2023-05-24 12:26:50 +00:00
|
|
|
<?php
|
|
|
|
|
2023-05-24 13:25:08 +00:00
|
|
|
use App\Actions\CoolifyTask\PrepareCoolifyTask;
|
2023-05-24 12:26:50 +00:00
|
|
|
use App\Data\CoolifyTaskArgs;
|
2023-05-25 12:40:47 +00:00
|
|
|
use App\Enums\ActivityTypes;
|
2023-06-30 13:57:40 +00:00
|
|
|
use App\Models\Application;
|
|
|
|
use App\Models\ApplicationDeploymentQueue;
|
2023-07-25 12:43:49 +00:00
|
|
|
use App\Models\PrivateKey;
|
2023-05-24 12:26:50 +00:00
|
|
|
use App\Models\Server;
|
2023-08-16 15:18:50 +00:00
|
|
|
use App\Notifications\Server\NotReachable;
|
2023-06-30 13:57:40 +00:00
|
|
|
use Carbon\Carbon;
|
2023-05-24 12:26:50 +00:00
|
|
|
use Illuminate\Database\Eloquent\Model;
|
2023-06-30 13:57:40 +00:00
|
|
|
use Illuminate\Support\Collection;
|
2023-05-24 12:26:50 +00:00
|
|
|
use Illuminate\Support\Facades\Process;
|
|
|
|
use Illuminate\Support\Facades\Storage;
|
2023-05-31 10:38:36 +00:00
|
|
|
use Illuminate\Support\Sleep;
|
2023-05-24 12:26:50 +00:00
|
|
|
use Spatie\Activitylog\Models\Activity;
|
|
|
|
|
2023-05-24 13:25:08 +00:00
|
|
|
function remote_process(
|
|
|
|
array $command,
|
|
|
|
Server $server,
|
2023-08-08 09:51:36 +00:00
|
|
|
string $type = ActivityTypes::INLINE->value,
|
2023-05-24 13:25:08 +00:00
|
|
|
?string $type_uuid = null,
|
|
|
|
?Model $model = null,
|
2023-06-30 20:24:39 +00:00
|
|
|
bool $ignore_errors = false,
|
2023-08-11 18:48:52 +00:00
|
|
|
): Activity {
|
2023-05-24 12:26:50 +00:00
|
|
|
|
2023-05-24 13:25:08 +00:00
|
|
|
$command_string = implode("\n", $command);
|
2023-06-30 20:24:39 +00:00
|
|
|
if (auth()->user()) {
|
|
|
|
$teams = auth()->user()->teams->pluck('id');
|
|
|
|
if (!$teams->contains($server->team_id) && !$teams->contains(0)) {
|
|
|
|
throw new \Exception("User is not part of the team that owns this server");
|
|
|
|
}
|
|
|
|
}
|
2023-05-24 12:26:50 +00:00
|
|
|
|
2023-05-24 13:25:08 +00:00
|
|
|
$private_key_location = save_private_key_for_server($server);
|
2023-05-24 12:26:50 +00:00
|
|
|
|
2023-05-24 13:25:08 +00:00
|
|
|
return resolve(PrepareCoolifyTask::class, [
|
|
|
|
'remoteProcessArgs' => new CoolifyTaskArgs(
|
|
|
|
server_ip: $server->ip,
|
|
|
|
private_key_location: $private_key_location,
|
|
|
|
command: <<<EOT
|
2023-05-24 12:26:50 +00:00
|
|
|
{$command_string}
|
|
|
|
EOT,
|
2023-05-24 13:25:08 +00:00
|
|
|
port: $server->port,
|
|
|
|
user: $server->user,
|
|
|
|
type: $type,
|
|
|
|
type_uuid: $type_uuid,
|
|
|
|
model: $model,
|
2023-06-07 13:39:08 +00:00
|
|
|
ignore_errors: $ignore_errors
|
2023-05-24 13:25:08 +00:00
|
|
|
),
|
|
|
|
])();
|
2023-05-24 12:26:50 +00:00
|
|
|
}
|
2023-08-08 09:51:36 +00:00
|
|
|
|
2023-06-30 13:57:40 +00:00
|
|
|
function get_private_key_for_server(Server $server)
|
|
|
|
{
|
|
|
|
$temp_file = "id.root@{$server->ip}";
|
|
|
|
return '/var/www/html/storage/app/ssh/keys/' . $temp_file;
|
|
|
|
}
|
2023-08-08 09:51:36 +00:00
|
|
|
|
2023-05-24 13:25:08 +00:00
|
|
|
function save_private_key_for_server(Server $server)
|
|
|
|
{
|
2023-06-07 08:33:45 +00:00
|
|
|
if (data_get($server, 'privateKey.private_key') === null) {
|
|
|
|
throw new \Exception("Server {$server->name} does not have a private key");
|
|
|
|
}
|
2023-05-24 13:25:08 +00:00
|
|
|
$temp_file = "id.root@{$server->ip}";
|
2023-05-25 10:55:34 +00:00
|
|
|
Storage::disk('ssh-keys')->put($temp_file, $server->privateKey->private_key);
|
|
|
|
Storage::disk('ssh-mux')->makeDirectory('.');
|
|
|
|
return '/var/www/html/storage/app/ssh/keys/' . $temp_file;
|
2023-05-24 12:26:50 +00:00
|
|
|
}
|
|
|
|
|
2023-05-24 13:25:08 +00:00
|
|
|
function generate_ssh_command(string $private_key_location, string $server_ip, string $user, string $port, string $command, bool $isMux = true)
|
|
|
|
{
|
|
|
|
$delimiter = 'EOF-COOLIFY-SSH';
|
|
|
|
$ssh_command = "ssh ";
|
2023-05-24 12:26:50 +00:00
|
|
|
|
2023-05-24 13:25:08 +00:00
|
|
|
if ($isMux && config('coolify.mux_enabled')) {
|
2023-05-25 10:55:34 +00:00
|
|
|
$ssh_command .= '-o ControlMaster=auto -o ControlPersist=1m -o ControlPath=/var/www/html/storage/app/ssh/mux/%h_%p_%r ';
|
2023-05-24 12:26:50 +00:00
|
|
|
}
|
2023-09-04 14:03:11 +00:00
|
|
|
$command = "PATH=\$PATH:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/host/usr/local/sbin:/host/usr/local/bin:/host/usr/sbin:/host/usr/bin:/host/sbin:/host/bin && $command";
|
2023-05-24 13:25:08 +00:00
|
|
|
$ssh_command .= "-i {$private_key_location} "
|
|
|
|
. '-o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null '
|
|
|
|
. '-o PasswordAuthentication=no '
|
|
|
|
. '-o ConnectTimeout=3600 '
|
|
|
|
. '-o ServerAliveInterval=20 '
|
|
|
|
. '-o RequestTTY=no '
|
|
|
|
. '-o LogLevel=ERROR '
|
|
|
|
. "-p {$port} "
|
|
|
|
. "{$user}@{$server_ip} "
|
|
|
|
. " 'bash -se' << \\$delimiter" . PHP_EOL
|
|
|
|
. $command . PHP_EOL
|
|
|
|
. $delimiter;
|
|
|
|
|
|
|
|
return $ssh_command;
|
2023-05-24 12:26:50 +00:00
|
|
|
}
|
2023-09-05 10:14:31 +00:00
|
|
|
function instantCommand(string $command, $throwError = true) {
|
|
|
|
$process = Process::run($command);
|
|
|
|
$output = trim($process->output());
|
|
|
|
$exitCode = $process->exitCode();
|
|
|
|
if ($exitCode !== 0) {
|
|
|
|
if (!$throwError) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
throw new \RuntimeException($process->errorOutput(), $exitCode);
|
|
|
|
}
|
|
|
|
return $output;
|
|
|
|
}
|
2023-05-31 10:38:36 +00:00
|
|
|
function instant_remote_process(array $command, Server $server, $throwError = true, $repeat = 1)
|
2023-05-24 13:25:08 +00:00
|
|
|
{
|
|
|
|
$command_string = implode("\n", $command);
|
|
|
|
$private_key_location = save_private_key_for_server($server);
|
|
|
|
$ssh_command = generate_ssh_command($private_key_location, $server->ip, $server->user, $server->port, $command_string);
|
|
|
|
$process = Process::run($ssh_command);
|
|
|
|
$output = trim($process->output());
|
|
|
|
$exitCode = $process->exitCode();
|
|
|
|
if ($exitCode !== 0) {
|
2023-05-31 10:38:36 +00:00
|
|
|
if ($repeat > 1) {
|
2023-08-16 15:18:50 +00:00
|
|
|
ray("repeat: ", $repeat);
|
2023-05-31 10:38:36 +00:00
|
|
|
Sleep::for(200)->milliseconds();
|
|
|
|
return instant_remote_process($command, $server, $throwError, $repeat - 1);
|
|
|
|
}
|
2023-06-07 08:33:45 +00:00
|
|
|
// ray('ERROR OCCURED: ' . $process->errorOutput());
|
2023-05-24 13:25:08 +00:00
|
|
|
if (!$throwError) {
|
|
|
|
return null;
|
2023-05-24 12:26:50 +00:00
|
|
|
}
|
2023-07-14 11:01:55 +00:00
|
|
|
throw new \RuntimeException($process->errorOutput(), $exitCode);
|
2023-05-24 12:26:50 +00:00
|
|
|
}
|
2023-05-24 13:25:08 +00:00
|
|
|
return $output;
|
2023-05-24 12:26:50 +00:00
|
|
|
}
|
2023-06-30 13:57:40 +00:00
|
|
|
|
|
|
|
function decode_remote_command_output(?ApplicationDeploymentQueue $application_deployment_queue = null): Collection
|
|
|
|
{
|
|
|
|
$application = Application::find(data_get($application_deployment_queue, 'application_id'));
|
|
|
|
$is_debug_enabled = data_get($application, 'settings.is_debug_enabled');
|
|
|
|
if (is_null($application_deployment_queue)) {
|
|
|
|
return collect([]);
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
$decoded = json_decode(
|
2023-06-30 19:22:14 +00:00
|
|
|
data_get($application_deployment_queue, 'logs'),
|
2023-06-30 13:57:40 +00:00
|
|
|
associative: true,
|
|
|
|
flags: JSON_THROW_ON_ERROR
|
|
|
|
);
|
|
|
|
} catch (\JsonException $exception) {
|
|
|
|
return collect([]);
|
|
|
|
}
|
|
|
|
$formatted = collect($decoded);
|
|
|
|
if (!$is_debug_enabled) {
|
2023-08-11 18:48:52 +00:00
|
|
|
$formatted = $formatted->filter(fn ($i) => $i['hidden'] === false ?? false);
|
2023-06-30 13:57:40 +00:00
|
|
|
}
|
2023-06-30 19:22:14 +00:00
|
|
|
$formatted = $formatted
|
2023-08-11 18:48:52 +00:00
|
|
|
->sortBy(fn ($i) => $i['order'])
|
2023-06-30 13:57:40 +00:00
|
|
|
->map(function ($i) {
|
|
|
|
$i['timestamp'] = Carbon::parse($i['timestamp'])->format('Y-M-d H:i:s.u');
|
|
|
|
return $i;
|
|
|
|
});
|
|
|
|
|
|
|
|
return $formatted;
|
|
|
|
}
|
2023-07-25 12:43:49 +00:00
|
|
|
|
2023-08-16 15:18:50 +00:00
|
|
|
function refresh_server_connection(PrivateKey $private_key)
|
2023-07-25 12:43:49 +00:00
|
|
|
{
|
|
|
|
foreach ($private_key->servers as $server) {
|
|
|
|
// Delete the old ssh mux file to force a new one to be created
|
|
|
|
Storage::disk('ssh-mux')->delete($server->muxFilename());
|
2023-08-16 15:18:50 +00:00
|
|
|
// check if user is authenticated
|
2023-08-22 15:44:49 +00:00
|
|
|
if (currentTeam()->id) {
|
|
|
|
currentTeam()->privateKeys = PrivateKey::where('team_id', currentTeam()->id)->get();
|
2023-08-16 15:20:01 +00:00
|
|
|
}
|
2023-07-25 12:43:49 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
function validateServer(Server $server)
|
|
|
|
{
|
|
|
|
try {
|
2023-08-16 15:18:50 +00:00
|
|
|
refresh_server_connection($server->privateKey);
|
2023-08-28 18:29:44 +00:00
|
|
|
$uptime = instant_remote_process(['uptime'], $server, false);
|
2023-07-25 12:43:49 +00:00
|
|
|
if (!$uptime) {
|
2023-08-28 18:29:44 +00:00
|
|
|
$server->settings->is_reachable = false;
|
|
|
|
return [
|
|
|
|
"uptime" => null,
|
|
|
|
"dockerVersion" => null,
|
|
|
|
];
|
2023-07-25 12:43:49 +00:00
|
|
|
}
|
|
|
|
$server->settings->is_reachable = true;
|
|
|
|
|
|
|
|
$dockerVersion = instant_remote_process(['docker version|head -2|grep -i version'], $server, false);
|
|
|
|
if (!$dockerVersion) {
|
2023-08-28 18:29:44 +00:00
|
|
|
$dockerVersion = null;
|
|
|
|
return [
|
|
|
|
"uptime" => $uptime,
|
|
|
|
"dockerVersion" => null,
|
|
|
|
];
|
2023-07-25 12:43:49 +00:00
|
|
|
}
|
|
|
|
$server->settings->is_usable = true;
|
|
|
|
return [
|
|
|
|
"uptime" => $uptime,
|
|
|
|
"dockerVersion" => $dockerVersion,
|
|
|
|
];
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
$server->settings->is_reachable = false;
|
|
|
|
$server->settings->is_usable = false;
|
|
|
|
throw $e;
|
|
|
|
} finally {
|
|
|
|
$server->settings->save();
|
|
|
|
}
|
|
|
|
}
|
2023-08-16 15:18:50 +00:00
|
|
|
|
2023-08-16 15:20:01 +00:00
|
|
|
function check_server_connection(Server $server)
|
|
|
|
{
|
2023-08-16 15:18:50 +00:00
|
|
|
try {
|
|
|
|
refresh_server_connection($server->privateKey);
|
|
|
|
instant_remote_process(['uptime'], $server);
|
|
|
|
$server->unreachable_count = 0;
|
|
|
|
$server->settings->is_reachable = true;
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
if ($server->unreachable_count == 2) {
|
|
|
|
$server->team->notify(new NotReachable($server));
|
|
|
|
$server->settings->is_reachable = false;
|
|
|
|
$server->settings->save();
|
|
|
|
} else {
|
|
|
|
$server->unreachable_count += 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
throw $e;
|
|
|
|
} finally {
|
|
|
|
$server->settings->save();
|
|
|
|
$server->save();
|
|
|
|
}
|
|
|
|
}
|
2023-09-04 14:03:11 +00:00
|
|
|
|
|
|
|
function checkRequiredCommands(Server $server)
|
|
|
|
{
|
|
|
|
$commands = collect(["jq", "jc"]);
|
|
|
|
foreach ($commands as $command) {
|
|
|
|
$commandFound = instant_remote_process(["docker run --rm --privileged --net=host --pid=host --ipc=host --volume /:/host busybox chroot /host bash -c 'command -v {$command}'"], $server, false);
|
|
|
|
if ($commandFound) {
|
|
|
|
ray($command . ' found');
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
instant_remote_process(["docker run --rm --privileged --net=host --pid=host --ipc=host --volume /:/host busybox chroot /host bash -c 'apt update && apt install -y {$command}'"], $server);
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
ray('could not install ' . $command);
|
|
|
|
ray($e);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
$commandFound = instant_remote_process(["docker run --rm --privileged --net=host --pid=host --ipc=host --volume /:/host busybox chroot /host bash -c 'command -v {$command}'"], $server, false);
|
|
|
|
if ($commandFound) {
|
|
|
|
ray($command . ' found');
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
ray('could not install ' . $command);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|