2023-05-24 12:26:50 +00:00
|
|
|
<?php
|
|
|
|
|
2024-03-11 14:08:05 +00:00
|
|
|
use App\Enums\ProxyTypes;
|
2023-08-21 16:00:12 +00:00
|
|
|
use App\Models\Application;
|
2023-09-19 13:51:13 +00:00
|
|
|
use App\Models\ApplicationPreview;
|
2023-05-24 12:26:50 +00:00
|
|
|
use App\Models\Server;
|
2023-11-24 14:48:23 +00:00
|
|
|
use App\Models\ServiceApplication;
|
2023-05-24 12:26:50 +00:00
|
|
|
use Illuminate\Support\Collection;
|
2023-08-17 11:14:46 +00:00
|
|
|
use Illuminate\Support\Str;
|
2023-09-19 13:51:13 +00:00
|
|
|
use Spatie\Url\Url;
|
2024-04-29 08:49:50 +00:00
|
|
|
use Visus\Cuid2\Cuid2;
|
2023-05-24 12:26:50 +00:00
|
|
|
|
2024-02-27 08:01:19 +00:00
|
|
|
function getCurrentApplicationContainerStatus(Server $server, int $id, ?int $pullRequestId = null, ?bool $includePullrequests = false): Collection
|
2023-09-19 13:51:13 +00:00
|
|
|
{
|
2023-11-08 14:40:06 +00:00
|
|
|
$containers = collect([]);
|
2023-12-20 13:11:50 +00:00
|
|
|
if (!$server->isSwarm()) {
|
|
|
|
$containers = instant_remote_process(["docker ps -a --filter='label=coolify.applicationId={$id}' --format '{{json .}}' "], $server);
|
|
|
|
$containers = format_docker_command_output_to_json($containers);
|
2024-02-27 08:01:19 +00:00
|
|
|
$containers = $containers->map(function ($container) use ($pullRequestId, $includePullrequests) {
|
2023-12-20 13:11:50 +00:00
|
|
|
$labels = data_get($container, 'Labels');
|
|
|
|
if (!str($labels)->contains("coolify.pullRequestId=")) {
|
|
|
|
data_set($container, 'Labels', $labels . ",coolify.pullRequestId={$pullRequestId}");
|
|
|
|
return $container;
|
|
|
|
}
|
2024-02-27 08:01:19 +00:00
|
|
|
if ($includePullrequests) {
|
|
|
|
return $container;
|
|
|
|
}
|
2023-12-20 13:11:50 +00:00
|
|
|
if (str($labels)->contains("coolify.pullRequestId=$pullRequestId")) {
|
|
|
|
return $container;
|
|
|
|
}
|
|
|
|
return null;
|
|
|
|
});
|
|
|
|
$containers = $containers->filter();
|
|
|
|
return $containers;
|
|
|
|
}
|
2023-11-08 14:40:06 +00:00
|
|
|
return $containers;
|
2023-08-21 16:00:12 +00:00
|
|
|
}
|
|
|
|
|
2023-05-24 12:26:50 +00:00
|
|
|
function format_docker_command_output_to_json($rawOutput): Collection
|
|
|
|
{
|
|
|
|
$outputLines = explode(PHP_EOL, $rawOutput);
|
2023-08-21 16:00:12 +00:00
|
|
|
if (count($outputLines) === 1) {
|
|
|
|
$outputLines = collect($outputLines[0]);
|
|
|
|
} else {
|
|
|
|
$outputLines = collect($outputLines);
|
|
|
|
}
|
|
|
|
return $outputLines
|
2023-08-17 11:14:46 +00:00
|
|
|
->reject(fn ($line) => empty($line))
|
|
|
|
->map(fn ($outputLine) => json_decode($outputLine, true, flags: JSON_THROW_ON_ERROR));
|
2023-05-24 12:26:50 +00:00
|
|
|
}
|
2023-08-08 09:51:36 +00:00
|
|
|
|
2023-09-19 13:51:13 +00:00
|
|
|
function format_docker_labels_to_json(string|array $rawOutput): Collection
|
2023-05-24 12:26:50 +00:00
|
|
|
{
|
2023-09-12 13:47:30 +00:00
|
|
|
if (is_array($rawOutput)) {
|
|
|
|
return collect($rawOutput);
|
|
|
|
}
|
2023-05-24 12:26:50 +00:00
|
|
|
$outputLines = explode(PHP_EOL, $rawOutput);
|
|
|
|
|
|
|
|
return collect($outputLines)
|
2023-08-17 11:14:46 +00:00
|
|
|
->reject(fn ($line) => empty($line))
|
2023-05-24 12:26:50 +00:00
|
|
|
->map(function ($outputLine) {
|
|
|
|
$outputArray = explode(',', $outputLine);
|
|
|
|
return collect($outputArray)
|
|
|
|
->map(function ($outputLine) {
|
|
|
|
return explode('=', $outputLine);
|
|
|
|
})
|
|
|
|
->mapWithKeys(function ($outputLine) {
|
|
|
|
return [$outputLine[0] => $outputLine[1]];
|
|
|
|
});
|
|
|
|
})[0];
|
|
|
|
}
|
|
|
|
|
2023-08-11 14:13:53 +00:00
|
|
|
function format_docker_envs_to_json($rawOutput)
|
|
|
|
{
|
|
|
|
try {
|
|
|
|
$outputLines = json_decode($rawOutput, true, flags: JSON_THROW_ON_ERROR);
|
|
|
|
return collect(data_get($outputLines[0], 'Config.Env', []))->mapWithKeys(function ($env) {
|
|
|
|
$env = explode('=', $env);
|
|
|
|
return [$env[0] => $env[1]];
|
|
|
|
});
|
2023-09-11 15:36:30 +00:00
|
|
|
} catch (\Throwable $e) {
|
2023-08-11 14:13:53 +00:00
|
|
|
return collect([]);
|
|
|
|
}
|
|
|
|
}
|
2023-09-19 13:51:13 +00:00
|
|
|
function checkMinimumDockerEngineVersion($dockerVersion)
|
|
|
|
{
|
2023-09-15 13:34:25 +00:00
|
|
|
$majorDockerVersion = Str::of($dockerVersion)->before('.')->value();
|
|
|
|
if ($majorDockerVersion <= 22) {
|
|
|
|
$dockerVersion = null;
|
|
|
|
}
|
|
|
|
return $dockerVersion;
|
|
|
|
}
|
|
|
|
function executeInDocker(string $containerId, string $command)
|
|
|
|
{
|
|
|
|
return "docker exec {$containerId} bash -c '{$command}'";
|
|
|
|
// return "docker exec {$this->deployment_uuid} bash -c '{$command} |& tee -a /proc/1/fd/1; [ \$PIPESTATUS -eq 0 ] || exit \$PIPESTATUS'";
|
|
|
|
}
|
2023-08-11 14:13:53 +00:00
|
|
|
|
2023-08-21 16:00:12 +00:00
|
|
|
function getContainerStatus(Server $server, string $container_id, bool $all_data = false, bool $throwError = false)
|
2023-05-24 12:26:50 +00:00
|
|
|
{
|
2023-11-29 13:59:06 +00:00
|
|
|
if ($server->isSwarm()) {
|
|
|
|
$container = instant_remote_process(["docker service ls --filter 'name={$container_id}' --format '{{json .}}' "], $server, $throwError);
|
|
|
|
} else {
|
|
|
|
$container = instant_remote_process(["docker inspect --format '{{json .}}' {$container_id}"], $server, $throwError);
|
|
|
|
}
|
2023-05-24 12:26:50 +00:00
|
|
|
if (!$container) {
|
|
|
|
return 'exited';
|
|
|
|
}
|
|
|
|
$container = format_docker_command_output_to_json($container);
|
2023-06-02 13:15:12 +00:00
|
|
|
if ($all_data) {
|
2023-08-24 19:42:47 +00:00
|
|
|
return $container[0];
|
2023-06-02 13:15:12 +00:00
|
|
|
}
|
2023-11-29 13:59:06 +00:00
|
|
|
if ($server->isSwarm()) {
|
|
|
|
$replicas = data_get($container[0], 'Replicas');
|
|
|
|
$replicas = explode('/', $replicas);
|
|
|
|
$active = (int)$replicas[0];
|
|
|
|
$total = (int)$replicas[1];
|
|
|
|
if ($active === $total) {
|
|
|
|
return 'running';
|
|
|
|
} else {
|
|
|
|
return 'starting';
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return data_get($container[0], 'State.Status', 'exited');
|
|
|
|
}
|
2023-05-24 12:26:50 +00:00
|
|
|
}
|
2023-05-30 13:52:17 +00:00
|
|
|
|
2023-10-01 10:02:44 +00:00
|
|
|
function generateApplicationContainerName(Application $application, $pull_request_id = 0)
|
2023-05-30 13:52:17 +00:00
|
|
|
{
|
2024-02-15 10:55:43 +00:00
|
|
|
$consistent_container_name = $application->settings->is_consistent_container_name_enabled;
|
2023-09-01 14:07:46 +00:00
|
|
|
$now = now()->format('Hisu');
|
2023-10-01 10:02:44 +00:00
|
|
|
if ($pull_request_id !== 0 && $pull_request_id !== null) {
|
|
|
|
return $application->uuid . '-pr-' . $pull_request_id;
|
2023-05-30 13:52:17 +00:00
|
|
|
} else {
|
2024-02-15 10:55:43 +00:00
|
|
|
if ($consistent_container_name) {
|
|
|
|
return $application->uuid;
|
|
|
|
}
|
2023-09-19 13:51:13 +00:00
|
|
|
return $application->uuid . '-' . $now;
|
2023-05-30 13:52:17 +00:00
|
|
|
}
|
|
|
|
}
|
2023-10-01 15:27:12 +00:00
|
|
|
function get_port_from_dockerfile($dockerfile): int|null
|
2023-08-11 20:41:47 +00:00
|
|
|
{
|
2023-08-17 11:14:46 +00:00
|
|
|
$dockerfile_array = explode("\n", $dockerfile);
|
|
|
|
$found_exposed_port = null;
|
|
|
|
foreach ($dockerfile_array as $line) {
|
|
|
|
$line_str = Str::of($line)->trim();
|
|
|
|
if ($line_str->startsWith('EXPOSE')) {
|
|
|
|
$found_exposed_port = $line_str->replace('EXPOSE', '')->trim();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ($found_exposed_port) {
|
|
|
|
return (int)$found_exposed_port->value();
|
2023-08-11 20:41:47 +00:00
|
|
|
}
|
2023-10-01 15:27:12 +00:00
|
|
|
return null;
|
2023-08-11 20:41:47 +00:00
|
|
|
}
|
2023-09-19 13:51:13 +00:00
|
|
|
|
2023-09-25 13:48:43 +00:00
|
|
|
function defaultLabels($id, $name, $pull_request_id = 0, string $type = 'application', $subType = null, $subId = null)
|
2023-09-20 13:42:41 +00:00
|
|
|
{
|
|
|
|
$labels = collect([]);
|
|
|
|
$labels->push('coolify.managed=true');
|
|
|
|
$labels->push('coolify.version=' . config('version'));
|
2023-09-21 15:48:31 +00:00
|
|
|
$labels->push("coolify." . $type . "Id=" . $id);
|
|
|
|
$labels->push("coolify.type=$type");
|
2023-09-20 13:42:41 +00:00
|
|
|
$labels->push('coolify.name=' . $name);
|
2023-11-08 14:40:06 +00:00
|
|
|
$labels->push('coolify.pullRequestId=' . $pull_request_id);
|
2023-09-25 13:48:43 +00:00
|
|
|
if ($type === 'service') {
|
2023-11-24 14:48:23 +00:00
|
|
|
$subId && $labels->push('coolify.service.subId=' . $subId);
|
|
|
|
$subType && $labels->push('coolify.service.subType=' . $subType);
|
2023-09-25 13:48:43 +00:00
|
|
|
}
|
2023-09-20 13:42:41 +00:00
|
|
|
return $labels;
|
|
|
|
}
|
2024-04-16 12:08:11 +00:00
|
|
|
function generateServiceSpecificFqdns(ServiceApplication|Application $resource)
|
2023-11-13 10:09:21 +00:00
|
|
|
{
|
2023-11-24 14:48:23 +00:00
|
|
|
if ($resource->getMorphClass() === 'App\Models\ServiceApplication') {
|
2024-05-24 15:29:38 +00:00
|
|
|
$uuid = data_get($resource, 'uuid');
|
|
|
|
$server = data_get($resource, 'service.server');
|
|
|
|
$environment_variables = data_get($resource, 'service.environment_variables');
|
2023-11-24 14:48:23 +00:00
|
|
|
$type = $resource->serviceType();
|
|
|
|
} else if ($resource->getMorphClass() === 'App\Models\Application') {
|
2024-05-24 15:29:38 +00:00
|
|
|
$uuid = data_get($resource, 'uuid');
|
|
|
|
$server = data_get($resource, 'destination.server');
|
|
|
|
$environment_variables = data_get($resource, 'environment_variables');
|
2023-11-24 14:48:23 +00:00
|
|
|
$type = $resource->serviceType();
|
|
|
|
}
|
2024-04-16 10:41:33 +00:00
|
|
|
if (is_null($server) || is_null($type)) {
|
|
|
|
return collect([]);
|
|
|
|
}
|
2023-11-24 14:48:23 +00:00
|
|
|
$variables = collect($environment_variables);
|
2023-11-13 10:09:21 +00:00
|
|
|
$payload = collect([]);
|
|
|
|
switch ($type) {
|
2023-11-24 14:48:23 +00:00
|
|
|
case $type?->contains('minio'):
|
2023-11-13 10:09:21 +00:00
|
|
|
$MINIO_BROWSER_REDIRECT_URL = $variables->where('key', 'MINIO_BROWSER_REDIRECT_URL')->first();
|
2023-11-13 14:49:23 +00:00
|
|
|
$MINIO_SERVER_URL = $variables->where('key', 'MINIO_SERVER_URL')->first();
|
|
|
|
if (is_null($MINIO_BROWSER_REDIRECT_URL) || is_null($MINIO_SERVER_URL)) {
|
|
|
|
return $payload;
|
|
|
|
}
|
2023-11-13 10:17:49 +00:00
|
|
|
if (is_null($MINIO_BROWSER_REDIRECT_URL?->value)) {
|
2023-11-13 14:49:23 +00:00
|
|
|
$MINIO_BROWSER_REDIRECT_URL?->update([
|
2023-11-24 14:48:23 +00:00
|
|
|
"value" => generateFqdn($server, 'console-' . $uuid)
|
2023-11-13 10:09:21 +00:00
|
|
|
]);
|
|
|
|
}
|
2023-11-13 10:17:49 +00:00
|
|
|
if (is_null($MINIO_SERVER_URL?->value)) {
|
2023-11-13 14:49:23 +00:00
|
|
|
$MINIO_SERVER_URL?->update([
|
2023-11-24 14:48:23 +00:00
|
|
|
"value" => generateFqdn($server, 'minio-' . $uuid)
|
2023-11-13 10:09:21 +00:00
|
|
|
]);
|
|
|
|
}
|
2024-04-16 12:08:11 +00:00
|
|
|
$payload = collect([
|
|
|
|
$MINIO_BROWSER_REDIRECT_URL->value . ':9001',
|
|
|
|
$MINIO_SERVER_URL->value . ':9000',
|
|
|
|
]);
|
|
|
|
break;
|
|
|
|
case $type?->contains('logto'):
|
|
|
|
$LOGTO_ENDPOINT = $variables->where('key', 'LOGTO_ENDPOINT')->first();
|
|
|
|
$LOGTO_ADMIN_ENDPOINT = $variables->where('key', 'LOGTO_ADMIN_ENDPOINT')->first();
|
|
|
|
if (is_null($LOGTO_ENDPOINT) || is_null($LOGTO_ADMIN_ENDPOINT)) {
|
|
|
|
return $payload;
|
|
|
|
}
|
|
|
|
if (is_null($LOGTO_ENDPOINT?->value)) {
|
|
|
|
$LOGTO_ENDPOINT?->update([
|
|
|
|
"value" => generateFqdn($server, 'logto-' . $uuid)
|
2023-11-13 10:09:21 +00:00
|
|
|
]);
|
2024-04-16 12:08:11 +00:00
|
|
|
}
|
|
|
|
if (is_null($LOGTO_ADMIN_ENDPOINT?->value)) {
|
|
|
|
$LOGTO_ADMIN_ENDPOINT?->update([
|
|
|
|
"value" => generateFqdn($server, 'logto-admin-' . $uuid)
|
2023-11-13 10:09:21 +00:00
|
|
|
]);
|
|
|
|
}
|
2024-04-16 12:08:11 +00:00
|
|
|
$payload = collect([
|
|
|
|
$LOGTO_ENDPOINT->value . ':3001',
|
|
|
|
$LOGTO_ADMIN_ENDPOINT->value . ':3002',
|
|
|
|
]);
|
2023-11-24 20:04:15 +00:00
|
|
|
break;
|
2023-11-13 10:09:21 +00:00
|
|
|
}
|
|
|
|
return $payload;
|
|
|
|
}
|
2024-05-22 19:10:37 +00:00
|
|
|
function fqdnLabelsForCaddy(string $network, string $uuid, Collection $domains, bool $is_force_https_enabled = false, $onlyPort = null, ?Collection $serviceLabels = null, ?bool $is_gzip_enabled = true, ?bool $is_stripprefix_enabled = true, ?string $service_name = null, ?string $image = null)
|
2024-03-11 14:08:05 +00:00
|
|
|
{
|
|
|
|
$labels = collect([]);
|
2024-03-12 18:08:52 +00:00
|
|
|
if ($serviceLabels) {
|
|
|
|
$labels->push("caddy_ingress_network={$uuid}");
|
|
|
|
} else {
|
|
|
|
$labels->push("caddy_ingress_network={$network}");
|
|
|
|
}
|
2024-03-11 14:08:05 +00:00
|
|
|
foreach ($domains as $loop => $domain) {
|
|
|
|
$loop = $loop;
|
|
|
|
$url = Url::fromString($domain);
|
|
|
|
$host = $url->getHost();
|
|
|
|
$path = $url->getPath();
|
|
|
|
|
|
|
|
$schema = $url->getScheme();
|
|
|
|
$port = $url->getPort();
|
|
|
|
if (is_null($port) && !is_null($onlyPort)) {
|
|
|
|
$port = $onlyPort;
|
|
|
|
}
|
|
|
|
$labels->push("caddy_{$loop}={$schema}://{$host}");
|
|
|
|
$labels->push("caddy_{$loop}.header=-Server");
|
2024-03-12 14:09:24 +00:00
|
|
|
$labels->push("caddy_{$loop}.try_files={path} /index.html /index.php");
|
2024-03-11 14:08:05 +00:00
|
|
|
|
2024-03-13 08:27:42 +00:00
|
|
|
if ($port) {
|
|
|
|
$labels->push("caddy_{$loop}.handle_path.{$loop}_reverse_proxy={{upstreams $port}}");
|
2024-03-11 14:08:05 +00:00
|
|
|
} else {
|
2024-03-13 08:27:42 +00:00
|
|
|
$labels->push("caddy_{$loop}.handle_path.{$loop}_reverse_proxy={{upstreams}}");
|
2024-03-11 14:08:05 +00:00
|
|
|
}
|
2024-03-13 08:27:42 +00:00
|
|
|
$labels->push("caddy_{$loop}.handle_path={$path}*");
|
2024-03-11 14:08:05 +00:00
|
|
|
if ($is_gzip_enabled) {
|
|
|
|
$labels->push("caddy_{$loop}.encode=zstd gzip");
|
|
|
|
}
|
|
|
|
if (isDev()) {
|
|
|
|
// $labels->push("caddy_{$loop}.tls=internal");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $labels->sort();
|
|
|
|
}
|
2024-05-22 19:10:37 +00:00
|
|
|
function fqdnLabelsForTraefik(string $uuid, Collection $domains, bool $is_force_https_enabled = false, $onlyPort = null, ?Collection $serviceLabels = null, ?bool $is_gzip_enabled = true, ?bool $is_stripprefix_enabled = true, ?string $service_name = null, bool $generate_unique_uuid = false, ?string $image = null)
|
2023-09-20 13:42:41 +00:00
|
|
|
{
|
|
|
|
$labels = collect([]);
|
|
|
|
$labels->push('traefik.enable=true');
|
2024-01-15 12:23:28 +00:00
|
|
|
$labels->push("traefik.http.middlewares.gzip.compress=true");
|
|
|
|
$labels->push("traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https");
|
2024-02-15 10:55:43 +00:00
|
|
|
|
|
|
|
$basic_auth = false;
|
|
|
|
$basic_auth_middleware = null;
|
2024-02-15 11:08:48 +00:00
|
|
|
$redirect = false;
|
|
|
|
$redirect_middleware = null;
|
2024-02-15 10:55:43 +00:00
|
|
|
if ($serviceLabels) {
|
|
|
|
$basic_auth = $serviceLabels->contains(function ($value) {
|
|
|
|
return str_contains($value, 'basicauth');
|
|
|
|
});
|
|
|
|
if ($basic_auth) {
|
|
|
|
$basic_auth_middleware = $serviceLabels
|
|
|
|
->map(function ($item) {
|
|
|
|
if (preg_match('/traefik\.http\.middlewares\.(.*?)\.basicauth\.users/', $item, $matches)) {
|
|
|
|
return $matches[1];
|
|
|
|
}
|
|
|
|
})
|
|
|
|
->filter()
|
|
|
|
->first();
|
|
|
|
}
|
2024-02-15 11:08:48 +00:00
|
|
|
$redirect = $serviceLabels->contains(function ($value) {
|
|
|
|
return str_contains($value, 'redirectregex');
|
|
|
|
});
|
|
|
|
if ($redirect) {
|
|
|
|
$redirect_middleware = $serviceLabels
|
|
|
|
->map(function ($item) {
|
|
|
|
if (preg_match('/traefik\.http\.middlewares\.(.*?)\.redirectregex\.regex/', $item, $matches)) {
|
|
|
|
return $matches[1];
|
|
|
|
}
|
|
|
|
})
|
|
|
|
->filter()
|
|
|
|
->first();
|
|
|
|
}
|
2024-02-15 10:55:43 +00:00
|
|
|
}
|
2023-10-18 12:14:40 +00:00
|
|
|
foreach ($domains as $loop => $domain) {
|
2023-12-28 16:53:47 +00:00
|
|
|
try {
|
2024-04-29 08:49:50 +00:00
|
|
|
if ($generate_unique_uuid) {
|
|
|
|
$uuid = new Cuid2(7);
|
|
|
|
}
|
2023-12-28 16:53:47 +00:00
|
|
|
$url = Url::fromString($domain);
|
|
|
|
$host = $url->getHost();
|
|
|
|
$path = $url->getPath();
|
|
|
|
$schema = $url->getScheme();
|
|
|
|
$port = $url->getPort();
|
|
|
|
if (is_null($port) && !is_null($onlyPort)) {
|
|
|
|
$port = $onlyPort;
|
2023-09-22 12:47:25 +00:00
|
|
|
}
|
2024-01-09 12:00:07 +00:00
|
|
|
$http_label = "http-{$loop}-{$uuid}";
|
|
|
|
$https_label = "https-{$loop}-{$uuid}";
|
2024-02-21 10:21:11 +00:00
|
|
|
if ($service_name) {
|
|
|
|
$http_label = "http-{$loop}-{$uuid}-{$service_name}";
|
|
|
|
$https_label = "https-{$loop}-{$uuid}-{$service_name}";
|
|
|
|
}
|
2024-05-22 19:10:37 +00:00
|
|
|
if (str($image)->contains('ghost')) {
|
|
|
|
$labels->push("traefik.http.middlewares.redir-ghost.redirectregex.regex=^{$path}/(.*)");
|
|
|
|
$labels->push("traefik.http.middlewares.redir-ghost.redirectregex.replacement=/$1");
|
|
|
|
}
|
2023-12-28 16:53:47 +00:00
|
|
|
if ($schema === 'https') {
|
|
|
|
// Set labels for https
|
|
|
|
$labels->push("traefik.http.routers.{$https_label}.rule=Host(`{$host}`) && PathPrefix(`{$path}`)");
|
|
|
|
$labels->push("traefik.http.routers.{$https_label}.entryPoints=https");
|
|
|
|
if ($port) {
|
|
|
|
$labels->push("traefik.http.routers.{$https_label}.service={$https_label}");
|
|
|
|
$labels->push("traefik.http.services.{$https_label}.loadbalancer.server.port=$port");
|
|
|
|
}
|
|
|
|
if ($path !== '/') {
|
2024-05-22 19:10:37 +00:00
|
|
|
$middlewares = collect([]);
|
|
|
|
if ($is_stripprefix_enabled && !str($image)->contains('ghost')) {
|
2024-03-04 09:46:13 +00:00
|
|
|
$labels->push("traefik.http.middlewares.{$https_label}-stripprefix.stripprefix.prefixes={$path}");
|
2024-05-22 19:10:37 +00:00
|
|
|
$middlewares->push("{$https_label}-stripprefix");
|
2024-03-04 09:46:13 +00:00
|
|
|
}
|
2024-02-15 19:44:01 +00:00
|
|
|
if ($is_gzip_enabled) {
|
|
|
|
$middlewares->push('gzip');
|
|
|
|
}
|
|
|
|
if ($basic_auth && $basic_auth_middleware) {
|
|
|
|
$middlewares->push($basic_auth_middleware);
|
2024-02-15 10:55:43 +00:00
|
|
|
}
|
2024-02-15 11:08:48 +00:00
|
|
|
if ($redirect && $redirect_middleware) {
|
2024-02-15 19:44:01 +00:00
|
|
|
$middlewares->push($redirect_middleware);
|
|
|
|
}
|
2024-05-22 19:10:37 +00:00
|
|
|
if (str($image)->contains('ghost')) {
|
|
|
|
$middlewares->push('redir-ghost');
|
|
|
|
}
|
2024-02-15 19:44:01 +00:00
|
|
|
if ($middlewares->isNotEmpty()) {
|
|
|
|
$middlewares = $middlewares->join(',');
|
|
|
|
$labels->push("traefik.http.routers.{$https_label}.middlewares={$middlewares}");
|
2024-02-15 11:08:48 +00:00
|
|
|
}
|
2024-01-15 11:12:34 +00:00
|
|
|
} else {
|
2024-02-15 19:44:01 +00:00
|
|
|
$middlewares = collect([]);
|
|
|
|
if ($is_gzip_enabled) {
|
|
|
|
$middlewares->push('gzip');
|
|
|
|
}
|
2024-02-15 10:55:43 +00:00
|
|
|
if ($basic_auth && $basic_auth_middleware) {
|
2024-02-15 19:44:01 +00:00
|
|
|
$middlewares->push($basic_auth_middleware);
|
2024-02-15 10:55:43 +00:00
|
|
|
}
|
2024-02-15 11:08:48 +00:00
|
|
|
if ($redirect && $redirect_middleware) {
|
2024-02-15 19:44:01 +00:00
|
|
|
$middlewares->push($redirect_middleware);
|
|
|
|
}
|
2024-05-22 19:10:37 +00:00
|
|
|
if (str($image)->contains('ghost')) {
|
|
|
|
$middlewares->push('redir-ghost');
|
|
|
|
}
|
2024-02-15 19:44:01 +00:00
|
|
|
if ($middlewares->isNotEmpty()) {
|
|
|
|
$middlewares = $middlewares->join(',');
|
|
|
|
$labels->push("traefik.http.routers.{$https_label}.middlewares={$middlewares}");
|
2024-02-15 11:08:48 +00:00
|
|
|
}
|
2023-12-28 16:53:47 +00:00
|
|
|
}
|
|
|
|
$labels->push("traefik.http.routers.{$https_label}.tls=true");
|
|
|
|
$labels->push("traefik.http.routers.{$https_label}.tls.certresolver=letsencrypt");
|
|
|
|
|
|
|
|
// Set labels for http (redirect to https)
|
|
|
|
$labels->push("traefik.http.routers.{$http_label}.rule=Host(`{$host}`) && PathPrefix(`{$path}`)");
|
|
|
|
$labels->push("traefik.http.routers.{$http_label}.entryPoints=http");
|
2024-01-09 11:29:45 +00:00
|
|
|
if ($port) {
|
|
|
|
$labels->push("traefik.http.services.{$http_label}.loadbalancer.server.port=$port");
|
2024-01-09 11:49:03 +00:00
|
|
|
$labels->push("traefik.http.routers.{$http_label}.service={$http_label}");
|
2024-01-09 11:29:45 +00:00
|
|
|
}
|
2023-12-28 16:53:47 +00:00
|
|
|
if ($is_force_https_enabled) {
|
|
|
|
$labels->push("traefik.http.routers.{$http_label}.middlewares=redirect-to-https");
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Set labels for http
|
|
|
|
$labels->push("traefik.http.routers.{$http_label}.rule=Host(`{$host}`) && PathPrefix(`{$path}`)");
|
|
|
|
$labels->push("traefik.http.routers.{$http_label}.entryPoints=http");
|
|
|
|
if ($port) {
|
|
|
|
$labels->push("traefik.http.services.{$http_label}.loadbalancer.server.port=$port");
|
2024-01-09 11:49:03 +00:00
|
|
|
$labels->push("traefik.http.routers.{$http_label}.service={$http_label}");
|
2023-12-28 16:53:47 +00:00
|
|
|
}
|
|
|
|
if ($path !== '/') {
|
2024-05-22 19:10:37 +00:00
|
|
|
$middlewares = collect([]);
|
|
|
|
if ($is_stripprefix_enabled && !str($image)->contains('ghost')) {
|
2024-03-04 09:46:13 +00:00
|
|
|
$labels->push("traefik.http.middlewares.{$http_label}-stripprefix.stripprefix.prefixes={$path}");
|
2024-05-22 19:10:37 +00:00
|
|
|
$middlewares->push("{$https_label}-stripprefix");
|
2024-03-04 09:46:13 +00:00
|
|
|
}
|
2024-02-15 19:44:01 +00:00
|
|
|
if ($is_gzip_enabled) {
|
|
|
|
$middlewares->push('gzip');
|
|
|
|
}
|
|
|
|
if ($basic_auth && $basic_auth_middleware) {
|
|
|
|
$middlewares->push($basic_auth_middleware);
|
2024-02-15 10:55:43 +00:00
|
|
|
}
|
2024-02-15 11:08:48 +00:00
|
|
|
if ($redirect && $redirect_middleware) {
|
2024-02-15 19:44:01 +00:00
|
|
|
$middlewares->push($redirect_middleware);
|
|
|
|
}
|
2024-05-22 19:10:37 +00:00
|
|
|
if (str($image)->contains('ghost')) {
|
|
|
|
$middlewares->push('redir-ghost');
|
|
|
|
}
|
2024-02-15 19:44:01 +00:00
|
|
|
if ($middlewares->isNotEmpty()) {
|
|
|
|
$middlewares = $middlewares->join(',');
|
|
|
|
$labels->push("traefik.http.routers.{$http_label}.middlewares={$middlewares}");
|
2024-02-15 11:08:48 +00:00
|
|
|
}
|
2024-01-15 11:12:34 +00:00
|
|
|
} else {
|
2024-02-15 19:44:01 +00:00
|
|
|
$middlewares = collect([]);
|
|
|
|
if ($is_gzip_enabled) {
|
|
|
|
$middlewares->push('gzip');
|
|
|
|
}
|
2024-02-15 10:55:43 +00:00
|
|
|
if ($basic_auth && $basic_auth_middleware) {
|
2024-02-15 19:44:01 +00:00
|
|
|
$middlewares->push($basic_auth_middleware);
|
2024-02-15 10:55:43 +00:00
|
|
|
}
|
2024-02-15 11:08:48 +00:00
|
|
|
if ($redirect && $redirect_middleware) {
|
2024-02-15 19:44:01 +00:00
|
|
|
$middlewares->push($redirect_middleware);
|
|
|
|
}
|
2024-05-22 19:10:37 +00:00
|
|
|
if (str($image)->contains('ghost')) {
|
|
|
|
$middlewares->push('redir-ghost');
|
|
|
|
}
|
2024-02-15 19:44:01 +00:00
|
|
|
if ($middlewares->isNotEmpty()) {
|
|
|
|
$middlewares = $middlewares->join(',');
|
|
|
|
$labels->push("traefik.http.routers.{$http_label}.middlewares={$middlewares}");
|
2024-02-15 11:08:48 +00:00
|
|
|
}
|
2023-12-28 16:53:47 +00:00
|
|
|
}
|
2023-09-22 12:47:25 +00:00
|
|
|
}
|
2024-01-09 11:29:45 +00:00
|
|
|
} catch (\Throwable $e) {
|
2023-12-28 16:53:47 +00:00
|
|
|
continue;
|
2023-09-20 13:42:41 +00:00
|
|
|
}
|
|
|
|
}
|
2024-01-09 12:00:07 +00:00
|
|
|
return $labels->sort();
|
2023-09-20 13:42:41 +00:00
|
|
|
}
|
2023-10-18 08:32:08 +00:00
|
|
|
function generateLabelsApplication(Application $application, ?ApplicationPreview $preview = null): array
|
2023-09-19 13:51:13 +00:00
|
|
|
{
|
2023-10-18 08:32:08 +00:00
|
|
|
$ports = $application->settings->is_static ? [80] : $application->ports_exposes_array;
|
2023-10-11 07:23:31 +00:00
|
|
|
$onlyPort = null;
|
2024-01-09 11:29:45 +00:00
|
|
|
if (count($ports) > 0) {
|
2023-10-11 07:23:31 +00:00
|
|
|
$onlyPort = $ports[0];
|
|
|
|
}
|
2023-09-19 13:51:13 +00:00
|
|
|
$pull_request_id = data_get($preview, 'pull_request_id', 0);
|
2023-11-01 19:55:21 +00:00
|
|
|
$appUuid = $application->uuid;
|
|
|
|
if ($pull_request_id !== 0) {
|
|
|
|
$appUuid = $appUuid . '-pr-' . $pull_request_id;
|
2023-09-19 13:51:13 +00:00
|
|
|
}
|
2023-09-20 13:42:41 +00:00
|
|
|
$labels = collect([]);
|
2024-05-30 10:28:29 +00:00
|
|
|
if ($pull_request_id === 0) {
|
|
|
|
if ($application->fqdn) {
|
2023-09-19 13:51:13 +00:00
|
|
|
$domains = Str::of(data_get($application, 'fqdn'))->explode(',');
|
2024-05-30 10:28:29 +00:00
|
|
|
$labels = $labels->merge(fqdnLabelsForTraefik(
|
|
|
|
uuid: $appUuid,
|
|
|
|
domains: $domains,
|
|
|
|
onlyPort: $onlyPort,
|
|
|
|
is_force_https_enabled: $application->isForceHttpsEnabled(),
|
|
|
|
is_gzip_enabled: $application->isGzipEnabled(),
|
|
|
|
is_stripprefix_enabled: $application->isStripprefixEnabled()
|
|
|
|
));
|
|
|
|
// Add Caddy labels
|
|
|
|
$labels = $labels->merge(fqdnLabelsForCaddy(
|
|
|
|
network: $application->destination->network,
|
|
|
|
uuid: $appUuid,
|
|
|
|
domains: $domains,
|
|
|
|
onlyPort: $onlyPort,
|
|
|
|
is_force_https_enabled: $application->isForceHttpsEnabled(),
|
|
|
|
is_gzip_enabled: $application->isGzipEnabled(),
|
|
|
|
is_stripprefix_enabled: $application->isStripprefixEnabled()
|
|
|
|
));
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if ($preview->fqdn) {
|
|
|
|
$domains = Str::of(data_get($preview, 'fqdn'))->explode(',');
|
2023-09-19 13:51:13 +00:00
|
|
|
}
|
2024-03-04 09:46:13 +00:00
|
|
|
$labels = $labels->merge(fqdnLabelsForTraefik(
|
|
|
|
uuid: $appUuid,
|
|
|
|
domains: $domains,
|
|
|
|
onlyPort: $onlyPort,
|
2024-03-04 10:01:14 +00:00
|
|
|
is_force_https_enabled: $application->isForceHttpsEnabled(),
|
|
|
|
is_gzip_enabled: $application->isGzipEnabled(),
|
|
|
|
is_stripprefix_enabled: $application->isStripprefixEnabled()
|
2024-03-04 09:46:13 +00:00
|
|
|
));
|
2024-03-11 14:08:05 +00:00
|
|
|
// Add Caddy labels
|
|
|
|
$labels = $labels->merge(fqdnLabelsForCaddy(
|
|
|
|
network: $application->destination->network,
|
|
|
|
uuid: $appUuid,
|
|
|
|
domains: $domains,
|
|
|
|
onlyPort: $onlyPort,
|
|
|
|
is_force_https_enabled: $application->isForceHttpsEnabled(),
|
|
|
|
is_gzip_enabled: $application->isGzipEnabled(),
|
|
|
|
is_stripprefix_enabled: $application->isStripprefixEnabled()
|
|
|
|
));
|
2024-05-30 10:28:29 +00:00
|
|
|
|
2023-09-19 13:51:13 +00:00
|
|
|
}
|
2023-09-20 13:42:41 +00:00
|
|
|
return $labels->all();
|
2023-09-19 13:51:13 +00:00
|
|
|
}
|
2023-11-27 10:54:55 +00:00
|
|
|
|
2023-11-28 13:27:38 +00:00
|
|
|
function isDatabaseImage(?string $image = null)
|
2023-11-27 10:54:55 +00:00
|
|
|
{
|
2023-11-28 13:27:38 +00:00
|
|
|
if (is_null($image)) {
|
|
|
|
return false;
|
|
|
|
}
|
2023-11-27 10:54:55 +00:00
|
|
|
$image = str($image);
|
|
|
|
if ($image->contains(':')) {
|
|
|
|
$image = str($image);
|
|
|
|
} else {
|
|
|
|
$image = str($image)->append(':latest');
|
|
|
|
}
|
|
|
|
$imageName = $image->before(':');
|
|
|
|
if (collect(DATABASE_DOCKER_IMAGES)->contains($imageName)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
2024-01-29 15:07:00 +00:00
|
|
|
|
|
|
|
function convert_docker_run_to_compose(?string $custom_docker_run_options = null)
|
|
|
|
{
|
2024-01-29 15:21:23 +00:00
|
|
|
$options = [];
|
|
|
|
$compose_options = collect([]);
|
2024-01-29 15:07:00 +00:00
|
|
|
preg_match_all('/(--\w+(?:-\w+)*)(?:\s|=)?([^\s-]+)?/', $custom_docker_run_options, $matches, PREG_SET_ORDER);
|
|
|
|
$list_options = collect([
|
|
|
|
'--cap-add',
|
|
|
|
'--cap-drop',
|
|
|
|
'--security-opt',
|
|
|
|
'--sysctl',
|
|
|
|
'--ulimit',
|
2024-02-25 22:13:27 +00:00
|
|
|
'--device',
|
2024-01-29 15:07:00 +00:00
|
|
|
]);
|
|
|
|
$mapping = collect([
|
|
|
|
'--cap-add' => 'cap_add',
|
|
|
|
'--cap-drop' => 'cap_drop',
|
|
|
|
'--security-opt' => 'security_opt',
|
|
|
|
'--sysctl' => 'sysctls',
|
|
|
|
'--ulimit' => 'ulimits',
|
2024-02-14 07:42:47 +00:00
|
|
|
'--device' => 'devices',
|
2024-01-29 15:07:00 +00:00
|
|
|
'--init' => 'init',
|
|
|
|
'--ulimit' => 'ulimits',
|
|
|
|
'--privileged' => 'privileged',
|
2024-02-25 22:13:27 +00:00
|
|
|
'--ip' => 'ip',
|
2024-01-29 15:07:00 +00:00
|
|
|
]);
|
|
|
|
foreach ($matches as $match) {
|
|
|
|
$option = $match[1];
|
2024-02-14 07:42:47 +00:00
|
|
|
if (isset($match[2]) && $match[2] !== '') {
|
|
|
|
$value = $match[2];
|
|
|
|
$options[$option][] = $value;
|
|
|
|
$options[$option] = array_unique($options[$option]);
|
|
|
|
} else {
|
|
|
|
$value = true;
|
|
|
|
$options[$option] = $value;
|
|
|
|
}
|
2024-01-29 15:07:00 +00:00
|
|
|
}
|
|
|
|
$options = collect($options);
|
|
|
|
// Easily get mappings from https://github.com/composerize/composerize/blob/master/packages/composerize/src/mappings.js
|
|
|
|
foreach ($options as $option => $value) {
|
|
|
|
if (!data_get($mapping, $option)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if ($option === '--ulimit') {
|
|
|
|
$ulimits = collect([]);
|
2024-02-09 12:38:17 +00:00
|
|
|
collect($value)->map(function ($ulimit) use ($ulimits) {
|
2024-01-29 15:07:00 +00:00
|
|
|
$ulimit = explode('=', $ulimit);
|
|
|
|
$type = $ulimit[0];
|
|
|
|
$limits = explode(':', $ulimit[1]);
|
|
|
|
if (count($limits) == 2) {
|
|
|
|
$soft_limit = $limits[0];
|
|
|
|
$hard_limit = $limits[1];
|
|
|
|
$ulimits->put($type, [
|
|
|
|
'soft' => $soft_limit,
|
|
|
|
'hard' => $hard_limit
|
|
|
|
]);
|
|
|
|
} else {
|
|
|
|
$soft_limit = $ulimit[1];
|
|
|
|
$ulimits->put($type, [
|
|
|
|
'soft' => $soft_limit,
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
$compose_options->put($mapping[$option], $ulimits);
|
|
|
|
} else {
|
|
|
|
if ($list_options->contains($option)) {
|
|
|
|
if ($compose_options->has($mapping[$option])) {
|
|
|
|
$compose_options->put($mapping[$option], $options->get($mapping[$option]) . ',' . $value);
|
|
|
|
} else {
|
|
|
|
$compose_options->put($mapping[$option], $value);
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
$compose_options->put($mapping[$option], $value);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
$compose_options->forget($option);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return $compose_options->toArray();
|
|
|
|
}
|
2024-03-14 08:21:48 +00:00
|
|
|
|
2024-03-14 22:00:06 +00:00
|
|
|
function validateComposeFile(string $compose, int $server_id): string|Throwable
|
|
|
|
{
|
2024-03-14 18:15:30 +00:00
|
|
|
return 'OK';
|
2024-03-14 08:21:48 +00:00
|
|
|
try {
|
|
|
|
$uuid = Str::random(10);
|
|
|
|
$server = Server::findOrFail($server_id);
|
|
|
|
$base64_compose = base64_encode($compose);
|
|
|
|
$output = instant_remote_process([
|
2024-04-17 08:49:34 +00:00
|
|
|
"echo {$base64_compose} | base64 -d | tee /tmp/{$uuid}.yml > /dev/null",
|
2024-03-14 08:21:48 +00:00
|
|
|
"docker compose -f /tmp/{$uuid}.yml config",
|
|
|
|
], $server);
|
|
|
|
ray($output);
|
|
|
|
return 'OK';
|
|
|
|
} catch (\Throwable $e) {
|
|
|
|
ray($e);
|
|
|
|
return $e->getMessage();
|
|
|
|
} finally {
|
|
|
|
instant_remote_process([
|
|
|
|
"rm /tmp/{$uuid}.yml",
|
|
|
|
], $server);
|
|
|
|
}
|
|
|
|
}
|
2024-03-14 22:00:06 +00:00
|
|
|
|
|
|
|
function escapeEnvVariables($value)
|
|
|
|
{
|
2024-04-12 07:26:04 +00:00
|
|
|
$search = array("\\", "\r", "\t", "\x0", '"', "'");
|
|
|
|
$replace = array("\\\\", "\\r", "\\t", "\\0", '\"', "\'");
|
2024-03-14 22:00:06 +00:00
|
|
|
return str_replace($search, $replace, $value);
|
|
|
|
}
|
2024-04-15 10:46:22 +00:00
|
|
|
function escapeDollarSign($value)
|
|
|
|
{
|
|
|
|
$search = array('$');
|
|
|
|
$replace = array('$$');
|
|
|
|
return str_replace($search, $replace, $value);
|
|
|
|
}
|