['type' => 'integer'], 'repository_project_id' => ['type' => 'integer', 'nullable' => true], 'uuid' => ['type' => 'string'], 'name' => ['type' => 'string'], 'fqdn' => ['type' => 'string'], 'config_hash' => ['type' => 'string'], 'git_repository' => ['type' => 'string'], 'git_branch' => ['type' => 'string'], 'git_commit_sha' => ['type' => 'string'], 'git_full_url' => ['type' => 'string', 'nullable' => true], 'docker_registry_image_name' => ['type' => 'string', 'nullable' => true], 'docker_registry_image_tag' => ['type' => 'string', 'nullable' => true], 'build_pack' => ['type' => 'string'], 'static_image' => ['type' => 'string'], 'install_command' => ['type' => 'string'], 'build_command' => ['type' => 'string'], 'start_command' => ['type' => 'string'], 'ports_exposes' => ['type' => 'string'], 'ports_mappings' => ['type' => 'string', 'nullable' => true], 'base_directory' => ['type' => 'string'], 'publish_directory' => ['type' => 'string'], 'health_check_path' => ['type' => 'string'], 'health_check_port' => ['type' => 'string', 'nullable' => true], 'health_check_host' => ['type' => 'string'], 'health_check_method' => ['type' => 'string'], 'health_check_return_code' => ['type' => 'integer'], 'health_check_scheme' => ['type' => 'string'], 'health_check_response_text' => ['type' => 'string', 'nullable' => true], 'health_check_interval' => ['type' => 'integer'], 'health_check_timeout' => ['type' => 'integer'], 'health_check_retries' => ['type' => 'integer'], 'health_check_start_period' => ['type' => 'integer'], 'limits_memory' => ['type' => 'string'], 'limits_memory_swap' => ['type' => 'string'], 'limits_memory_swappiness' => ['type' => 'integer'], 'limits_memory_reservation' => ['type' => 'string'], 'limits_cpus' => ['type' => 'string'], 'limits_cpuset' => ['type' => 'string', 'nullable' => true], 'limits_cpu_shares' => ['type' => 'integer'], 'status' => ['type' => 'string'], 'preview_url_template' => ['type' => 'string'], 'destination_type' => ['type' => 'string'], 'destination_id' => ['type' => 'integer'], 'source_type' => ['type' => 'string'], 'source_id' => ['type' => 'integer'], 'private_key_id' => ['type' => 'integer', 'nullable' => true], 'environment_id' => ['type' => 'integer'], 'created_at' => ['type' => 'string', 'format' => 'date-time'], 'updated_at' => ['type' => 'string', 'format' => 'date-time'], 'description' => ['type' => 'string', 'nullable' => true], 'dockerfile' => ['type' => 'string', 'nullable' => true], 'health_check_enabled' => ['type' => 'boolean'], 'dockerfile_location' => ['type' => 'string'], 'custom_labels' => ['type' => 'string'], 'dockerfile_target_build' => ['type' => 'string', 'nullable' => true], 'manual_webhook_secret_github' => ['type' => 'string', 'nullable' => true], 'manual_webhook_secret_gitlab' => ['type' => 'string', 'nullable' => true], 'docker_compose_location' => ['type' => 'string'], 'docker_compose' => ['type' => 'string', 'nullable' => true], 'docker_compose_raw' => ['type' => 'string', 'nullable' => true], 'docker_compose_domains' => ['type' => 'string', 'nullable' => true], 'deleted_at' => ['type' => 'string', 'format' => 'date-time', 'nullable' => true], 'docker_compose_custom_start_command' => ['type' => 'string', 'nullable' => true], 'docker_compose_custom_build_command' => ['type' => 'string', 'nullable' => true], 'swarm_replicas' => ['type' => 'integer'], 'swarm_placement_constraints' => ['type' => 'string', 'nullable' => true], 'manual_webhook_secret_bitbucket' => ['type' => 'string', 'nullable' => true], 'custom_docker_run_options' => ['type' => 'string', 'nullable' => true], 'post_deployment_command' => ['type' => 'string', 'nullable' => true], 'post_deployment_command_container' => ['type' => 'string', 'nullable' => true], 'pre_deployment_command' => ['type' => 'string', 'nullable' => true], 'pre_deployment_command_container' => ['type' => 'string', 'nullable' => true], 'watch_paths' => ['type' => 'string', 'nullable' => true], 'custom_healthcheck_found' => ['type' => 'boolean'], 'manual_webhook_secret_gitea' => ['type' => 'string', 'nullable' => true], 'redirect' => ['type' => 'string'], ] )] class Server extends BaseModel { use SchemalessAttributesTrait; public static $batch_counter = 0; protected static function booted() { static::saving(function ($server) { $payload = []; if ($server->user) { $payload['user'] = str($server->user)->trim(); } if ($server->ip) { $payload['ip'] = str($server->ip)->trim(); } $server->forceFill($payload); }); static::created(function ($server) { ServerSetting::create([ 'server_id' => $server->id, ]); }); static::deleting(function ($server) { $server->destinations()->each(function ($destination) { $destination->delete(); }); $server->settings()->delete(); }); } public $casts = [ 'proxy' => SchemalessAttributes::class, 'logdrain_axiom_api_key' => 'encrypted', 'logdrain_newrelic_license_key' => 'encrypted', ]; protected $schemalessAttributes = [ 'proxy', ]; protected $guarded = []; public static function isReachable() { return Server::ownedByCurrentTeam()->whereRelation('settings', 'is_reachable', true); } public static function ownedByCurrentTeam(array $select = ['*']) { $teamId = currentTeam()->id; $selectArray = collect($select)->concat(['id']); return Server::whereTeamId($teamId)->with('settings', 'swarmDockers', 'standaloneDockers')->select($selectArray->all())->orderBy('name'); } public static function isUsable() { return Server::ownedByCurrentTeam()->whereRelation('settings', 'is_reachable', true)->whereRelation('settings', 'is_usable', true)->whereRelation('settings', 'is_swarm_worker', false)->whereRelation('settings', 'is_build_server', false)->whereRelation('settings', 'force_disabled', false); } public static function destinationsByServer(string $server_id) { $server = Server::ownedByCurrentTeam()->get()->where('id', $server_id)->firstOrFail(); $standaloneDocker = collect($server->standaloneDockers->all()); $swarmDocker = collect($server->swarmDockers->all()); return $standaloneDocker->concat($swarmDocker); } public function settings() { return $this->hasOne(ServerSetting::class); } public function addInitialNetwork() { if ($this->id === 0) { if ($this->isSwarm()) { SwarmDocker::create([ 'id' => 0, 'name' => 'coolify', 'network' => 'coolify-overlay', 'server_id' => $this->id, ]); } else { StandaloneDocker::create([ 'id' => 0, 'name' => 'coolify', 'network' => 'coolify', 'server_id' => $this->id, ]); } } else { if ($this->isSwarm()) { SwarmDocker::create([ 'name' => 'coolify-overlay', 'network' => 'coolify-overlay', 'server_id' => $this->id, ]); } else { StandaloneDocker::create([ 'name' => 'coolify', 'network' => 'coolify', 'server_id' => $this->id, ]); } } } public function setupDefault404Redirect() { $dynamic_conf_path = $this->proxyPath().'/dynamic'; $proxy_type = $this->proxyType(); $redirect_url = $this->proxy->redirect_url; if ($proxy_type === 'TRAEFIK_V2') { $default_redirect_file = "$dynamic_conf_path/default_redirect_404.yaml"; } elseif ($proxy_type === 'CADDY') { $default_redirect_file = "$dynamic_conf_path/default_redirect_404.caddy"; } if (empty($redirect_url)) { if ($proxy_type === 'CADDY') { $conf = ':80, :443 { respond 404 }'; $conf = "# This file is automatically generated by Coolify.\n". "# Do not edit it manually (only if you know what are you doing).\n\n". $conf; $base64 = base64_encode($conf); instant_remote_process([ "mkdir -p $dynamic_conf_path", "echo '$base64' | base64 -d | tee $default_redirect_file > /dev/null", ], $this); $this->reloadCaddy(); return; } instant_remote_process([ "mkdir -p $dynamic_conf_path", "rm -f $default_redirect_file", ], $this); return; } if ($proxy_type === 'TRAEFIK_V2') { $dynamic_conf = [ 'http' => [ 'routers' => [ 'catchall' => [ 'entryPoints' => [ 0 => 'http', 1 => 'https', ], 'service' => 'noop', 'rule' => 'HostRegexp(`{catchall:.*}`)', 'priority' => 1, 'middlewares' => [ 0 => 'redirect-regexp@file', ], ], ], 'services' => [ 'noop' => [ 'loadBalancer' => [ 'servers' => [ 0 => [ 'url' => '', ], ], ], ], ], 'middlewares' => [ 'redirect-regexp' => [ 'redirectRegex' => [ 'regex' => '(.*)', 'replacement' => $redirect_url, 'permanent' => false, ], ], ], ], ]; $conf = Yaml::dump($dynamic_conf, 12, 2); $conf = "# This file is automatically generated by Coolify.\n". "# Do not edit it manually (only if you know what are you doing).\n\n". $conf; $base64 = base64_encode($conf); } elseif ($proxy_type === 'CADDY') { $conf = ":80, :443 { redir $redirect_url }"; $conf = "# This file is automatically generated by Coolify.\n". "# Do not edit it manually (only if you know what are you doing).\n\n". $conf; $base64 = base64_encode($conf); } instant_remote_process([ "mkdir -p $dynamic_conf_path", "echo '$base64' | base64 -d | tee $default_redirect_file > /dev/null", ], $this); if (config('app.env') == 'local') { ray($conf); } if ($proxy_type === 'CADDY') { $this->reloadCaddy(); } } public function setupDynamicProxyConfiguration() { $settings = InstanceSettings::get(); $dynamic_config_path = $this->proxyPath().'/dynamic'; if ($this->proxyType() === 'TRAEFIK_V2') { $file = "$dynamic_config_path/coolify.yaml"; if (empty($settings->fqdn) || (isCloud() && $this->id !== 0)) { instant_remote_process([ "rm -f $file", ], $this); } else { $url = Url::fromString($settings->fqdn); $host = $url->getHost(); $schema = $url->getScheme(); $traefik_dynamic_conf = [ 'http' => [ 'middlewares' => [ 'redirect-to-https' => [ 'redirectscheme' => [ 'scheme' => 'https', ], ], 'gzip' => [ 'compress' => true, ], ], 'routers' => [ 'coolify-http' => [ 'middlewares' => [ 0 => 'gzip', ], 'entryPoints' => [ 0 => 'http', ], 'service' => 'coolify', 'rule' => "Host(`{$host}`)", ], 'coolify-realtime-ws' => [ 'entryPoints' => [ 0 => 'http', ], 'service' => 'coolify-realtime', 'rule' => "Host(`{$host}`) && PathPrefix(`/app`)", ], ], 'services' => [ 'coolify' => [ 'loadBalancer' => [ 'servers' => [ 0 => [ 'url' => 'http://coolify:80', ], ], ], ], 'coolify-realtime' => [ 'loadBalancer' => [ 'servers' => [ 0 => [ 'url' => 'http://coolify-realtime:6001', ], ], ], ], ], ], ]; if ($schema === 'https') { $traefik_dynamic_conf['http']['routers']['coolify-http']['middlewares'] = [ 0 => 'redirect-to-https', ]; $traefik_dynamic_conf['http']['routers']['coolify-https'] = [ 'entryPoints' => [ 0 => 'https', ], 'service' => 'coolify', 'rule' => "Host(`{$host}`)", 'tls' => [ 'certresolver' => 'letsencrypt', ], ]; $traefik_dynamic_conf['http']['routers']['coolify-realtime-wss'] = [ 'entryPoints' => [ 0 => 'https', ], 'service' => 'coolify-realtime', 'rule' => "Host(`{$host}`) && PathPrefix(`/app`)", 'tls' => [ 'certresolver' => 'letsencrypt', ], ]; } $yaml = Yaml::dump($traefik_dynamic_conf, 12, 2); $yaml = "# This file is automatically generated by Coolify.\n". "# Do not edit it manually (only if you know what are you doing).\n\n". $yaml; $base64 = base64_encode($yaml); instant_remote_process([ "mkdir -p $dynamic_config_path", "echo '$base64' | base64 -d | tee $file > /dev/null", ], $this); if (config('app.env') == 'local') { // ray($yaml); } } } elseif ($this->proxyType() === 'CADDY') { $file = "$dynamic_config_path/coolify.caddy"; if (empty($settings->fqdn) || (isCloud() && $this->id !== 0)) { instant_remote_process([ "rm -f $file", ], $this); $this->reloadCaddy(); } else { $url = Url::fromString($settings->fqdn); $host = $url->getHost(); $schema = $url->getScheme(); $caddy_file = " $schema://$host { handle /app/* { reverse_proxy coolify-realtime:6001 } reverse_proxy coolify:80 }"; $base64 = base64_encode($caddy_file); instant_remote_process([ "echo '$base64' | base64 -d | tee $file > /dev/null", ], $this); $this->reloadCaddy(); } } } public function reloadCaddy() { return instant_remote_process([ 'docker exec coolify-proxy caddy reload --config /config/caddy/Caddyfile.autosave', ], $this); } public function proxyPath() { $base_path = config('coolify.base_config_path'); $proxyType = $this->proxyType(); $proxy_path = "$base_path/proxy"; // TODO: should use /traefik for already exisiting configurations? // Should move everything except /caddy and /nginx to /traefik // The code needs to be modified as well, so maybe it does not worth it if ($proxyType === ProxyTypes::TRAEFIK_V2->value) { $proxy_path = $proxy_path; } elseif ($proxyType === ProxyTypes::CADDY->value) { $proxy_path = $proxy_path.'/caddy'; } elseif ($proxyType === ProxyTypes::NGINX->value) { $proxy_path = $proxy_path.'/nginx'; } return $proxy_path; } public function proxyType() { // $proxyType = $this->proxy->get('type'); // if ($proxyType === ProxyTypes::NONE->value) { // return $proxyType; // } // if (is_null($proxyType)) { // $this->proxy->type = ProxyTypes::TRAEFIK_V2->value; // $this->proxy->status = ProxyStatus::EXITED->value; // $this->save(); // } return data_get($this->proxy, 'type'); } public function scopeWithProxy(): Builder { return $this->proxy->modelScope(); } public function isLocalhost() { return $this->ip === 'host.docker.internal' || $this->id === 0; } public static function buildServers($teamId) { return Server::whereTeamId($teamId)->whereRelation('settings', 'is_reachable', true)->whereRelation('settings', 'is_build_server', true); } public function skipServer() { if ($this->ip === '1.2.3.4') { // ray('skipping 1.2.3.4'); return true; } if ($this->settings->force_disabled === true) { // ray('force_disabled'); return true; } return false; } public function isForceDisabled() { return $this->settings->force_disabled; } public function forceEnableServer() { $this->settings->update([ 'force_disabled' => false, ]); } public function forceDisableServer() { $this->settings->update([ 'force_disabled' => true, ]); $sshKeyFileLocation = "id.root@{$this->uuid}"; Storage::disk('ssh-keys')->delete($sshKeyFileLocation); Storage::disk('ssh-mux')->delete($this->muxFilename()); } public function isSentinelEnabled() { return $this->isMetricsEnabled() || $this->isServerApiEnabled(); } public function isMetricsEnabled() { return $this->settings->is_metrics_enabled; } public function isServerApiEnabled() { return $this->settings->is_server_api_enabled; } public function checkServerApi() { if ($this->isServerApiEnabled()) { $server_ip = $this->ip; if (isDev()) { if ($this->id === 0) { $server_ip = 'localhost'; } } $command = "curl -s http://{$server_ip}:12172/api/health"; $process = Process::timeout(5)->run($command); if ($process->failed()) { ray($process->exitCode(), $process->output(), $process->errorOutput()); throw new \Exception("Server API is not reachable on http://{$server_ip}:12172"); } } } public function checkSentinel() { // ray("Checking sentinel on server: {$this->name}"); if ($this->isSentinelEnabled()) { $sentinel_found = instant_remote_process(['docker inspect coolify-sentinel'], $this, false); $sentinel_found = json_decode($sentinel_found, true); $status = data_get($sentinel_found, '0.State.Status', 'exited'); if ($status !== 'running') { // ray('Sentinel is not running, starting it...'); PullSentinelImageJob::dispatch($this); } else { // ray('Sentinel is running'); } } } public function getCpuMetrics(int $mins = 5) { if ($this->isMetricsEnabled()) { $from = now()->subMinutes($mins)->toIso8601ZuluString(); $cpu = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl -H \"Authorization: Bearer {$this->settings->metrics_token}\" http://localhost:8888/api/cpu/history?from=$from'"], $this, false); if (str($cpu)->contains('error')) { $error = json_decode($cpu, true); $error = data_get($error, 'error', 'Something is not okay, are you okay?'); if ($error == 'Unauthorized') { $error = 'Unauthorized, please check your metrics token or restart Sentinel to set a new token.'; } throw new \Exception($error); } $cpu = str($cpu)->explode("\n")->skip(1)->all(); $parsedCollection = collect($cpu)->flatMap(function ($item) { return collect(explode("\n", trim($item)))->map(function ($line) { [$time, $cpu_usage_percent] = explode(',', trim($line)); $cpu_usage_percent = number_format($cpu_usage_percent, 0); return [(int) $time, (float) $cpu_usage_percent]; }); }); return $parsedCollection->toArray(); } } public function getMemoryMetrics(int $mins = 5) { if ($this->isMetricsEnabled()) { $from = now()->subMinutes($mins)->toIso8601ZuluString(); $memory = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl -H \"Authorization: Bearer {$this->settings->metrics_token}\" http://localhost:8888/api/memory/history?from=$from'"], $this, false); if (str($memory)->contains('error')) { $error = json_decode($memory, true); $error = data_get($error, 'error', 'Something is not okay, are you okay?'); if ($error == 'Unauthorized') { $error = 'Unauthorized, please check your metrics token or restart Sentinel to set a new token.'; } throw new \Exception($error); } $memory = str($memory)->explode("\n")->skip(1)->all(); $parsedCollection = collect($memory)->flatMap(function ($item) { return collect(explode("\n", trim($item)))->map(function ($line) { [$time, $used, $free, $usedPercent] = explode(',', trim($line)); $usedPercent = number_format($usedPercent, 0); return [(int) $time, (float) $usedPercent]; }); }); return $parsedCollection->toArray(); } } public function isServerReady(int $tries = 3) { if ($this->skipServer()) { return false; } $serverUptimeCheckNumber = $this->unreachable_count; if ($this->unreachable_count < $tries) { $serverUptimeCheckNumber = $this->unreachable_count + 1; } if ($this->unreachable_count > $tries) { $serverUptimeCheckNumber = $tries; } $serverUptimeCheckNumberMax = $tries; // ray('server: ' . $this->name); // ray('serverUptimeCheckNumber: ' . $serverUptimeCheckNumber); // ray('serverUptimeCheckNumberMax: ' . $serverUptimeCheckNumberMax); ['uptime' => $uptime] = $this->validateConnection(); if ($uptime) { if ($this->unreachable_notification_sent === true) { $this->update(['unreachable_notification_sent' => false]); } return true; } else { if ($serverUptimeCheckNumber >= $serverUptimeCheckNumberMax) { // Reached max number of retries if ($this->unreachable_notification_sent === false) { ray('Server unreachable, sending notification...'); // $this->team?->notify(new Unreachable($this)); $this->update(['unreachable_notification_sent' => true]); } if ($this->settings->is_reachable === true) { $this->settings()->update([ 'is_reachable' => false, ]); } foreach ($this->applications() as $application) { $application->update(['status' => 'exited']); } foreach ($this->databases() as $database) { $database->update(['status' => 'exited']); } foreach ($this->services()->get() as $service) { $apps = $service->applications()->get(); $dbs = $service->databases()->get(); foreach ($apps as $app) { $app->update(['status' => 'exited']); } foreach ($dbs as $db) { $db->update(['status' => 'exited']); } } } else { $this->update([ 'unreachable_count' => $this->unreachable_count + 1, ]); } return false; } } public function getDiskUsage() { return instant_remote_process(["df /| tail -1 | awk '{ print $5}' | sed 's/%//g'"], $this, false); } public function definedResources() { $applications = $this->applications(); $databases = $this->databases(); $services = $this->services(); return $applications->concat($databases)->concat($services->get()); } public function stopUnmanaged($id) { return instant_remote_process(["docker stop -t 0 $id"], $this); } public function restartUnmanaged($id) { return instant_remote_process(["docker restart $id"], $this); } public function startUnmanaged($id) { return instant_remote_process(["docker start $id"], $this); } public function getContainers(): Collection { $sentinel_found = instant_remote_process(['docker inspect coolify-sentinel'], $this, false); $sentinel_found = json_decode($sentinel_found, true); $status = data_get($sentinel_found, '0.State.Status', 'exited'); if ($status === 'running') { $containers = instant_remote_process(['docker exec coolify-sentinel sh -c "curl http://127.0.0.1:8888/api/containers"'], $this, false); if (is_null($containers)) { return collect([]); } $containers = data_get(json_decode($containers, true), 'containers', []); return collect($containers); } else { if ($this->isSwarm()) { $containers = instant_remote_process(["docker service inspect $(docker service ls -q) --format '{{json .}}'"], $this, false); } else { $containers = instant_remote_process(['docker container ls -q'], $this, false); if (! $containers) { return collect([]); } $containers = instant_remote_process(["docker container inspect $(docker container ls -q) --format '{{json .}}'"], $this, false); } if (is_null($containers)) { return collect([]); } return format_docker_command_output_to_json($containers); } } public function loadUnmanagedContainers(): Collection { if ($this->isFunctional()) { $containers = instant_remote_process(["docker ps -a --format '{{json .}}'"], $this); $containers = format_docker_command_output_to_json($containers); $containers = $containers->map(function ($container) { $labels = data_get($container, 'Labels'); if (! str($labels)->contains('coolify.managed')) { return $container; } return null; }); $containers = $containers->filter(); return collect($containers); } else { return collect([]); } } public function hasDefinedResources() { $applications = $this->applications()->count() > 0; $databases = $this->databases()->count() > 0; $services = $this->services()->count() > 0; if ($applications || $databases || $services) { return true; } return false; } public function databases() { return $this->destinations()->map(function ($standaloneDocker) { $postgresqls = data_get($standaloneDocker, 'postgresqls', collect([])); $redis = data_get($standaloneDocker, 'redis', collect([])); $mongodbs = data_get($standaloneDocker, 'mongodbs', collect([])); $mysqls = data_get($standaloneDocker, 'mysqls', collect([])); $mariadbs = data_get($standaloneDocker, 'mariadbs', collect([])); $keydbs = data_get($standaloneDocker, 'keydbs', collect([])); $dragonflies = data_get($standaloneDocker, 'dragonflies', collect([])); $clickhouses = data_get($standaloneDocker, 'clickhouses', collect([])); return $postgresqls->concat($redis)->concat($mongodbs)->concat($mysqls)->concat($mariadbs)->concat($keydbs)->concat($dragonflies)->concat($clickhouses); })->filter(function ($item) { return data_get($item, 'name') !== 'coolify-db'; })->flatten(); } public function applications() { $applications = $this->destinations()->map(function ($standaloneDocker) { return $standaloneDocker->applications; })->flatten(); $additionalApplicationIds = DB::table('additional_destinations')->where('server_id', $this->id)->get('application_id'); $additionalApplicationIds = collect($additionalApplicationIds)->map(function ($item) { return $item->application_id; }); Application::whereIn('id', $additionalApplicationIds)->get()->each(function ($application) use ($applications) { $applications->push($application); }); return $applications; } public function dockerComposeBasedApplications() { return $this->applications()->filter(function ($application) { return data_get($application, 'build_pack') === 'dockercompose'; }); } public function dockerComposeBasedPreviewDeployments() { return $this->previews()->filter(function ($preview) { $applicationId = data_get($preview, 'application_id'); $application = Application::find($applicationId); if (! $application) { return false; } return data_get($application, 'build_pack') === 'dockercompose'; }); } public function services() { return $this->hasMany(Service::class); } public function getIp(): Attribute { return Attribute::make( get: function () { if (isDev()) { return '127.0.0.1'; } if ($this->isLocalhost()) { return base_ip(); } return $this->ip; } ); } public function previews() { return $this->destinations()->map(function ($standaloneDocker) { return $standaloneDocker->applications->map(function ($application) { return $application->previews; })->flatten(); })->flatten(); } public function destinations() { $standalone_docker = $this->hasMany(StandaloneDocker::class)->get(); $swarm_docker = $this->hasMany(SwarmDocker::class)->get(); // $additional_dockers = $this->belongsToMany(StandaloneDocker::class, 'additional_destinations')->withPivot('server_id')->get(); // return $standalone_docker->concat($swarm_docker)->concat($additional_dockers); return $standalone_docker->concat($swarm_docker); } public function standaloneDockers() { return $this->hasMany(StandaloneDocker::class); } public function swarmDockers() { return $this->hasMany(SwarmDocker::class); } public function privateKey() { return $this->belongsTo(PrivateKey::class); } public function muxFilename() { return "{$this->ip}_{$this->port}_{$this->user}"; } public function team() { return $this->belongsTo(Team::class); } public function isProxyShouldRun() { if ($this->proxyType() === ProxyTypes::NONE->value || $this->settings->is_build_server) { return false; } return true; } public function isFunctional() { $isFunctional = $this->settings->is_reachable && $this->settings->is_usable && ! $this->settings->force_disabled; ['private_key_filename' => $private_key_filename, 'mux_filename' => $mux_filename] = server_ssh_configuration($this); if (! $isFunctional) { Storage::disk('ssh-keys')->delete($private_key_filename); Storage::disk('ssh-mux')->delete($mux_filename); } return $isFunctional; } public function isLogDrainEnabled() { return $this->settings->is_logdrain_newrelic_enabled || $this->settings->is_logdrain_highlight_enabled || $this->settings->is_logdrain_axiom_enabled || $this->settings->is_logdrain_custom_enabled; } public function validateOS(): bool|Stringable { $os_release = instant_remote_process(['cat /etc/os-release'], $this); $releaseLines = collect(explode("\n", $os_release)); $collectedData = collect([]); foreach ($releaseLines as $line) { $item = str($line)->trim(); $collectedData->put($item->before('=')->value(), $item->after('=')->lower()->replace('"', '')->value()); } $ID = data_get($collectedData, 'ID'); // $ID_LIKE = data_get($collectedData, 'ID_LIKE'); // $VERSION_ID = data_get($collectedData, 'VERSION_ID'); $supported = collect(SUPPORTED_OS)->filter(function ($supportedOs) use ($ID) { if (str($supportedOs)->contains($ID)) { return str($ID); } }); if ($supported->count() === 1) { // ray('supported'); return str($supported->first()); } else { // ray('not supported'); return false; } } public function isSwarm() { return data_get($this, 'settings.is_swarm_manager') || data_get($this, 'settings.is_swarm_worker'); } public function isSwarmManager() { return data_get($this, 'settings.is_swarm_manager'); } public function isSwarmWorker() { return data_get($this, 'settings.is_swarm_worker'); } public function validateConnection() { config()->set('coolify.mux_enabled', false); $server = Server::find($this->id); if (! $server) { return ['uptime' => false, 'error' => 'Server not found.']; } if ($server->skipServer()) { return ['uptime' => false, 'error' => 'Server skipped.']; } try { // EC2 does not have `uptime` command, lol instant_remote_process(['ls /'], $server); $server->settings()->update([ 'is_reachable' => true, ]); $server->update([ 'unreachable_count' => 0, ]); if (data_get($server, 'unreachable_notification_sent') === true) { // $server->team?->notify(new Revived($server)); $server->update(['unreachable_notification_sent' => false]); } return ['uptime' => true, 'error' => null]; } catch (\Throwable $e) { $server->settings()->update([ 'is_reachable' => false, ]); return ['uptime' => false, 'error' => $e->getMessage()]; } } public function installDocker() { $activity = InstallDocker::run($this); return $activity; } public function validateDockerEngine($throwError = false) { $dockerBinary = instant_remote_process(['command -v docker'], $this, false, no_sudo: true); if (is_null($dockerBinary)) { $this->settings->is_usable = false; $this->settings->save(); if ($throwError) { throw new \Exception('Server is not usable. Docker Engine is not installed.'); } return false; } try { instant_remote_process(['docker version'], $this); } catch (\Throwable $e) { $this->settings->is_usable = false; $this->settings->save(); if ($throwError) { throw new \Exception('Server is not usable. Docker Engine is not running.'); } return false; } $this->settings->is_usable = true; $this->settings->save(); $this->validateCoolifyNetwork(isSwarm: false, isBuildServer: $this->settings->is_build_server); return true; } public function validateDockerCompose($throwError = false) { $dockerCompose = instant_remote_process(['docker compose version'], $this, false); if (is_null($dockerCompose)) { $this->settings->is_usable = false; $this->settings->save(); if ($throwError) { throw new \Exception('Server is not usable. Docker Compose is not installed.'); } return false; } $this->settings->is_usable = true; $this->settings->save(); return true; } public function validateDockerSwarm() { $swarmStatus = instant_remote_process(['docker info|grep -i swarm'], $this, false); $swarmStatus = str($swarmStatus)->trim()->after(':')->trim(); if ($swarmStatus === 'inactive') { throw new \Exception('Docker Swarm is not initiated. Please join the server to a swarm before continuing.'); return false; } $this->settings->is_usable = true; $this->settings->save(); $this->validateCoolifyNetwork(isSwarm: true); return true; } public function validateDockerEngineVersion() { $dockerVersionRaw = instant_remote_process(['docker version --format json'], $this, false); $dockerVersionJson = json_decode($dockerVersionRaw, true); $dockerVersion = data_get($dockerVersionJson, 'Server.Version', '0.0.0'); $dockerVersion = checkMinimumDockerEngineVersion($dockerVersion); if (is_null($dockerVersion)) { $this->settings->is_usable = false; $this->settings->save(); return false; } $this->settings->is_reachable = true; $this->settings->is_usable = true; $this->settings->save(); return true; } public function validateCoolifyNetwork($isSwarm = false, $isBuildServer = false) { if ($isBuildServer) { return; } if ($isSwarm) { return instant_remote_process(['docker network create --attachable --driver overlay coolify-overlay >/dev/null 2>&1 || true'], $this, false); } else { return instant_remote_process(['docker network create coolify --attachable >/dev/null 2>&1 || true'], $this, false); } } public function isNonRoot() { if ($this->user instanceof Stringable) { return $this->user->value() !== 'root'; } return $this->user !== 'root'; } public function isBuildServer() { return $this->settings->is_build_server; } }