lasthourcloud/app/Models/StandaloneMariadb.php

259 lines
8.3 KiB
PHP
Raw Normal View History

2023-10-24 12:31:28 +00:00
<?php
namespace App\Models;
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
use Illuminate\Database\Eloquent\Relations\HasMany;
2023-12-13 11:08:12 +00:00
use Illuminate\Database\Eloquent\SoftDeletes;
2023-10-24 12:31:28 +00:00
class StandaloneMariadb extends BaseModel
{
use HasFactory, SoftDeletes;
2023-10-24 12:31:28 +00:00
protected $guarded = [];
2024-06-10 20:43:34 +00:00
2023-10-24 12:31:28 +00:00
protected $casts = [
'mariadb_password' => 'encrypted',
];
protected static function booted()
{
static::created(function ($database) {
LocalPersistentVolume::create([
2024-06-10 20:43:34 +00:00
'name' => 'mariadb-data-'.$database->uuid,
2023-10-24 12:31:28 +00:00
'mount_path' => '/var/lib/mysql',
'host_path' => null,
'resource_id' => $database->id,
'resource_type' => $database->getMorphClass(),
2024-06-10 20:43:34 +00:00
'is_readonly' => true,
2023-10-24 12:31:28 +00:00
]);
});
static::deleting(function ($database) {
$storages = $database->persistentStorages()->get();
2023-11-06 17:04:18 +00:00
$server = data_get($database, 'destination.server');
if ($server) {
foreach ($storages as $storage) {
instant_remote_process(["docker volume rm -f $storage->name"], $server, false);
}
2023-10-24 12:31:28 +00:00
}
$database->scheduledBackups()->delete();
$database->persistentStorages()->delete();
$database->environment_variables()->delete();
2024-02-02 10:50:28 +00:00
$database->tags()->detach();
2023-10-24 12:31:28 +00:00
});
}
2024-06-10 20:43:34 +00:00
public function isConfigurationChanged(bool $save = false)
{
2024-06-10 20:43:34 +00:00
$newConfigHash = $this->image.$this->ports_mappings.$this->mariadb_conf;
$newConfigHash .= json_encode($this->environment_variables()->get('value')->sort());
$newConfigHash = md5($newConfigHash);
$oldConfigHash = data_get($this, 'config_hash');
if ($oldConfigHash === null) {
if ($save) {
$this->config_hash = $newConfigHash;
$this->save();
}
2024-06-10 20:43:34 +00:00
return true;
}
if ($oldConfigHash === $newConfigHash) {
return false;
} else {
if ($save) {
$this->config_hash = $newConfigHash;
$this->save();
}
2024-06-10 20:43:34 +00:00
return true;
}
}
2024-06-10 20:43:34 +00:00
public function isExited()
{
return (bool) str($this->status)->startsWith('exited');
}
2024-06-10 20:43:34 +00:00
public function workdir()
{
2024-06-10 20:43:34 +00:00
return database_configuration_dir()."/{$this->uuid}";
}
2024-06-10 20:43:34 +00:00
public function delete_configurations()
{
$server = data_get($this, 'destination.server');
$workdir = $this->workdir();
if (str($workdir)->endsWith($this->uuid)) {
2024-06-10 20:43:34 +00:00
instant_remote_process(['rm -rf '.$this->workdir()], $server, false);
}
}
2024-06-10 20:43:34 +00:00
2024-02-07 13:55:06 +00:00
public function realStatus()
{
2024-06-10 20:43:34 +00:00
return $this->getRawOriginal('status');
2024-02-07 13:55:06 +00:00
}
2024-06-10 20:43:34 +00:00
2024-02-07 13:55:06 +00:00
public function status(): Attribute
{
return Attribute::make(
set: function ($value) {
if (str($value)->contains('(')) {
$status = str($value)->before('(')->trim()->value();
$health = str($value)->after('(')->before(')')->trim()->value() ?? 'unhealthy';
2024-06-10 20:43:34 +00:00
} elseif (str($value)->contains(':')) {
2024-02-07 13:55:06 +00:00
$status = str($value)->before(':')->trim()->value();
$health = str($value)->after(':')->trim()->value() ?? 'unhealthy';
} else {
$status = $value;
$health = 'unhealthy';
}
2024-06-10 20:43:34 +00:00
2024-02-07 13:55:06 +00:00
return "$status:$health";
},
get: function ($value) {
if (str($value)->contains('(')) {
$status = str($value)->before('(')->trim()->value();
$health = str($value)->after('(')->before(')')->trim()->value() ?? 'unhealthy';
2024-06-10 20:43:34 +00:00
} elseif (str($value)->contains(':')) {
2024-02-07 13:55:06 +00:00
$status = str($value)->before(':')->trim()->value();
$health = str($value)->after(':')->trim()->value() ?? 'unhealthy';
} else {
$status = $value;
$health = 'unhealthy';
}
2024-06-10 20:43:34 +00:00
2024-02-07 13:55:06 +00:00
return "$status:$health";
},
);
}
2024-06-10 20:43:34 +00:00
2024-02-02 10:50:28 +00:00
public function tags()
{
return $this->morphToMany(Tag::class, 'taggable');
}
2024-06-10 20:43:34 +00:00
public function project()
{
return data_get($this, 'environment.project');
}
2024-06-10 20:43:34 +00:00
2024-01-23 16:13:23 +00:00
public function team()
{
return data_get($this, 'environment.project.team');
}
2024-06-10 20:43:34 +00:00
public function link()
{
2023-11-30 11:21:53 +00:00
if (data_get($this, 'environment.project.uuid')) {
return route('project.database.configuration', [
'project_uuid' => data_get($this, 'environment.project.uuid'),
'environment_name' => data_get($this, 'environment.name'),
2024-06-10 20:43:34 +00:00
'database_uuid' => data_get($this, 'uuid'),
2023-11-30 11:21:53 +00:00
]);
}
2024-06-10 20:43:34 +00:00
2023-11-30 11:21:53 +00:00
return null;
}
2024-06-10 20:43:34 +00:00
public function isLogDrainEnabled()
{
return data_get($this, 'is_log_drain_enabled', false);
}
2024-06-10 20:43:34 +00:00
2023-10-24 12:31:28 +00:00
public function type(): string
{
return 'standalone-mariadb';
}
public function portsMappings(): Attribute
{
return Attribute::make(
2024-06-10 20:43:34 +00:00
set: fn ($value) => $value === '' ? null : $value,
2023-10-24 12:31:28 +00:00
);
}
public function portsMappingsArray(): Attribute
{
return Attribute::make(
get: fn () => is_null($this->ports_mappings)
? []
: explode(',', $this->ports_mappings),
);
}
public function get_db_url(bool $useInternal = false): string
2023-10-24 12:31:28 +00:00
{
2024-06-10 20:43:34 +00:00
if ($this->is_public && ! $useInternal) {
2023-10-24 12:31:28 +00:00
return "mysql://{$this->mariadb_user}:{$this->mariadb_password}@{$this->destination->server->getIp}:{$this->public_port}/{$this->mariadb_database}";
} else {
return "mysql://{$this->mariadb_user}:{$this->mariadb_password}@{$this->uuid}:3306/{$this->mariadb_database}";
}
}
public function environment()
{
return $this->belongsTo(Environment::class);
}
public function fileStorages()
{
return $this->morphMany(LocalFileVolume::class, 'resource');
}
public function destination()
{
return $this->morphTo();
}
public function environment_variables(): HasMany
{
return $this->hasMany(EnvironmentVariable::class);
}
public function runtime_environment_variables(): HasMany
{
return $this->hasMany(EnvironmentVariable::class);
}
public function persistentStorages()
{
return $this->morphMany(LocalPersistentVolume::class, 'resource');
}
public function scheduledBackups()
{
return $this->morphMany(ScheduledDatabaseBackup::class, 'database');
}
2024-06-20 11:17:06 +00:00
public function getMetrics(int $mins = 5)
{
$server = $this->destination->server;
$container_name = $this->uuid;
if ($server->isMetricsEnabled()) {
$from = now()->subMinutes($mins)->toIso8601ZuluString();
$metrics = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl -H \"Authorization: Bearer {$server->settings->metrics_token}\" http://localhost:8888/api/container/{$container_name}/metrics/history?from=$from'"], $server, false);
if (str($metrics)->contains('error')) {
$error = json_decode($metrics, true);
$error = data_get($error, 'error', 'Something is not okay, are you okay?');
if ($error == 'Unauthorized') {
$error = 'Unauthorized, please check your metrics token or restart Sentinel to set a new token.';
}
throw new \Exception($error);
}
$metrics = str($metrics)->explode("\n")->skip(1)->all();
$parsedCollection = collect($metrics)->flatMap(function ($item) {
return collect(explode("\n", trim($item)))->map(function ($line) {
[$time, $cpu_usage_percent, $memory_usage, $memory_usage_percent] = explode(',', trim($line));
$cpu_usage_percent = number_format($cpu_usage_percent, 2);
return [(int) $time, (float) $cpu_usage_percent, (int) $memory_usage];
});
});
return $parsedCollection->toArray();
}
}
2023-10-24 12:31:28 +00:00
}