a336dae84c
feat: multiline envs
589 lines
23 KiB
PHP
589 lines
23 KiB
PHP
<?php
|
|
|
|
use App\Enums\ProxyTypes;
|
|
use App\Models\Application;
|
|
use App\Models\ApplicationPreview;
|
|
use App\Models\Server;
|
|
use App\Models\ServiceApplication;
|
|
use Illuminate\Support\Collection;
|
|
use Illuminate\Support\Str;
|
|
use Spatie\Url\Url;
|
|
|
|
function getCurrentApplicationContainerStatus(Server $server, int $id, ?int $pullRequestId = null, ?bool $includePullrequests = false): Collection
|
|
{
|
|
$containers = collect([]);
|
|
if (!$server->isSwarm()) {
|
|
$containers = instant_remote_process(["docker ps -a --filter='label=coolify.applicationId={$id}' --format '{{json .}}' "], $server);
|
|
$containers = format_docker_command_output_to_json($containers);
|
|
$containers = $containers->map(function ($container) use ($pullRequestId, $includePullrequests) {
|
|
$labels = data_get($container, 'Labels');
|
|
if (!str($labels)->contains("coolify.pullRequestId=")) {
|
|
data_set($container, 'Labels', $labels . ",coolify.pullRequestId={$pullRequestId}");
|
|
return $container;
|
|
}
|
|
if ($includePullrequests) {
|
|
return $container;
|
|
}
|
|
if (str($labels)->contains("coolify.pullRequestId=$pullRequestId")) {
|
|
return $container;
|
|
}
|
|
return null;
|
|
});
|
|
$containers = $containers->filter();
|
|
return $containers;
|
|
}
|
|
return $containers;
|
|
}
|
|
|
|
function format_docker_command_output_to_json($rawOutput): Collection
|
|
{
|
|
$outputLines = explode(PHP_EOL, $rawOutput);
|
|
if (count($outputLines) === 1) {
|
|
$outputLines = collect($outputLines[0]);
|
|
} else {
|
|
$outputLines = collect($outputLines);
|
|
}
|
|
return $outputLines
|
|
->reject(fn ($line) => empty($line))
|
|
->map(fn ($outputLine) => json_decode($outputLine, true, flags: JSON_THROW_ON_ERROR));
|
|
}
|
|
|
|
function format_docker_labels_to_json(string|array $rawOutput): Collection
|
|
{
|
|
if (is_array($rawOutput)) {
|
|
return collect($rawOutput);
|
|
}
|
|
$outputLines = explode(PHP_EOL, $rawOutput);
|
|
|
|
return collect($outputLines)
|
|
->reject(fn ($line) => empty($line))
|
|
->map(function ($outputLine) {
|
|
$outputArray = explode(',', $outputLine);
|
|
return collect($outputArray)
|
|
->map(function ($outputLine) {
|
|
return explode('=', $outputLine);
|
|
})
|
|
->mapWithKeys(function ($outputLine) {
|
|
return [$outputLine[0] => $outputLine[1]];
|
|
});
|
|
})[0];
|
|
}
|
|
|
|
function format_docker_envs_to_json($rawOutput)
|
|
{
|
|
try {
|
|
$outputLines = json_decode($rawOutput, true, flags: JSON_THROW_ON_ERROR);
|
|
return collect(data_get($outputLines[0], 'Config.Env', []))->mapWithKeys(function ($env) {
|
|
$env = explode('=', $env);
|
|
return [$env[0] => $env[1]];
|
|
});
|
|
} catch (\Throwable $e) {
|
|
return collect([]);
|
|
}
|
|
}
|
|
function checkMinimumDockerEngineVersion($dockerVersion)
|
|
{
|
|
$majorDockerVersion = Str::of($dockerVersion)->before('.')->value();
|
|
if ($majorDockerVersion <= 22) {
|
|
$dockerVersion = null;
|
|
}
|
|
return $dockerVersion;
|
|
}
|
|
function executeInDocker(string $containerId, string $command)
|
|
{
|
|
return "docker exec {$containerId} bash -c '{$command}'";
|
|
// return "docker exec {$this->deployment_uuid} bash -c '{$command} |& tee -a /proc/1/fd/1; [ \$PIPESTATUS -eq 0 ] || exit \$PIPESTATUS'";
|
|
}
|
|
|
|
function getContainerStatus(Server $server, string $container_id, bool $all_data = false, bool $throwError = false)
|
|
{
|
|
if ($server->isSwarm()) {
|
|
$container = instant_remote_process(["docker service ls --filter 'name={$container_id}' --format '{{json .}}' "], $server, $throwError);
|
|
} else {
|
|
$container = instant_remote_process(["docker inspect --format '{{json .}}' {$container_id}"], $server, $throwError);
|
|
}
|
|
if (!$container) {
|
|
return 'exited';
|
|
}
|
|
$container = format_docker_command_output_to_json($container);
|
|
if ($all_data) {
|
|
return $container[0];
|
|
}
|
|
if ($server->isSwarm()) {
|
|
$replicas = data_get($container[0], 'Replicas');
|
|
$replicas = explode('/', $replicas);
|
|
$active = (int)$replicas[0];
|
|
$total = (int)$replicas[1];
|
|
if ($active === $total) {
|
|
return 'running';
|
|
} else {
|
|
return 'starting';
|
|
}
|
|
} else {
|
|
return data_get($container[0], 'State.Status', 'exited');
|
|
}
|
|
}
|
|
|
|
function generateApplicationContainerName(Application $application, $pull_request_id = 0)
|
|
{
|
|
$consistent_container_name = $application->settings->is_consistent_container_name_enabled;
|
|
$now = now()->format('Hisu');
|
|
if ($pull_request_id !== 0 && $pull_request_id !== null) {
|
|
return $application->uuid . '-pr-' . $pull_request_id;
|
|
} else {
|
|
if ($consistent_container_name) {
|
|
return $application->uuid;
|
|
}
|
|
return $application->uuid . '-' . $now;
|
|
}
|
|
}
|
|
function get_port_from_dockerfile($dockerfile): int|null
|
|
{
|
|
$dockerfile_array = explode("\n", $dockerfile);
|
|
$found_exposed_port = null;
|
|
foreach ($dockerfile_array as $line) {
|
|
$line_str = Str::of($line)->trim();
|
|
if ($line_str->startsWith('EXPOSE')) {
|
|
$found_exposed_port = $line_str->replace('EXPOSE', '')->trim();
|
|
break;
|
|
}
|
|
}
|
|
if ($found_exposed_port) {
|
|
return (int)$found_exposed_port->value();
|
|
}
|
|
return null;
|
|
}
|
|
|
|
function defaultLabels($id, $name, $pull_request_id = 0, string $type = 'application', $subType = null, $subId = null)
|
|
{
|
|
$labels = collect([]);
|
|
$labels->push('coolify.managed=true');
|
|
$labels->push('coolify.version=' . config('version'));
|
|
$labels->push("coolify." . $type . "Id=" . $id);
|
|
$labels->push("coolify.type=$type");
|
|
$labels->push('coolify.name=' . $name);
|
|
$labels->push('coolify.pullRequestId=' . $pull_request_id);
|
|
if ($type === 'service') {
|
|
$subId && $labels->push('coolify.service.subId=' . $subId);
|
|
$subType && $labels->push('coolify.service.subType=' . $subType);
|
|
}
|
|
return $labels;
|
|
}
|
|
function generateServiceSpecificFqdns(ServiceApplication|Application $resource, $forTraefik = false)
|
|
{
|
|
if ($resource->getMorphClass() === 'App\Models\ServiceApplication') {
|
|
$uuid = $resource->uuid;
|
|
$server = $resource->service->server;
|
|
$environment_variables = $resource->service->environment_variables;
|
|
$type = $resource->serviceType();
|
|
} else if ($resource->getMorphClass() === 'App\Models\Application') {
|
|
$uuid = $resource->uuid;
|
|
$server = $resource->destination->server;
|
|
$environment_variables = $resource->environment_variables;
|
|
$type = $resource->serviceType();
|
|
}
|
|
$variables = collect($environment_variables);
|
|
$payload = collect([]);
|
|
switch ($type) {
|
|
case $type?->contains('minio'):
|
|
$MINIO_BROWSER_REDIRECT_URL = $variables->where('key', 'MINIO_BROWSER_REDIRECT_URL')->first();
|
|
$MINIO_SERVER_URL = $variables->where('key', 'MINIO_SERVER_URL')->first();
|
|
if (is_null($MINIO_BROWSER_REDIRECT_URL) || is_null($MINIO_SERVER_URL)) {
|
|
return $payload;
|
|
}
|
|
if (is_null($MINIO_BROWSER_REDIRECT_URL?->value)) {
|
|
$MINIO_BROWSER_REDIRECT_URL?->update([
|
|
"value" => generateFqdn($server, 'console-' . $uuid)
|
|
]);
|
|
}
|
|
if (is_null($MINIO_SERVER_URL?->value)) {
|
|
$MINIO_SERVER_URL?->update([
|
|
"value" => generateFqdn($server, 'minio-' . $uuid)
|
|
]);
|
|
}
|
|
if ($forTraefik) {
|
|
$payload = collect([
|
|
$MINIO_BROWSER_REDIRECT_URL->value . ':9001',
|
|
$MINIO_SERVER_URL->value . ':9000',
|
|
]);
|
|
} else {
|
|
$payload = collect([
|
|
$MINIO_BROWSER_REDIRECT_URL->value,
|
|
$MINIO_SERVER_URL->value,
|
|
]);
|
|
}
|
|
break;
|
|
}
|
|
return $payload;
|
|
}
|
|
function fqdnLabelsForCaddy(string $network, string $uuid, Collection $domains, bool $is_force_https_enabled = false, $onlyPort = null, ?Collection $serviceLabels = null, ?bool $is_gzip_enabled = true, ?bool $is_stripprefix_enabled = true, ?string $service_name = null)
|
|
{
|
|
$labels = collect([]);
|
|
if ($serviceLabels) {
|
|
$labels->push("caddy_ingress_network={$uuid}");
|
|
} else {
|
|
$labels->push("caddy_ingress_network={$network}");
|
|
}
|
|
foreach ($domains as $loop => $domain) {
|
|
$loop = $loop;
|
|
$url = Url::fromString($domain);
|
|
$host = $url->getHost();
|
|
$path = $url->getPath();
|
|
// $stripped_path = str($path)->replaceEnd('/', '');
|
|
|
|
$schema = $url->getScheme();
|
|
$port = $url->getPort();
|
|
if (is_null($port) && !is_null($onlyPort)) {
|
|
$port = $onlyPort;
|
|
}
|
|
$labels->push("caddy_{$loop}={$schema}://{$host}");
|
|
$labels->push("caddy_{$loop}.header=-Server");
|
|
$labels->push("caddy_{$loop}.try_files={path} /index.html /index.php");
|
|
|
|
if ($port) {
|
|
$labels->push("caddy_{$loop}.handle_path.{$loop}_reverse_proxy={{upstreams $port}}");
|
|
} else {
|
|
$labels->push("caddy_{$loop}.handle_path.{$loop}_reverse_proxy={{upstreams}}");
|
|
}
|
|
$labels->push("caddy_{$loop}.handle_path={$path}*");
|
|
if ($is_gzip_enabled) {
|
|
$labels->push("caddy_{$loop}.encode=zstd gzip");
|
|
}
|
|
if (isDev()) {
|
|
// $labels->push("caddy_{$loop}.tls=internal");
|
|
}
|
|
}
|
|
return $labels->sort();
|
|
}
|
|
function fqdnLabelsForTraefik(string $uuid, Collection $domains, bool $is_force_https_enabled = false, $onlyPort = null, ?Collection $serviceLabels = null, ?bool $is_gzip_enabled = true, ?bool $is_stripprefix_enabled = true, ?string $service_name = null)
|
|
{
|
|
$labels = collect([]);
|
|
$labels->push('traefik.enable=true');
|
|
$labels->push("traefik.http.middlewares.gzip.compress=true");
|
|
$labels->push("traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https");
|
|
|
|
$basic_auth = false;
|
|
$basic_auth_middleware = null;
|
|
$redirect = false;
|
|
$redirect_middleware = null;
|
|
if ($serviceLabels) {
|
|
$basic_auth = $serviceLabels->contains(function ($value) {
|
|
return str_contains($value, 'basicauth');
|
|
});
|
|
if ($basic_auth) {
|
|
$basic_auth_middleware = $serviceLabels
|
|
->map(function ($item) {
|
|
if (preg_match('/traefik\.http\.middlewares\.(.*?)\.basicauth\.users/', $item, $matches)) {
|
|
return $matches[1];
|
|
}
|
|
})
|
|
->filter()
|
|
->first();
|
|
}
|
|
$redirect = $serviceLabels->contains(function ($value) {
|
|
return str_contains($value, 'redirectregex');
|
|
});
|
|
if ($redirect) {
|
|
$redirect_middleware = $serviceLabels
|
|
->map(function ($item) {
|
|
if (preg_match('/traefik\.http\.middlewares\.(.*?)\.redirectregex\.regex/', $item, $matches)) {
|
|
return $matches[1];
|
|
}
|
|
})
|
|
->filter()
|
|
->first();
|
|
}
|
|
}
|
|
foreach ($domains as $loop => $domain) {
|
|
try {
|
|
// $uuid = new Cuid2(7);
|
|
$url = Url::fromString($domain);
|
|
$host = $url->getHost();
|
|
$path = $url->getPath();
|
|
$schema = $url->getScheme();
|
|
$port = $url->getPort();
|
|
if (is_null($port) && !is_null($onlyPort)) {
|
|
$port = $onlyPort;
|
|
}
|
|
$http_label = "http-{$loop}-{$uuid}";
|
|
$https_label = "https-{$loop}-{$uuid}";
|
|
if ($service_name) {
|
|
$http_label = "http-{$loop}-{$uuid}-{$service_name}";
|
|
$https_label = "https-{$loop}-{$uuid}-{$service_name}";
|
|
}
|
|
|
|
if ($schema === 'https') {
|
|
// Set labels for https
|
|
$labels->push("traefik.http.routers.{$https_label}.rule=Host(`{$host}`) && PathPrefix(`{$path}`)");
|
|
$labels->push("traefik.http.routers.{$https_label}.entryPoints=https");
|
|
if ($port) {
|
|
$labels->push("traefik.http.routers.{$https_label}.service={$https_label}");
|
|
$labels->push("traefik.http.services.{$https_label}.loadbalancer.server.port=$port");
|
|
}
|
|
if ($path !== '/') {
|
|
if ($is_stripprefix_enabled) {
|
|
$labels->push("traefik.http.middlewares.{$https_label}-stripprefix.stripprefix.prefixes={$path}");
|
|
$middlewares = collect(["{$https_label}-stripprefix"]);
|
|
}
|
|
if ($is_gzip_enabled) {
|
|
$middlewares->push('gzip');
|
|
}
|
|
if ($basic_auth && $basic_auth_middleware) {
|
|
$middlewares->push($basic_auth_middleware);
|
|
}
|
|
if ($redirect && $redirect_middleware) {
|
|
$middlewares->push($redirect_middleware);
|
|
}
|
|
if ($middlewares->isNotEmpty()) {
|
|
$middlewares = $middlewares->join(',');
|
|
$labels->push("traefik.http.routers.{$https_label}.middlewares={$middlewares}");
|
|
}
|
|
} else {
|
|
$middlewares = collect([]);
|
|
if ($is_gzip_enabled) {
|
|
$middlewares->push('gzip');
|
|
}
|
|
if ($basic_auth && $basic_auth_middleware) {
|
|
$middlewares->push($basic_auth_middleware);
|
|
}
|
|
if ($redirect && $redirect_middleware) {
|
|
$middlewares->push($redirect_middleware);
|
|
}
|
|
if ($middlewares->isNotEmpty()) {
|
|
$middlewares = $middlewares->join(',');
|
|
$labels->push("traefik.http.routers.{$https_label}.middlewares={$middlewares}");
|
|
}
|
|
}
|
|
$labels->push("traefik.http.routers.{$https_label}.tls=true");
|
|
$labels->push("traefik.http.routers.{$https_label}.tls.certresolver=letsencrypt");
|
|
|
|
// Set labels for http (redirect to https)
|
|
$labels->push("traefik.http.routers.{$http_label}.rule=Host(`{$host}`) && PathPrefix(`{$path}`)");
|
|
$labels->push("traefik.http.routers.{$http_label}.entryPoints=http");
|
|
if ($port) {
|
|
$labels->push("traefik.http.services.{$http_label}.loadbalancer.server.port=$port");
|
|
$labels->push("traefik.http.routers.{$http_label}.service={$http_label}");
|
|
}
|
|
if ($is_force_https_enabled) {
|
|
$labels->push("traefik.http.routers.{$http_label}.middlewares=redirect-to-https");
|
|
}
|
|
} else {
|
|
// Set labels for http
|
|
$labels->push("traefik.http.routers.{$http_label}.rule=Host(`{$host}`) && PathPrefix(`{$path}`)");
|
|
$labels->push("traefik.http.routers.{$http_label}.entryPoints=http");
|
|
if ($port) {
|
|
$labels->push("traefik.http.services.{$http_label}.loadbalancer.server.port=$port");
|
|
$labels->push("traefik.http.routers.{$http_label}.service={$http_label}");
|
|
}
|
|
if ($path !== '/') {
|
|
if ($is_stripprefix_enabled) {
|
|
$labels->push("traefik.http.middlewares.{$http_label}-stripprefix.stripprefix.prefixes={$path}");
|
|
$middlewares = collect(["{$http_label}-stripprefix"]);
|
|
}
|
|
if ($is_gzip_enabled) {
|
|
$middlewares->push('gzip');
|
|
}
|
|
if ($basic_auth && $basic_auth_middleware) {
|
|
$middlewares->push($basic_auth_middleware);
|
|
}
|
|
if ($redirect && $redirect_middleware) {
|
|
$middlewares->push($redirect_middleware);
|
|
}
|
|
if ($middlewares->isNotEmpty()) {
|
|
$middlewares = $middlewares->join(',');
|
|
$labels->push("traefik.http.routers.{$http_label}.middlewares={$middlewares}");
|
|
}
|
|
} else {
|
|
$middlewares = collect([]);
|
|
if ($is_gzip_enabled) {
|
|
$middlewares->push('gzip');
|
|
}
|
|
if ($basic_auth && $basic_auth_middleware) {
|
|
$middlewares->push($basic_auth_middleware);
|
|
}
|
|
if ($redirect && $redirect_middleware) {
|
|
$middlewares->push($redirect_middleware);
|
|
}
|
|
if ($middlewares->isNotEmpty()) {
|
|
$middlewares = $middlewares->join(',');
|
|
$labels->push("traefik.http.routers.{$http_label}.middlewares={$middlewares}");
|
|
}
|
|
}
|
|
}
|
|
} catch (\Throwable $e) {
|
|
continue;
|
|
}
|
|
}
|
|
return $labels->sort();
|
|
}
|
|
function generateLabelsApplication(Application $application, ?ApplicationPreview $preview = null): array
|
|
{
|
|
$ports = $application->settings->is_static ? [80] : $application->ports_exposes_array;
|
|
$onlyPort = null;
|
|
if (count($ports) > 0) {
|
|
$onlyPort = $ports[0];
|
|
}
|
|
$pull_request_id = data_get($preview, 'pull_request_id', 0);
|
|
$appUuid = $application->uuid;
|
|
if ($pull_request_id !== 0) {
|
|
$appUuid = $appUuid . '-pr-' . $pull_request_id;
|
|
}
|
|
$labels = collect([]);
|
|
if ($application->fqdn) {
|
|
if ($pull_request_id !== 0) {
|
|
$domains = Str::of(data_get($preview, 'fqdn'))->explode(',');
|
|
} else {
|
|
$domains = Str::of(data_get($application, 'fqdn'))->explode(',');
|
|
}
|
|
// Add Traefik labels
|
|
$labels = $labels->merge(fqdnLabelsForTraefik(
|
|
uuid: $appUuid,
|
|
domains: $domains,
|
|
onlyPort: $onlyPort,
|
|
is_force_https_enabled: $application->isForceHttpsEnabled(),
|
|
is_gzip_enabled: $application->isGzipEnabled(),
|
|
is_stripprefix_enabled: $application->isStripprefixEnabled()
|
|
));
|
|
// Add Caddy labels
|
|
$labels = $labels->merge(fqdnLabelsForCaddy(
|
|
network: $application->destination->network,
|
|
uuid: $appUuid,
|
|
domains: $domains,
|
|
onlyPort: $onlyPort,
|
|
is_force_https_enabled: $application->isForceHttpsEnabled(),
|
|
is_gzip_enabled: $application->isGzipEnabled(),
|
|
is_stripprefix_enabled: $application->isStripprefixEnabled()
|
|
));
|
|
}
|
|
return $labels->all();
|
|
}
|
|
|
|
function isDatabaseImage(?string $image = null)
|
|
{
|
|
if (is_null($image)) {
|
|
return false;
|
|
}
|
|
$image = str($image);
|
|
if ($image->contains(':')) {
|
|
$image = str($image);
|
|
} else {
|
|
$image = str($image)->append(':latest');
|
|
}
|
|
$imageName = $image->before(':');
|
|
if (collect(DATABASE_DOCKER_IMAGES)->contains($imageName)) {
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
function convert_docker_run_to_compose(?string $custom_docker_run_options = null)
|
|
{
|
|
$options = [];
|
|
$compose_options = collect([]);
|
|
preg_match_all('/(--\w+(?:-\w+)*)(?:\s|=)?([^\s-]+)?/', $custom_docker_run_options, $matches, PREG_SET_ORDER);
|
|
$list_options = collect([
|
|
'--cap-add',
|
|
'--cap-drop',
|
|
'--security-opt',
|
|
'--sysctl',
|
|
'--ulimit',
|
|
'--device',
|
|
]);
|
|
$mapping = collect([
|
|
'--cap-add' => 'cap_add',
|
|
'--cap-drop' => 'cap_drop',
|
|
'--security-opt' => 'security_opt',
|
|
'--sysctl' => 'sysctls',
|
|
'--ulimit' => 'ulimits',
|
|
'--device' => 'devices',
|
|
'--init' => 'init',
|
|
'--ulimit' => 'ulimits',
|
|
'--privileged' => 'privileged',
|
|
'--ip' => 'ip',
|
|
]);
|
|
foreach ($matches as $match) {
|
|
$option = $match[1];
|
|
if (isset($match[2]) && $match[2] !== '') {
|
|
$value = $match[2];
|
|
$options[$option][] = $value;
|
|
$options[$option] = array_unique($options[$option]);
|
|
} else {
|
|
$value = true;
|
|
$options[$option] = $value;
|
|
}
|
|
}
|
|
$options = collect($options);
|
|
// Easily get mappings from https://github.com/composerize/composerize/blob/master/packages/composerize/src/mappings.js
|
|
foreach ($options as $option => $value) {
|
|
if (!data_get($mapping, $option)) {
|
|
continue;
|
|
}
|
|
if ($option === '--ulimit') {
|
|
$ulimits = collect([]);
|
|
collect($value)->map(function ($ulimit) use ($ulimits) {
|
|
$ulimit = explode('=', $ulimit);
|
|
$type = $ulimit[0];
|
|
$limits = explode(':', $ulimit[1]);
|
|
if (count($limits) == 2) {
|
|
$soft_limit = $limits[0];
|
|
$hard_limit = $limits[1];
|
|
$ulimits->put($type, [
|
|
'soft' => $soft_limit,
|
|
'hard' => $hard_limit
|
|
]);
|
|
} else {
|
|
$soft_limit = $ulimit[1];
|
|
$ulimits->put($type, [
|
|
'soft' => $soft_limit,
|
|
]);
|
|
}
|
|
});
|
|
$compose_options->put($mapping[$option], $ulimits);
|
|
} else {
|
|
if ($list_options->contains($option)) {
|
|
if ($compose_options->has($mapping[$option])) {
|
|
$compose_options->put($mapping[$option], $options->get($mapping[$option]) . ',' . $value);
|
|
} else {
|
|
$compose_options->put($mapping[$option], $value);
|
|
}
|
|
continue;
|
|
} else {
|
|
$compose_options->put($mapping[$option], $value);
|
|
continue;
|
|
}
|
|
$compose_options->forget($option);
|
|
}
|
|
}
|
|
return $compose_options->toArray();
|
|
}
|
|
|
|
function validateComposeFile(string $compose, int $server_id): string|Throwable
|
|
{
|
|
return 'OK';
|
|
try {
|
|
$uuid = Str::random(10);
|
|
$server = Server::findOrFail($server_id);
|
|
$base64_compose = base64_encode($compose);
|
|
$output = instant_remote_process([
|
|
"echo {$base64_compose} | base64 -d > /tmp/{$uuid}.yml",
|
|
"docker compose -f /tmp/{$uuid}.yml config",
|
|
], $server);
|
|
ray($output);
|
|
return 'OK';
|
|
} catch (\Throwable $e) {
|
|
ray($e);
|
|
return $e->getMessage();
|
|
} finally {
|
|
instant_remote_process([
|
|
"rm /tmp/{$uuid}.yml",
|
|
], $server);
|
|
}
|
|
}
|
|
|
|
function escapeEnvVariables($value)
|
|
{
|
|
$search = array("\\", "\r", "\t", "\x0", '"', "'", "$");
|
|
$replace = array("\\\\", "\\r", "\\t", "\\0", '\"', "\'", "$$");
|
|
return str_replace($search, $replace, $value);
|
|
}
|