +00:00
2023-06-20 18:19:31 +00:00
protected $schemalessAttributes = [
'proxy',
];
2024-06-10 20:43:34 +00:00
2023-08-23 08:14:39 +00:00
protected $guarded = [];
2024-06-10 20:43:34 +00:00
public static function isReachable()
{
return Server::ownedByCurrentTeam()->whereRelation('settings', 'is_reachable', true);
}
2024-06-10 20:43:34 +00:00
public static function ownedByCurrentTeam(array $select = ['*'])
{
2023-08-22 15:44:49 +00:00
$teamId = currentTeam()->id;
$selectArray = collect($select)->concat(['id']);
2024-06-10 20:43:34 +00:00
2023-12-04 14:08:24 +00:00
return Server::whereTeamId($teamId)->with('settings', 'swarmDockers', 'standaloneDockers')->select($selectArray->all())->orderBy('name');
}
2024-06-10 20:43:34 +00:00
public static function isUsable()
{
return Server::ownedByCurrentTeam()->whereRelation('settings', 'is_reachable', true)->whereRelation('settings', 'is_usable', true)->whereRelation('settings', 'is_swarm_worker', false)->whereRelation('settings', 'is_build_server', false)->whereRelation('settings', 'force_disabled', false);
}
2024-06-10 20:43:34 +00:00
public static function destinationsByServer(string $server_id)
{
$server = Server::ownedByCurrentTeam()->get()->where('id', $server_id)->firstOrFail();
$standaloneDocker = collect($server->standaloneDockers->all());
$swarmDocker = collect($server->swarmDockers->all());
2024-06-10 20:43:34 +00:00
return $standaloneDocker->concat($swarmDocker);
}
2024-06-10 20:43:34 +00:00
public function settings()
{
return $this->hasOne(ServerSetting::class);
}
2024-06-10 20:43:34 +00:00
2024-03-12 09:42:56 +00:00
public function setupDefault404Redirect()
{
2024-06-18 14:43:18 +00:00
$dynamic_conf_path = $this->proxyPath().'/dynamic';
2024-03-12 09:42:56 +00:00
$proxy_type = $this->proxyType();
$redirect_url = $this->proxy->redirect_url;
if ($proxy_type === 'TRAEFIK_V2') {
$default_redirect_file = "$dynamic_conf_path/default_redirect_404.yaml";
2024-06-10 20:43:34 +00:00
} elseif ($proxy_type === 'CADDY') {
2024-03-12 09:42:56 +00:00
$default_redirect_file = "$dynamic_conf_path/default_redirect_404.caddy";
}
if (empty($redirect_url)) {
if ($proxy_type === 'CADDY') {
2024-06-10 20:43:34 +00:00
$conf = ':80, :443 {
respond 404
2024-06-10 20:43:34 +00:00
}';
$conf =
2024-06-18 14:43:18 +00:00
"# This file is automatically generated by Coolify.\n".
"# Do not edit it manually (only if you know what are you doing).\n\n".
$conf;
$base64 = base64_encode($conf);
instant_remote_process([
"mkdir -p $dynamic_conf_path",
"echo '$base64' | base64 -d | tee $default_redirect_file > /dev/null",
], $this);
$this->reloadCaddy();
2024-06-10 20:43:34 +00:00
return;
}
2024-03-12 09:42:56 +00:00
instant_remote_process([
"mkdir -p $dynamic_conf_path",
"rm -f $default_redirect_file",
], $this);
2024-06-10 20:43:34 +00:00
2024-03-12 09:42:56 +00:00
return;
}
if ($proxy_type === 'TRAEFIK_V2') {
$dynamic_conf = [
2024-06-10 20:43:34 +00:00
'http' => [
'routers' => [
'catchall' => [
2024-03-12 09:42:56 +00:00
'entryPoints' => [
0 => 'http',
1 => 'https',
],
'service' => 'noop',
2024-06-10 20:43:34 +00:00
'rule' => 'HostRegexp(`{catchall:.*}`)',
2024-03-12 09:42:56 +00:00
'priority' => 1,
'middlewares' => [
0 => 'redirect-regexp@file',
],
],
],
2024-06-10 20:43:34 +00:00
'services' => [
'noop' => [
'loadBalancer' => [
'servers' => [
0 => [
2024-03-12 09:42:56 +00:00
'url' => '',
],
],
],
],
],
2024-06-10 20:43:34 +00:00
'middlewares' => [
'redirect-regexp' => [
'redirectRegex' => [
2024-03-12 09:42:56 +00:00
'regex' => '(.*)',
'replacement' => $redirect_url,
'permanent' => false,
],
],
],
],
];
$conf = Yaml::dump($dynamic_conf, 12, 2);
$conf =
2024-06-18 14:43:18 +00:00
"# This file is automatically generated by Coolify.\n".
"# Do not edit it manually (only if you know what are you doing).\n\n".
2024-03-12 09:42:56 +00:00
$conf;
$base64 = base64_encode($conf);
2024-06-10 20:43:34 +00:00
} elseif ($proxy_type === 'CADDY') {
$conf = ":80, :443 {
2024-03-12 09:42:56 +00:00
redir $redirect_url
}";
$conf =
2024-06-18 14:43:18 +00:00
"# This file is automatically generated by Coolify.\n".
"# Do not edit it manually (only if you know what are you doing).\n\n".
2024-03-12 09:42:56 +00:00
$conf;
$base64 = base64_encode($conf);
}
instant_remote_process([
"mkdir -p $dynamic_conf_path",
"echo '$base64' | base64 -d | tee $default_redirect_file > /dev/null",
2024-03-12 09:42:56 +00:00
], $this);
if (config('app.env') == 'local') {
ray($conf);
}
if ($proxy_type === 'CADDY') {
$this->reloadCaddy();
}
}
2024-06-10 20:43:34 +00:00
2024-03-11 16:17:34 +00:00
public function setupDynamicProxyConfiguration()
{
2024-07-12 13:45:36 +00:00
$settings = \App\Models\InstanceSettings::get();
2024-06-18 14:43:18 +00:00
$dynamic_config_path = $this->proxyPath().'/dynamic';
2024-03-12 11:30:40 +00:00
if ($this->proxyType() === 'TRAEFIK_V2') {
$file = "$dynamic_config_path/coolify.yaml";
2024-07-11 09:20:09 +00:00
if (empty($settings->fqdn) || (isCloud() && $this->id !== 0) || ! $this->isLocalhost()) {
2024-03-12 11:30:40 +00:00
instant_remote_process([
"rm -f $file",
], $this);
} else {
$url = Url::fromString($settings->fqdn);
$host = $url->getHost();
$schema = $url->getScheme();
$traefik_dynamic_conf = [
2024-06-10 20:43:34 +00:00
'http' => [
2024-03-12 11:30:40 +00:00
'middlewares' => [
'redirect-to-https' => [
'redirectscheme' => [
'scheme' => 'https',
],
],
'gzip' => [
'compress' => true,
],
],
2024-06-10 20:43:34 +00:00
'routers' => [
'coolify-http' => [
2024-03-12 11:30:40 +00:00
'middlewares' => [
0 => 'gzip',
2024-03-11 16:17:34 +00:00
],
2024-03-12 11:30:40 +00:00
'entryPoints' => [
0 => 'http',
2024-03-11 16:17:34 +00:00
],
2024-03-12 11:30:40 +00:00
'service' => 'coolify',
'rule' => "Host(`{$host}`)",
2024-03-11 16:17:34 +00:00
],
2024-06-10 20:43:34 +00:00
'coolify-realtime-ws' => [
2024-03-12 11:30:40 +00:00
'entryPoints' => [
0 => 'http',
2024-03-11 16:17:34 +00:00
],
2024-03-12 11:30:40 +00:00
'service' => 'coolify-realtime',
'rule' => "Host(`{$host}`) && PathPrefix(`/app`)",
2024-03-11 16:17:34 +00:00
],
2024-03-12 11:30:40 +00:00
],
2024-06-10 20:43:34 +00:00
'services' => [
'coolify' => [
'loadBalancer' => [
'servers' => [
0 => [
2024-03-12 11:30:40 +00:00
'url' => 'http://coolify:80',
2024-03-11 16:17:34 +00:00
],
],
],
2024-03-12 11:30:40 +00:00
],
2024-06-10 20:43:34 +00:00
'coolify-realtime' => [
'loadBalancer' => [
'servers' => [
0 => [
2024-03-12 11:30:40 +00:00
'url' => 'http://coolify-realtime:6001',
2024-03-11 16:17:34 +00:00
],
],
],
],
],
2024-03-12 11:30:40 +00:00
],
];
2024-03-11 16:17:34 +00:00
2024-03-12 11:30:40 +00:00
if ($schema === 'https') {
$traefik_dynamic_conf['http']['routers']['coolify-http']['middlewares'] = [
0 => 'redirect-to-https',
];
2024-03-11 16:17:34 +00:00
2024-03-12 11:30:40 +00:00
$traefik_dynamic_conf['http']['routers']['coolify-https'] = [
'entryPoints' => [
0 => 'https',
],
'service' => 'coolify',
'rule' => "Host(`{$host}`)",
'tls' => [
'certresolver' => 'letsencrypt',
],
];
$traefik_dynamic_conf['http']['routers']['coolify-realtime-wss'] = [
'entryPoints' => [
0 => 'https',
],
'service' => 'coolify-realtime',
'rule' => "Host(`{$host}`) && PathPrefix(`/app`)",
'tls' => [
'certresolver' => 'letsencrypt',
],
];
}
$yaml = Yaml::dump($traefik_dynamic_conf, 12, 2);
$yaml =
2024-06-18 14:43:18 +00:00
"# This file is automatically generated by Coolify.\n".
"# Do not edit it manually (only if you know what are you doing).\n\n".
2024-03-12 11:30:40 +00:00
$yaml;
2024-03-11 16:17:34 +00:00
2024-03-12 11:30:40 +00:00
$base64 = base64_encode($yaml);
instant_remote_process([
"mkdir -p $dynamic_config_path",
"echo '$base64' | base64 -d | tee $file > /dev/null",
2024-03-12 11:30:40 +00:00
], $this);
2024-03-11 16:17:34 +00:00
2024-03-12 11:30:40 +00:00
if (config('app.env') == 'local') {
// ray($yaml);
2024-03-11 16:17:34 +00:00
}
2024-03-12 11:30:40 +00:00
}
2024-06-10 20:43:34 +00:00
} elseif ($this->proxyType() === 'CADDY') {
2024-03-12 11:30:40 +00:00
$file = "$dynamic_config_path/coolify.caddy";
2024-07-11 09:20:09 +00:00
if (empty($settings->fqdn) || (isCloud() && $this->id !== 0) || ! $this->isLocalhost()) {
2024-03-12 11:30:40 +00:00
instant_remote_process([
"rm -f $file",
], $this);
$this->reloadCaddy();
} else {
$url = Url::fromString($settings->fqdn);
$host = $url->getHost();
$schema = $url->getScheme();
$caddy_file = "
2024-03-11 16:17:34 +00:00
$schema://$host {
handle /app/* {
reverse_proxy coolify-realtime:6001
}
2024-03-11 16:17:34 +00:00
reverse_proxy coolify:80
}";
2024-03-12 11:30:40 +00:00
$base64 = base64_encode($caddy_file);
instant_remote_process([
"echo '$base64' | base64 -d | tee $file > /dev/null",
2024-03-12 11:30:40 +00:00
], $this);
$this->reloadCaddy();
2024-03-11 16:17:34 +00:00
}
}
}
2024-06-10 20:43:34 +00:00
2024-03-12 09:42:56 +00:00
public function reloadCaddy()
{
2024-03-11 16:31:28 +00:00
return instant_remote_process([
2024-06-10 20:43:34 +00:00
'docker exec coolify-proxy caddy reload --config /config/caddy/Caddyfile.autosave',
2024-03-11 16:31:28 +00:00
], $this);
}
2024-06-10 20:43:34 +00:00
2024-03-11 16:17:34 +00:00
public function proxyPath()
{
2024-03-11 14:08:05 +00:00
$base_path = config('coolify.base_config_path');
$proxyType = $this->proxyType();
$proxy_path = "$base_path/proxy";
// TODO: should use /traefik for already exisiting configurations?
// Should move everything except /caddy and /nginx to /traefik
// The code needs to be modified as well, so maybe it does not worth it
2024-03-11 14:08:05 +00:00
if ($proxyType === ProxyTypes::TRAEFIK_V2->value) {
$proxy_path = $proxy_path;
2024-06-10 20:43:34 +00:00
} elseif ($proxyType === ProxyTypes::CADDY->value) {
2024-06-18 14:43:18 +00:00
$proxy_path = $proxy_path.'/caddy';
2024-06-10 20:43:34 +00:00
} elseif ($proxyType === ProxyTypes::NGINX->value) {
2024-06-18 14:43:18 +00:00
$proxy_path = $proxy_path.'/nginx';
2024-03-11 14:08:05 +00:00
}
2024-06-10 20:43:34 +00:00
2024-03-11 14:08:05 +00:00
return $proxy_path;
}
2024-06-10 20:43:34 +00:00
2023-09-25 07:17:42 +00:00
public function proxyType()
{
2024-03-12 11:30:40 +00:00
// $proxyType = $this->proxy->get('type');
// if ($proxyType === ProxyTypes::NONE->value) {
// return $proxyType;
// }
2024-03-11 14:08:05 +00:00
// if (is_null($proxyType)) {
// $this->proxy->type = ProxyTypes::TRAEFIK_V2->value;
// $this->proxy->status = ProxyStatus::EXITED->value;
// $this->save();
// }
return data_get($this->proxy, 'type');
2023-09-20 13:42:41 +00:00
}
2024-06-10 20:43:34 +00:00
2023-06-20 18:19:31 +00:00
public function scopeWithProxy(): Builder
2023-05-30 13:52:17 +00:00
{
2023-06-20 18:19:31 +00:00
return $this->proxy->modelScope();
2023-05-30 13:52:17 +00:00
}
public function isLocalhost()
{
return $this->ip === 'host.docker.internal' || $this->id === 0;
}
2024-06-10 20:43:34 +00:00
public static function buildServers($teamId)
2024-01-17 10:52:56 +00:00
{
return Server::whereTeamId($teamId)->whereRelation('settings', 'is_reachable', true)->whereRelation('settings', 'is_build_server', true);
}
2024-06-10 20:43:34 +00:00
public function skipServer()
{
if ($this->ip === '1.2.3.4') {
2024-02-26 13:22:24 +00:00
// ray('skipping 1.2.3.4');
return true;
}
if ($this->settings->force_disabled === true) {
2024-02-26 13:22:24 +00:00
// ray('force_disabled');
return true;
}
2024-06-10 20:43:34 +00:00
return false;
}
2024-06-10 20:43:34 +00:00
public function isForceDisabled()
{
return $this->settings->force_disabled;
}
2024-06-10 20:43:34 +00:00
public function forceEnableServer()
{
$this->settings->update([
'force_disabled' => false,
]);
}
2024-06-10 20:43:34 +00:00
public function forceDisableServer()
{
2024-02-25 22:34:01 +00:00
$this->settings->update([
'force_disabled' => true,
2024-02-25 22:34:01 +00:00
]);
$sshKeyFileLocation = "id.root@{$this->uuid}";
Storage::disk('ssh-keys')->delete($sshKeyFileLocation);
Storage::disk('ssh-mux')->delete($this->muxFilename());
2024-02-25 22:34:01 +00:00
}
2024-06-10 20:43:34 +00:00
2024-06-20 11:17:06 +00:00
public function isSentinelEnabled()
{
return $this->isMetricsEnabled() || $this->isServerApiEnabled();
}
2024-06-18 14:42:42 +00:00
public function isMetricsEnabled()
{
return $this->settings->is_metrics_enabled;
}
2024-06-18 14:43:18 +00:00
2024-06-20 11:17:06 +00:00
public function isServerApiEnabled()
{
return $this->settings->is_server_api_enabled;
}
public function checkServerApi()
{
if ($this->isServerApiEnabled()) {
$server_ip = $this->ip;
if (isDev()) {
if ($this->id === 0) {
$server_ip = 'localhost';
}
}
$command = "curl -s http://{$server_ip}:12172/api/health";
$process = Process::timeout(5)->run($command);
if ($process->failed()) {
ray($process->exitCode(), $process->output(), $process->errorOutput());
throw new \Exception("Server API is not reachable on http://{$server_ip}:12172");
}
}
}
public function checkSentinel()
{
2024-06-28 13:05:37 +00:00
// ray("Checking sentinel on server: {$this->name}");
2024-06-20 11:17:06 +00:00
if ($this->isSentinelEnabled()) {
2024-06-10 20:43:34 +00:00
$sentinel_found = instant_remote_process(['docker inspect coolify-sentinel'], $this, false);
2024-05-08 12:22:35 +00:00
$sentinel_found = json_decode($sentinel_found, true);
$status = data_get($sentinel_found, '0.State.Status', 'exited');
if ($status !== 'running') {
2024-07-01 09:39:10 +00:00
// ray('Sentinel is not running, starting it...');
PullSentinelImageJob::dispatch($this);
2024-05-08 12:22:35 +00:00
} else {
2024-06-28 13:05:37 +00:00
// ray('Sentinel is running');
2024-05-08 12:22:35 +00:00
}
}
}
2024-06-10 20:43:34 +00:00
2024-06-18 14:42:42 +00:00
public function getCpuMetrics(int $mins = 5)
2024-05-09 11:25:18 +00:00
{
2024-06-18 14:42:42 +00:00
if ($this->isMetricsEnabled()) {
$from = now()->subMinutes($mins)->toIso8601ZuluString();
$cpu = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl -H \"Authorization: Bearer {$this->settings->metrics_token}\" http://localhost:8888/api/cpu/history?from=$from'"], $this, false);
if (str($cpu)->contains('error')) {
$error = json_decode($cpu, true);
$error = data_get($error, 'error', 'Something is not okay, are you okay?');
if ($error == 'Unauthorized') {
$error = 'Unauthorized, please check your metrics token or restart Sentinel to set a new token.';
}
throw new \Exception($error);
}
$cpu = str($cpu)->explode("\n")->skip(1)->all();
2024-05-09 11:25:18 +00:00
$parsedCollection = collect($cpu)->flatMap(function ($item) {
return collect(explode("\n", trim($item)))->map(function ($line) {
2024-06-20 11:17:06 +00:00
[$time, $cpu_usage_percent] = explode(',', trim($line));
$cpu_usage_percent = number_format($cpu_usage_percent, 0);
2024-06-17 12:22:17 +00:00
2024-06-20 11:17:06 +00:00
return [(int) $time, (float) $cpu_usage_percent];
2024-05-09 11:25:18 +00:00
});
2024-06-19 06:58:57 +00:00
});
2024-06-10 20:43:34 +00:00
2024-06-19 06:58:57 +00:00
return $parsedCollection->toArray();
2024-05-09 11:25:18 +00:00
}
}
2024-06-18 14:43:18 +00:00
2024-06-18 14:42:42 +00:00
public function getMemoryMetrics(int $mins = 5)
{
if ($this->isMetricsEnabled()) {
$from = now()->subMinutes($mins)->toIso8601ZuluString();
$memory = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl -H \"Authorization: Bearer {$this->settings->metrics_token}\" http://localhost:8888/api/memory/history?from=$from'"], $this, false);
if (str($memory)->contains('error')) {
$error = json_decode($memory, true);
$error = data_get($error, 'error', 'Something is not okay, are you okay?');
if ($error == 'Unauthorized') {
$error = 'Unauthorized, please check your metrics token or restart Sentinel to set a new token.';
}
throw new \Exception($error);
}
$memory = str($memory)->explode("\n")->skip(1)->all();
$parsedCollection = collect($memory)->flatMap(function ($item) {
return collect(explode("\n", trim($item)))->map(function ($line) {
[$time, $used, $free, $usedPercent] = explode(',', trim($line));
2024-06-19 07:30:56 +00:00
$usedPercent = number_format($usedPercent, 0);
2024-06-18 14:42:42 +00:00
return [(int) $time, (float) $usedPercent];
});
2024-06-19 06:58:57 +00:00
});
2024-06-18 14:42:42 +00:00
2024-06-19 06:58:57 +00:00
return $parsedCollection->toArray();
2024-06-18 14:42:42 +00:00
}
}
2024-06-10 20:43:34 +00:00
2023-12-19 14:36:59 +00:00
public function isServerReady(int $tries = 3)
{
2023-12-20 10:21:17 +00:00
if ($this->skipServer()) {
return false;
}
2024-05-03 11:31:35 +00:00
$serverUptimeCheckNumber = $this->unreachable_count;
if ($this->unreachable_count < $tries) {
$serverUptimeCheckNumber = $this->unreachable_count + 1;
}
2024-05-03 11:31:35 +00:00
if ($this->unreachable_count > $tries) {
$serverUptimeCheckNumber = $tries;
}
2024-05-03 11:31:35 +00:00
$serverUptimeCheckNumberMax = $tries;
// ray('server: ' . $this->name);
// ray('serverUptimeCheckNumber: ' . $serverUptimeCheckNumber);
// ray('serverUptimeCheckNumberMax: ' . $serverUptimeCheckNumberMax);
['uptime' => $uptime] = $this->validateConnection();
if ($uptime) {
if ($this->unreachable_notification_sent === true) {
$this->update(['unreachable_notification_sent' => false]);
2023-12-19 14:16:08 +00:00
}
2024-06-10 20:43:34 +00:00
2024-05-03 11:31:35 +00:00
return true;
} else {
if ($serverUptimeCheckNumber >= $serverUptimeCheckNumberMax) {
// Reached max number of retries
if ($this->unreachable_notification_sent === false) {
ray('Server unreachable, sending notification...');
// $this->team?->notify(new Unreachable($this));
2024-05-03 11:31:35 +00:00
$this->update(['unreachable_notification_sent' => true]);
}
if ($this->settings->is_reachable === true) {
$this->settings()->update([
'is_reachable' => false,
]);
}
foreach ($this->applications() as $application) {
$application->update(['status' => 'exited']);
}
foreach ($this->databases() as $database) {
$database->update(['status' => 'exited']);
}
foreach ($this->services()->get() as $service) {
$apps = $service->applications()->get();
$dbs = $service->databases()->get();
foreach ($apps as $app) {
$app->update(['status' => 'exited']);
}
foreach ($dbs as $db) {
$db->update(['status' => 'exited']);
}
}
} else {
$this->update([
'unreachable_count' => $this->unreachable_count + 1,
]);
}
2024-06-10 20:43:34 +00:00
2024-05-03 11:31:35 +00:00
return false;
}
}
2024-06-10 20:43:34 +00:00
public function getDiskUsage()
{
return instant_remote_process(["df /| tail -1 | awk '{ print $5}' | sed 's/%//g'"], $this, false);
}
2024-06-10 20:43:34 +00:00
public function definedResources()
{
$applications = $this->applications();
$databases = $this->databases();
$services = $this->services();
2024-06-10 20:43:34 +00:00
return $applications->concat($databases)->concat($services->get());
}
2024-06-10 20:43:34 +00:00
2024-02-19 12:28:14 +00:00
public function stopUnmanaged($id)
{
return instant_remote_process(["docker stop -t 0 $id"], $this);
}
2024-06-10 20:43:34 +00:00
2024-02-19 12:28:14 +00:00
public function restartUnmanaged($id)
{
return instant_remote_process(["docker restart $id"], $this);
}
2024-06-10 20:43:34 +00:00
2024-02-19 12:28:14 +00:00
public function startUnmanaged($id)
{
return instant_remote_process(["docker start $id"], $this);
}
2024-06-10 20:43:34 +00:00
public function getContainers(): Collection
{
2024-06-10 20:43:34 +00:00
$sentinel_found = instant_remote_process(['docker inspect coolify-sentinel'], $this, false);
$sentinel_found = json_decode($sentinel_found, true);
$status = data_get($sentinel_found, '0.State.Status', 'exited');
if ($status === 'running') {
$containers = instant_remote_process(['docker exec coolify-sentinel sh -c "curl http://127.0.0.1:8888/api/containers"'], $this, false);
if (is_null($containers)) {
return collect([]);
}
$containers = data_get(json_decode($containers, true), 'containers', []);
2024-06-10 20:43:34 +00:00
return collect($containers);
} else {
if ($this->isSwarm()) {
$containers = instant_remote_process(["docker service inspect $(docker service ls -q) --format '{{json .}}'"], $this, false);
} else {
2024-06-10 20:43:34 +00:00
$containers = instant_remote_process(['docker container ls -q'], $this, false);
2024-06-18 14:43:18 +00:00
if (! $containers) {
return collect([]);
}
$containers = instant_remote_process(["docker container inspect $(docker container ls -q) --format '{{json .}}'"], $this, false);
}
if (is_null($containers)) {
return collect([]);
}
return format_docker_command_output_to_json($containers);
}
}
2024-06-10 20:43:34 +00:00
public function loadUnmanagedContainers(): Collection
{
if ($this->isFunctional()) {
2024-04-16 13:42:38 +00:00
$containers = instant_remote_process(["docker ps -a --format '{{json .}}'"], $this);
$containers = format_docker_command_output_to_json($containers);
$containers = $containers->map(function ($container) {
$labels = data_get($container, 'Labels');
2024-06-18 14:43:18 +00:00
if (! str($labels)->contains('coolify.managed')) {
return $container;
}
2024-06-10 20:43:34 +00:00
return null;
});
$containers = $containers->filter();
2024-06-10 20:43:34 +00:00
return collect($containers);
} else {
return collect([]);
}
}
2024-06-10 20:43:34 +00:00
2023-11-06 17:04:18 +00:00
public function hasDefinedResources()
2023-06-15 13:15:27 +00:00
{
$applications = $this->applications()->count() > 0;
$databases = $this->databases()->count() > 0;
$services = $this->services()->count() > 0;
2023-11-06 17:04:18 +00:00
if ($applications || $databases || $services) {
2023-06-15 13:15:27 +00:00
return true;
}
2024-06-10 20:43:34 +00:00
2023-06-15 13:15:27 +00:00
return false;
}
2023-09-11 20:29:34 +00:00
public function databases()
{
2023-08-29 13:51:30 +00:00
return $this->destinations()->map(function ($standaloneDocker) {
2023-10-24 12:31:28 +00:00
$postgresqls = data_get($standaloneDocker, 'postgresqls', collect([]));
$redis = data_get($standaloneDocker, 'redis', collect([]));
$mongodbs = data_get($standaloneDocker, 'mongodbs', collect([]));
$mysqls = data_get($standaloneDocker, 'mysqls', collect([]));
$mariadbs = data_get($standaloneDocker, 'mariadbs', collect([]));
2024-04-10 13:00:46 +00:00
$keydbs = data_get($standaloneDocker, 'keydbs', collect([]));
$dragonflies = data_get($standaloneDocker, 'dragonflies', collect([]));
$clickhouses = data_get($standaloneDocker, 'clickhouses', collect([]));
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
return $postgresqls->concat($redis)->concat($mongodbs)->concat($mysqls)->concat($mariadbs)->concat($keydbs)->concat($dragonflies)->concat($clickhouses);
})->filter(function ($item) {
2024-02-19 12:28:14 +00:00
return data_get($item, 'name') !== 'coolify-db';
2023-08-29 13:51:30 +00:00
})->flatten();
}
2024-06-10 20:43:34 +00:00
2023-06-15 13:15:27 +00:00
public function applications()
{
$applications = $this->destinations()->map(function ($standaloneDocker) {
2023-06-15 13:15:27 +00:00
return $standaloneDocker->applications;
})->flatten();
$additionalApplicationIds = DB::table('additional_destinations')->where('server_id', $this->id)->get('application_id');
$additionalApplicationIds = collect($additionalApplicationIds)->map(function ($item) {
return $item->application_id;
});
Application::whereIn('id', $additionalApplicationIds)->get()->each(function ($application) use ($applications) {
$applications->push($application);
});
2024-06-10 20:43:34 +00:00
return $applications;
2023-06-15 13:15:27 +00:00
}
2024-06-10 20:43:34 +00:00
public function dockerComposeBasedApplications()
{
return $this->applications()->filter(function ($application) {
return data_get($application, 'build_pack') === 'dockercompose';
});
}
2024-06-10 20:43:34 +00:00
public function dockerComposeBasedPreviewDeployments()
{
return $this->previews()->filter(function ($preview) {
$applicationId = data_get($preview, 'application_id');
$application = Application::find($applicationId);
2024-06-18 14:43:18 +00:00
if (! $application) {
return false;
}
2024-06-10 20:43:34 +00:00
return data_get($application, 'build_pack') === 'dockercompose';
});
}
2024-06-10 20:43:34 +00:00
2023-09-25 07:17:42 +00:00
public function services()
{
2023-09-21 15:48:31 +00:00
return $this->hasMany(Service::class);
}
2024-06-10 20:43:34 +00:00
public function getIp(): Attribute
{
return Attribute::make(
get: function () {
if (isDev()) {
return '127.0.0.1';
}
if ($this->isLocalhost()) {
return base_ip();
}
2024-06-10 20:43:34 +00:00
return $this->ip;
}
);
}
2024-06-10 20:43:34 +00:00
2023-09-25 07:17:42 +00:00
public function previews()
{
2023-09-14 13:52:04 +00:00
return $this->destinations()->map(function ($standaloneDocker) {
return $standaloneDocker->applications->map(function ($application) {
return $application->previews;
})->flatten();
})->flatten();
}
2023-06-13 08:02:58 +00:00
public function destinations()
{
$standalone_docker = $this->hasMany(StandaloneDocker::class)->get();
$swarm_docker = $this->hasMany(SwarmDocker::class)->get();
2024-06-10 20:43:34 +00:00
// $additional_dockers = $this->belongsToMany(StandaloneDocker::class, 'additional_destinations')->withPivot('server_id')->get();
// return $standalone_docker->concat($swarm_docker)->concat($additional_dockers);
return $standalone_docker->concat($swarm_docker);
2023-06-13 08:02:58 +00:00
}
2023-05-02 10:47:52 +00:00
public function standaloneDockers()
2023-04-25 12:43:35 +00:00
{
2023-05-02 10:47:52 +00:00
return $this->hasMany(StandaloneDocker::class);
}
2023-05-04 13:45:53 +00:00
2023-05-02 10:47:52 +00:00
public function swarmDockers()
{
return $this->hasMany(SwarmDocker::class);
2023-04-25 12:43:35 +00:00
}
2023-05-04 13:45:53 +00:00
2023-03-27 12:31:42 +00:00
public function privateKey()
{
2023-03-27 12:31:42 +00:00
return $this->belongsTo(PrivateKey::class);
}
2023-05-03 05:23:45 +00:00
2023-06-16 11:13:09 +00:00
public function muxFilename()
{
return "{$this->ip}_{$this->port}_{$this->user}";
}
2023-07-07 19:35:29 +00:00
public function team()
{
return $this->belongsTo(Team::class);
}
2024-06-10 20:43:34 +00:00
2023-09-11 20:29:34 +00:00
public function isProxyShouldRun()
{
if ($this->proxyType() === ProxyTypes::NONE->value || $this->settings->is_build_server) {
2023-09-25 07:17:42 +00:00
return false;
}
2024-06-10 20:43:34 +00:00
return true;
2023-09-11 20:29:34 +00:00
}
2024-06-10 20:43:34 +00:00
2023-09-25 07:17:42 +00:00
public function isFunctional()
{
2024-06-18 14:43:18 +00:00
$isFunctional = $this->settings->is_reachable && $this->settings->is_usable && ! $this->settings->force_disabled;
2024-06-10 20:43:34 +00:00
['private_key_filename' => $private_key_filename, 'mux_filename' => $mux_filename] = server_ssh_configuration($this);
2024-06-18 14:43:18 +00:00
if (! $isFunctional) {
Storage::disk('ssh-keys')->delete($private_key_filename);
Storage::disk('ssh-mux')->delete($mux_filename);
}
2024-06-10 20:43:34 +00:00
return $isFunctional;
2023-09-12 11:14:01 +00:00
}
2024-06-10 20:43:34 +00:00
public function isLogDrainEnabled()
{
2023-12-01 10:13:58 +00:00
return $this->settings->is_logdrain_newrelic_enabled || $this->settings->is_logdrain_highlight_enabled || $this->settings->is_logdrain_axiom_enabled || $this->settings->is_logdrain_custom_enabled;
}
2024-06-10 20:43:34 +00:00
public function validateOS(): bool|Stringable
{
$os_release = instant_remote_process(['cat /etc/os-release'], $this);
2024-01-08 20:59:26 +00:00
$releaseLines = collect(explode("\n", $os_release));
$collectedData = collect([]);
2024-01-08 20:59:26 +00:00
foreach ($releaseLines as $line) {
$item = str($line)->trim();
$collectedData->put($item->before('=')->value(), $item->after('=')->lower()->replace('"', '')->value());
}
$ID = data_get($collectedData, 'ID');
// $ID_LIKE = data_get($collectedData, 'ID_LIKE');
// $VERSION_ID = data_get($collectedData, 'VERSION_ID');
$supported = collect(SUPPORTED_OS)->filter(function ($supportedOs) use ($ID) {
if (str($supportedOs)->contains($ID)) {
return str($ID);
}
});
if ($supported->count() === 1) {
2024-02-22 10:28:45 +00:00
// ray('supported');
2023-11-28 12:17:59 +00:00
return str($supported->first());
} else {
2024-02-22 10:28:45 +00:00
// ray('not supported');
return false;
}
}
2024-06-10 20:43:34 +00:00
2023-11-28 14:49:24 +00:00
public function isSwarm()
{
2023-11-29 09:06:52 +00:00
return data_get($this, 'settings.is_swarm_manager') || data_get($this, 'settings.is_swarm_worker');
2023-11-28 14:49:24 +00:00
}
2024-06-10 20:43:34 +00:00
2023-12-18 13:01:25 +00:00
public function isSwarmManager()
{
return data_get($this, 'settings.is_swarm_manager');
}
2024-06-10 20:43:34 +00:00
2023-12-18 13:01:25 +00:00
public function isSwarmWorker()
{
return data_get($this, 'settings.is_swarm_worker');
}
2024-06-10 20:43:34 +00:00
2023-10-09 09:00:18 +00:00
public function validateConnection()
{
config()->set('coolify.mux_enabled', false);
2023-11-28 14:49:24 +00:00
$server = Server::find($this->id);
2024-06-18 14:43:18 +00:00
if (! $server) {
2024-04-16 13:42:38 +00:00
return ['uptime' => false, 'error' => 'Server not found.'];
2023-12-19 11:24:43 +00:00
}
2023-12-04 19:47:32 +00:00
if ($server->skipServer()) {
2024-04-16 13:42:38 +00:00
return ['uptime' => false, 'error' => 'Server skipped.'];
}
2024-04-16 13:42:38 +00:00
try {
// EC2 does not have `uptime` command, lol
instant_remote_process(['ls /'], $server);
2023-12-04 19:47:32 +00:00
$server->settings()->update([
'is_reachable' => true,
]);
2023-11-28 14:49:24 +00:00
$server->update([
'unreachable_count' => 0,
]);
2024-04-16 13:42:38 +00:00
if (data_get($server, 'unreachable_notification_sent') === true) {
// $server->team?->notify(new Revived($server));
2024-04-16 13:42:38 +00:00
$server->update(['unreachable_notification_sent' => false]);
}
2024-06-10 20:43:34 +00:00
2024-04-16 13:42:38 +00:00
return ['uptime' => true, 'error' => null];
} catch (\Throwable $e) {
$server->settings()->update([
'is_reachable' => false,
]);
2024-06-10 20:43:34 +00:00
2024-04-16 13:42:38 +00:00
return ['uptime' => false, 'error' => $e->getMessage()];
2023-10-09 09:00:18 +00:00
}
}
2024-06-10 20:43:34 +00:00
public function installDocker()
{
$activity = InstallDocker::run($this);
2024-06-10 20:43:34 +00:00
return $activity;
}
2024-06-10 20:43:34 +00:00
2023-10-09 09:00:18 +00:00
public function validateDockerEngine($throwError = false)
{
2024-06-10 20:43:34 +00:00
$dockerBinary = instant_remote_process(['command -v docker'], $this, false, no_sudo: true);
2023-10-09 09:00:18 +00:00
if (is_null($dockerBinary)) {
$this->settings->is_usable = false;
$this->settings->save();
if ($throwError) {
throw new \Exception('Server is not usable. Docker Engine is not installed.');
2023-10-09 09:00:18 +00:00
}
2024-06-10 20:43:34 +00:00
2023-10-09 09:00:18 +00:00
return false;
}
2024-02-22 10:28:45 +00:00
try {
2024-06-10 20:43:34 +00:00
instant_remote_process(['docker version'], $this);
2024-02-22 10:28:45 +00:00
} catch (\Throwable $e) {
$this->settings->is_usable = false;
$this->settings->save();
if ($throwError) {
throw new \Exception('Server is not usable. Docker Engine is not running.');
}
2024-06-10 20:43:34 +00:00
2024-02-22 10:28:45 +00:00
return false;
}
2023-10-09 09:00:18 +00:00
$this->settings->is_usable = true;
$this->settings->save();
$this->validateCoolifyNetwork(isSwarm: false, isBuildServer: $this->settings->is_build_server);
2024-06-10 20:43:34 +00:00
2023-11-28 14:49:24 +00:00
return true;
}
2024-06-10 20:43:34 +00:00
public function validateDockerCompose($throwError = false)
{
2024-06-10 20:43:34 +00:00
$dockerCompose = instant_remote_process(['docker compose version'], $this, false);
if (is_null($dockerCompose)) {
$this->settings->is_usable = false;
$this->settings->save();
if ($throwError) {
throw new \Exception('Server is not usable. Docker Compose is not installed.');
}
2024-06-10 20:43:34 +00:00
return false;
}
$this->settings->is_usable = true;
$this->settings->save();
2024-06-10 20:43:34 +00:00
return true;
}
2024-06-10 20:43:34 +00:00
2023-11-28 14:49:24 +00:00
public function validateDockerSwarm()
{
2024-06-10 20:43:34 +00:00
$swarmStatus = instant_remote_process(['docker info|grep -i swarm'], $this, false);
2023-11-28 14:49:24 +00:00
$swarmStatus = str($swarmStatus)->trim()->after(':')->trim();
if ($swarmStatus === 'inactive') {
throw new \Exception('Docker Swarm is not initiated. Please join the server to a swarm before continuing.');
2024-06-10 20:43:34 +00:00
2023-11-28 14:49:24 +00:00
return false;
}
$this->settings->is_usable = true;
$this->settings->save();
$this->validateCoolifyNetwork(isSwarm: true);
2024-06-10 20:43:34 +00:00
2023-10-09 09:00:18 +00:00
return true;
}
2024-06-10 20:43:34 +00:00
2023-10-09 09:00:18 +00:00
public function validateDockerEngineVersion()
{
2024-06-10 20:43:34 +00:00
$dockerVersionRaw = instant_remote_process(['docker version --format json'], $this, false);
2024-05-31 07:41:34 +00:00
$dockerVersionJson = json_decode($dockerVersionRaw, true);
$dockerVersion = data_get($dockerVersionJson, 'Server.Version', '0.0.0');
2023-10-09 09:00:18 +00:00
$dockerVersion = checkMinimumDockerEngineVersion($dockerVersion);
if (is_null($dockerVersion)) {
$this->settings->is_usable = false;
$this->settings->save();
2024-06-10 20:43:34 +00:00
2023-10-09 09:00:18 +00:00
return false;
}
$this->settings->is_reachable = true;
2023-10-09 09:00:18 +00:00
$this->settings->is_usable = true;
$this->settings->save();
2024-06-10 20:43:34 +00:00
2023-10-09 09:00:18 +00:00
return true;
}
2024-06-10 20:43:34 +00:00
public function validateCoolifyNetwork($isSwarm = false, $isBuildServer = false)
2023-10-24 12:31:28 +00:00
{
if ($isBuildServer) {
return;
}
2023-11-28 14:49:24 +00:00
if ($isSwarm) {
2024-06-10 20:43:34 +00:00
return instant_remote_process(['docker network create --attachable --driver overlay coolify-overlay >/dev/null 2>&1 || true'], $this, false);
2023-11-28 14:49:24 +00:00
} else {
2024-06-10 20:43:34 +00:00
return instant_remote_process(['docker network create coolify --attachable >/dev/null 2>&1 || true'], $this, false);
2023-11-28 14:49:24 +00:00
}
2023-10-09 09:00:18 +00:00
}
2024-06-10 20:43:34 +00:00
2024-04-16 13:42:38 +00:00
public function isNonRoot()
{
if ($this->user instanceof Stringable) {
return $this->user->value() !== 'root';
}
2024-06-10 20:43:34 +00:00
2024-04-16 13:42:38 +00:00
return $this->user !== 'root';
}
2024-06-10 20:43:34 +00:00
public function isBuildServer()
{
return $this->settings->is_build_server;
}
2023-07-14 11:38:24 +00:00
}