2023-03-20 12:04:22 +00:00
|
|
|
<?php
|
|
|
|
|
2023-05-03 05:15:45 +00:00
|
|
|
use App\Actions\CoolifyTask\PrepareCoolifyTask;
|
|
|
|
use App\Data\CoolifyTaskArgs;
|
2023-05-08 09:51:03 +00:00
|
|
|
use App\Models\GithubApp;
|
2023-03-24 14:48:57 +00:00
|
|
|
use App\Models\Server;
|
2023-03-29 10:27:02 +00:00
|
|
|
use Illuminate\Database\Eloquent\Model;
|
2023-05-05 12:20:10 +00:00
|
|
|
use Illuminate\Database\QueryException;
|
2023-03-30 13:52:19 +00:00
|
|
|
use Illuminate\Support\Collection;
|
2023-04-28 13:22:36 +00:00
|
|
|
use Illuminate\Support\Facades\Http;
|
2023-03-30 13:52:19 +00:00
|
|
|
use Illuminate\Support\Facades\Log;
|
2023-03-31 07:42:05 +00:00
|
|
|
use Illuminate\Support\Facades\Process;
|
2023-05-08 09:51:03 +00:00
|
|
|
use Illuminate\Support\Facades\Route;
|
2023-03-24 21:15:36 +00:00
|
|
|
use Illuminate\Support\Facades\Storage;
|
2023-03-20 12:04:22 +00:00
|
|
|
use Spatie\Activitylog\Contracts\Activity;
|
2023-05-10 11:09:03 +00:00
|
|
|
use Illuminate\Support\Str;
|
2023-05-12 08:45:28 +00:00
|
|
|
use Visus\Cuid2\Cuid2;
|
2023-03-20 12:04:22 +00:00
|
|
|
|
2023-05-09 09:33:50 +00:00
|
|
|
if (!function_exists('generalErrorHandler')) {
|
2023-05-11 13:20:02 +00:00
|
|
|
function generalErrorHandler(\Throwable $e, $that = null, $isJson = false)
|
2023-05-05 12:20:10 +00:00
|
|
|
{
|
2023-05-11 13:20:02 +00:00
|
|
|
try {
|
2023-05-09 09:33:50 +00:00
|
|
|
if ($e instanceof QueryException) {
|
|
|
|
if ($e->errorInfo[0] === '23505') {
|
2023-05-11 13:20:02 +00:00
|
|
|
throw new \Exception('Duplicate entry found.', '23505');
|
2023-05-09 09:33:50 +00:00
|
|
|
} else if (count($e->errorInfo) === 4) {
|
2023-05-11 13:20:02 +00:00
|
|
|
throw new \Exception($e->errorInfo[3]);
|
2023-05-09 09:33:50 +00:00
|
|
|
} else {
|
2023-05-11 13:20:02 +00:00
|
|
|
throw new \Exception($e->errorInfo[2]);
|
2023-05-09 09:33:50 +00:00
|
|
|
}
|
2023-05-05 12:20:10 +00:00
|
|
|
} else {
|
2023-05-11 13:20:02 +00:00
|
|
|
throw new \Exception($e->getMessage());
|
|
|
|
}
|
|
|
|
} catch (\Throwable $error) {
|
|
|
|
if ($that) {
|
2023-05-16 13:27:47 +00:00
|
|
|
return $that->emit('error', $error->getMessage());
|
2023-05-11 13:20:02 +00:00
|
|
|
} elseif ($isJson) {
|
|
|
|
return response()->json([
|
|
|
|
'code' => $error->getCode(),
|
|
|
|
'error' => $error->getMessage(),
|
|
|
|
]);
|
|
|
|
} else {
|
2023-05-15 11:45:37 +00:00
|
|
|
// dump($error);
|
2023-05-05 12:20:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-03-24 14:48:57 +00:00
|
|
|
if (!function_exists('remoteProcess')) {
|
2023-03-20 12:04:22 +00:00
|
|
|
/**
|
2023-03-24 21:15:36 +00:00
|
|
|
* Run a Remote Process, which SSH's asynchronously into a machine to run the command(s).
|
2023-03-21 10:32:38 +00:00
|
|
|
* @TODO Change 'root' to 'coolify' when it's able to run Docker commands without sudo
|
2023-03-20 12:04:22 +00:00
|
|
|
*
|
|
|
|
*/
|
2023-03-21 10:32:38 +00:00
|
|
|
function remoteProcess(
|
2023-05-03 05:15:45 +00:00
|
|
|
array $command,
|
|
|
|
Server $server,
|
2023-05-03 06:24:34 +00:00
|
|
|
string $type,
|
2023-05-03 05:15:45 +00:00
|
|
|
?string $type_uuid = null,
|
|
|
|
?Model $model = null,
|
2023-03-24 14:48:57 +00:00
|
|
|
): Activity {
|
2023-03-31 16:54:55 +00:00
|
|
|
|
2023-03-29 10:27:02 +00:00
|
|
|
$command_string = implode("\n", $command);
|
2023-03-31 16:54:55 +00:00
|
|
|
|
2023-03-29 10:27:02 +00:00
|
|
|
// @TODO: Check if the user has access to this server
|
|
|
|
// checkTeam($server->team_id);
|
2023-03-24 21:15:36 +00:00
|
|
|
|
2023-04-04 12:11:53 +00:00
|
|
|
$private_key_location = savePrivateKeyForServer($server);
|
2023-03-29 10:27:02 +00:00
|
|
|
|
2023-05-03 05:15:45 +00:00
|
|
|
return resolve(PrepareCoolifyTask::class, [
|
|
|
|
'remoteProcessArgs' => new CoolifyTaskArgs(
|
2023-03-29 10:27:02 +00:00
|
|
|
server_ip: $server->ip,
|
2023-03-24 21:15:36 +00:00
|
|
|
private_key_location: $private_key_location,
|
2023-03-28 13:47:37 +00:00
|
|
|
command: <<<EOT
|
2023-03-29 10:27:02 +00:00
|
|
|
{$command_string}
|
2023-03-28 13:47:37 +00:00
|
|
|
EOT,
|
2023-03-29 10:27:02 +00:00
|
|
|
port: $server->port,
|
|
|
|
user: $server->user,
|
2023-05-03 06:24:34 +00:00
|
|
|
type: $type,
|
2023-05-03 05:15:45 +00:00
|
|
|
type_uuid: $type_uuid,
|
2023-03-31 16:54:55 +00:00
|
|
|
model: $model,
|
2023-03-21 10:32:38 +00:00
|
|
|
),
|
2023-03-21 09:31:16 +00:00
|
|
|
])();
|
2023-03-20 12:04:22 +00:00
|
|
|
}
|
2023-03-30 13:52:19 +00:00
|
|
|
}
|
|
|
|
|
2023-03-31 11:32:07 +00:00
|
|
|
// function checkTeam(string $team_id)
|
|
|
|
// {
|
|
|
|
// $found_team = auth()->user()->teams->pluck('id')->contains($team_id);
|
|
|
|
// if (!$found_team) {
|
|
|
|
// throw new \RuntimeException('You do not have access to this server.');
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
|
2023-04-04 12:11:53 +00:00
|
|
|
if (!function_exists('savePrivateKeyForServer')) {
|
|
|
|
function savePrivateKeyForServer(Server $server)
|
2023-03-30 13:52:19 +00:00
|
|
|
{
|
2023-04-14 08:30:53 +00:00
|
|
|
$temp_file = "id.root@{$server->ip}";
|
2023-05-16 09:39:18 +00:00
|
|
|
Storage::disk('ssh-keys')->put($temp_file, $server->privateKey->private_key);
|
2023-04-14 08:30:53 +00:00
|
|
|
return '/var/www/html/storage/app/ssh-keys/' . $temp_file;
|
2023-03-30 13:52:19 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!function_exists('generateSshCommand')) {
|
2023-05-03 12:24:23 +00:00
|
|
|
function generateSshCommand(string $private_key_location, string $server_ip, string $user, string $port, string $command, bool $isMux = true)
|
2023-03-30 13:52:19 +00:00
|
|
|
{
|
|
|
|
Storage::disk('local')->makeDirectory('.ssh');
|
2023-05-16 09:39:18 +00:00
|
|
|
|
|
|
|
$delimiter = 'EOF-COOLIFY-SSH';
|
2023-03-31 06:36:17 +00:00
|
|
|
$ssh_command = "ssh ";
|
2023-05-16 09:39:18 +00:00
|
|
|
|
2023-05-05 15:56:03 +00:00
|
|
|
if ($isMux && config('coolify.mux_enabled')) {
|
2023-03-31 06:36:17 +00:00
|
|
|
$ssh_command .= '-o ControlMaster=auto -o ControlPersist=1m -o ControlPath=/var/www/html/storage/app/.ssh/ssh_mux_%h_%p_%r ';
|
|
|
|
}
|
|
|
|
$ssh_command .= "-i {$private_key_location} "
|
2023-03-30 13:52:19 +00:00
|
|
|
. '-o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null '
|
|
|
|
. '-o PasswordAuthentication=no '
|
2023-05-02 17:15:17 +00:00
|
|
|
. '-o ConnectTimeout=3600 '
|
2023-05-03 09:28:13 +00:00
|
|
|
. '-o ServerAliveInterval=60 '
|
2023-03-30 13:52:19 +00:00
|
|
|
. '-o RequestTTY=no '
|
|
|
|
. '-o LogLevel=ERROR '
|
|
|
|
. "-p {$port} "
|
|
|
|
. "{$user}@{$server_ip} "
|
|
|
|
. " 'bash -se' << \\$delimiter" . PHP_EOL
|
|
|
|
. $command . PHP_EOL
|
|
|
|
. $delimiter;
|
2023-03-31 06:36:17 +00:00
|
|
|
|
2023-03-30 13:52:19 +00:00
|
|
|
return $ssh_command;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!function_exists('formatDockerCmdOutputToJson')) {
|
|
|
|
function formatDockerCmdOutputToJson($rawOutput): Collection
|
|
|
|
{
|
|
|
|
$outputLines = explode(PHP_EOL, $rawOutput);
|
|
|
|
|
|
|
|
return collect($outputLines)
|
|
|
|
->reject(fn ($line) => empty($line))
|
|
|
|
->map(fn ($outputLine) => json_decode($outputLine, true, flags: JSON_THROW_ON_ERROR));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!function_exists('formatDockerLabelsToJson')) {
|
|
|
|
function formatDockerLabelsToJson($rawOutput): Collection
|
2023-03-28 13:47:37 +00:00
|
|
|
{
|
2023-03-30 13:52:19 +00:00
|
|
|
$outputLines = explode(PHP_EOL, $rawOutput);
|
|
|
|
|
|
|
|
return collect($outputLines)
|
|
|
|
->reject(fn ($line) => empty($line))
|
|
|
|
->map(function ($outputLine) {
|
|
|
|
$outputArray = explode(',', $outputLine);
|
|
|
|
return collect($outputArray)
|
|
|
|
->map(function ($outputLine) {
|
|
|
|
return explode('=', $outputLine);
|
|
|
|
})
|
|
|
|
->mapWithKeys(function ($outputLine) {
|
|
|
|
return [$outputLine[0] => $outputLine[1]];
|
|
|
|
});
|
|
|
|
})[0];
|
2023-03-24 21:15:36 +00:00
|
|
|
}
|
2023-03-20 12:04:22 +00:00
|
|
|
}
|
2023-05-03 05:15:45 +00:00
|
|
|
if (!function_exists('instantRemoteProcess')) {
|
2023-05-03 07:38:53 +00:00
|
|
|
function instantRemoteProcess(array $command, Server $server, $throwError = true)
|
2023-04-04 12:11:53 +00:00
|
|
|
{
|
2023-03-31 07:42:05 +00:00
|
|
|
$command_string = implode("\n", $command);
|
2023-04-04 12:11:53 +00:00
|
|
|
$private_key_location = savePrivateKeyForServer($server);
|
2023-03-31 07:42:05 +00:00
|
|
|
$ssh_command = generateSshCommand($private_key_location, $server->ip, $server->user, $server->port, $command_string);
|
|
|
|
$process = Process::run($ssh_command);
|
|
|
|
$output = trim($process->output());
|
|
|
|
$exitCode = $process->exitCode();
|
|
|
|
if ($exitCode !== 0) {
|
2023-05-02 10:47:52 +00:00
|
|
|
if (!$throwError) {
|
2023-05-15 11:45:37 +00:00
|
|
|
return null;
|
2023-05-02 10:47:52 +00:00
|
|
|
}
|
2023-05-15 11:45:37 +00:00
|
|
|
throw new \RuntimeException($process->errorOutput());
|
2023-03-31 07:42:05 +00:00
|
|
|
}
|
|
|
|
return $output;
|
|
|
|
}
|
|
|
|
}
|
2023-04-28 13:22:36 +00:00
|
|
|
|
|
|
|
if (!function_exists('getLatestVersionOfCoolify')) {
|
|
|
|
function getLatestVersionOfCoolify()
|
|
|
|
{
|
2023-05-11 13:28:34 +00:00
|
|
|
$response = Http::get('https://coolify-cdn.b-cdn.net/versions.json');
|
2023-04-28 13:22:36 +00:00
|
|
|
$versions = $response->json();
|
|
|
|
return data_get($versions, 'coolify.v4.version');
|
|
|
|
}
|
|
|
|
}
|
2023-05-02 07:11:22 +00:00
|
|
|
if (!function_exists('generateRandomName')) {
|
|
|
|
function generateRandomName()
|
|
|
|
{
|
2023-05-12 08:45:28 +00:00
|
|
|
$generator = \Nubs\RandomNameGenerator\All::create();
|
|
|
|
$cuid = new Cuid2(7);
|
|
|
|
return Str::kebab("{$generator->getName()}-{$cuid}");
|
2023-05-02 07:11:22 +00:00
|
|
|
}
|
|
|
|
}
|
2023-05-08 09:51:03 +00:00
|
|
|
|
|
|
|
use Lcobucci\JWT\Encoding\ChainedFormatter;
|
|
|
|
use Lcobucci\JWT\Encoding\JoseEncoder;
|
|
|
|
use Lcobucci\JWT\Signer\Key\InMemory;
|
|
|
|
use Lcobucci\JWT\Signer\Rsa\Sha256;
|
|
|
|
use Lcobucci\JWT\Token\Builder;
|
2023-05-15 11:45:37 +00:00
|
|
|
use Symfony\Component\Yaml\Yaml;
|
2023-05-08 09:51:03 +00:00
|
|
|
|
2023-05-09 12:42:10 +00:00
|
|
|
if (!function_exists('generate_github_installation_token')) {
|
|
|
|
function generate_github_installation_token(GithubApp $source)
|
2023-05-08 09:51:03 +00:00
|
|
|
{
|
|
|
|
$signingKey = InMemory::plainText($source->privateKey->private_key);
|
|
|
|
$algorithm = new Sha256();
|
|
|
|
$tokenBuilder = (new Builder(new JoseEncoder(), ChainedFormatter::default()));
|
|
|
|
$now = new DateTimeImmutable();
|
|
|
|
$now = $now->setTime($now->format('H'), $now->format('i'));
|
|
|
|
$issuedToken = $tokenBuilder
|
|
|
|
->issuedBy($source->app_id)
|
|
|
|
->issuedAt($now)
|
|
|
|
->expiresAt($now->modify('+10 minutes'))
|
|
|
|
->getToken($algorithm, $signingKey)
|
|
|
|
->toString();
|
|
|
|
$token = Http::withHeaders([
|
|
|
|
'Authorization' => "Bearer $issuedToken",
|
|
|
|
'Accept' => 'application/vnd.github.machine-man-preview+json'
|
|
|
|
])->post("{$source->api_url}/app/installations/{$source->installation_id}/access_tokens");
|
|
|
|
if ($token->failed()) {
|
|
|
|
throw new \Exception("Failed to get access token for " . $source->name . " with error: " . $token->json()['message']);
|
|
|
|
}
|
|
|
|
return $token->json()['token'];
|
|
|
|
}
|
|
|
|
}
|
2023-05-09 12:42:10 +00:00
|
|
|
if (!function_exists('generate_github_jwt_token')) {
|
|
|
|
function generate_github_jwt_token(GithubApp $source)
|
|
|
|
{
|
|
|
|
$signingKey = InMemory::plainText($source->privateKey->private_key);
|
|
|
|
$algorithm = new Sha256();
|
|
|
|
$tokenBuilder = (new Builder(new JoseEncoder(), ChainedFormatter::default()));
|
|
|
|
$now = new DateTimeImmutable();
|
|
|
|
$now = $now->setTime($now->format('H'), $now->format('i'));
|
|
|
|
$issuedToken = $tokenBuilder
|
|
|
|
->issuedBy($source->app_id)
|
|
|
|
->issuedAt($now->modify('-1 minute'))
|
|
|
|
->expiresAt($now->modify('+10 minutes'))
|
|
|
|
->getToken($algorithm, $signingKey)
|
|
|
|
->toString();
|
|
|
|
return $issuedToken;
|
|
|
|
}
|
|
|
|
}
|
2023-05-08 11:36:49 +00:00
|
|
|
if (!function_exists('getParameters')) {
|
|
|
|
function getParameters()
|
2023-05-08 09:51:03 +00:00
|
|
|
{
|
|
|
|
return Route::current()->parameters();
|
2023-05-02 07:11:22 +00:00
|
|
|
}
|
|
|
|
}
|
2023-05-15 11:45:37 +00:00
|
|
|
if (!function_exists('checkContainerStatus')) {
|
|
|
|
function checkContainerStatus(Server $server, string $container_id, bool $throwError = false)
|
|
|
|
{
|
|
|
|
$container = instantRemoteProcess(["docker inspect --format '{{json .State}}' {$container_id}"], $server, $throwError);
|
|
|
|
if (!$container) {
|
|
|
|
return 'exited';
|
|
|
|
}
|
|
|
|
$container = formatDockerCmdOutputToJson($container);
|
|
|
|
return $container[0]['Status'];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!function_exists('getProxyConfiguration')) {
|
|
|
|
function getProxyConfiguration(Server $server)
|
|
|
|
{
|
|
|
|
$proxy_config_path = config('coolify.proxy_config_path');
|
|
|
|
$networks = collect($server->standaloneDockers)->map(function ($docker) {
|
|
|
|
return $docker['network'];
|
|
|
|
})->unique();
|
|
|
|
if ($networks->count() === 0) {
|
|
|
|
$networks = collect(['coolify']);
|
|
|
|
}
|
|
|
|
$array_of_networks = collect([]);
|
|
|
|
$networks->map(function ($network) use ($array_of_networks) {
|
|
|
|
$array_of_networks[$network] = [
|
|
|
|
"external" => true,
|
|
|
|
];
|
|
|
|
});
|
|
|
|
return Yaml::dump([
|
|
|
|
"version" => "3.8",
|
|
|
|
"networks" => $array_of_networks->toArray(),
|
|
|
|
"services" => [
|
|
|
|
"traefik" => [
|
|
|
|
"container_name" => "coolify-proxy", # Do not modify this! You will break everything!
|
|
|
|
"image" => "traefik:v2.10",
|
|
|
|
"restart" => "always",
|
|
|
|
"extra_hosts" => [
|
|
|
|
"host.docker.internal:host-gateway",
|
|
|
|
],
|
|
|
|
"networks" => $networks->toArray(), # Do not modify this! You will break everything!
|
|
|
|
"ports" => [
|
|
|
|
"80:80",
|
|
|
|
"443:443",
|
|
|
|
"8080:8080",
|
|
|
|
],
|
|
|
|
"volumes" => [
|
|
|
|
"/var/run/docker.sock:/var/run/docker.sock:ro",
|
|
|
|
"{$proxy_config_path}/letsencrypt:/letsencrypt", # Do not modify this! You will break everything!
|
|
|
|
"{$proxy_config_path}/traefik.auth:/auth/traefik.auth", # Do not modify this! You will break everything!
|
|
|
|
],
|
|
|
|
"command" => [
|
|
|
|
"--api.dashboard=true",
|
|
|
|
"--api.insecure=true",
|
|
|
|
"--entrypoints.http.address=:80",
|
|
|
|
"--entrypoints.https.address=:443",
|
|
|
|
"--providers.docker=true",
|
|
|
|
"--providers.docker.exposedbydefault=false",
|
|
|
|
],
|
|
|
|
"labels" => [
|
|
|
|
"traefik.enable=true", # Do not modify this! You will break everything!
|
|
|
|
"traefik.http.routers.traefik.entrypoints=http",
|
|
|
|
'traefik.http.routers.traefik.rule=Host(`${TRAEFIK_DASHBOARD_HOST}`)',
|
|
|
|
"traefik.http.routers.traefik.service=api@internal",
|
|
|
|
"traefik.http.services.traefik.loadbalancer.server.port=8080",
|
|
|
|
"traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https",
|
|
|
|
],
|
|
|
|
],
|
|
|
|
],
|
|
|
|
], 4, 2);
|
|
|
|
}
|
|
|
|
}
|