1543 lines
42 KiB
TypeScript
1543 lines
42 KiB
TypeScript
import child from 'child_process';
|
|
import util from 'util';
|
|
import fs from 'fs/promises';
|
|
import yaml from 'js-yaml';
|
|
import forge from 'node-forge';
|
|
import { uniqueNamesGenerator, adjectives, colors, animals } from 'unique-names-generator';
|
|
import type { Config } from 'unique-names-generator';
|
|
import generator from 'generate-password';
|
|
import crypto from 'crypto';
|
|
import { promises as dns } from 'dns';
|
|
import { PrismaClient } from '@prisma/client';
|
|
import cuid from 'cuid';
|
|
|
|
import { checkContainer, getEngine, removeContainer } from './docker';
|
|
import { day } from './dayjs';
|
|
import * as serviceFields from './serviceFields'
|
|
import axios from 'axios';
|
|
|
|
export const version = '3.1.1';
|
|
export const isDev = process.env.NODE_ENV === 'development';
|
|
|
|
const algorithm = 'aes-256-ctr';
|
|
const customConfig: Config = {
|
|
dictionaries: [adjectives, colors, animals],
|
|
style: 'capital',
|
|
separator: ' ',
|
|
length: 3
|
|
};
|
|
|
|
export const defaultProxyImage = `coolify-haproxy-alpine:latest`;
|
|
export const defaultProxyImageTcp = `coolify-haproxy-tcp-alpine:latest`;
|
|
export const defaultProxyImageHttp = `coolify-haproxy-http-alpine:latest`;
|
|
export const defaultTraefikImage = `traefik:v2.6`;
|
|
export function getAPIUrl() {
|
|
if (process.env.GITPOD_WORKSPACE_URL) {
|
|
const { href } = new URL(process.env.GITPOD_WORKSPACE_URL)
|
|
const newURL = href.replace('https://', 'https://3001-').replace(/\/$/, '')
|
|
return newURL
|
|
}
|
|
return isDev ? 'http://localhost:3001' : 'http://localhost:3000';
|
|
}
|
|
export function getUIUrl() {
|
|
if (process.env.GITPOD_WORKSPACE_URL) {
|
|
const { href } = new URL(process.env.GITPOD_WORKSPACE_URL)
|
|
const newURL = href.replace('https://', 'https://3000-').replace(/\/$/, '')
|
|
return newURL
|
|
}
|
|
return 'http://localhost:3000';
|
|
}
|
|
|
|
const mainTraefikEndpoint = isDev
|
|
? `${getAPIUrl()}/webhooks/traefik/main.json`
|
|
: 'http://coolify:3000/webhooks/traefik/main.json';
|
|
|
|
const otherTraefikEndpoint = isDev
|
|
? `${getAPIUrl()}/webhooks/traefik/other.json`
|
|
: 'http://coolify:3000/webhooks/traefik/other.json';
|
|
|
|
|
|
export const include: any = {
|
|
destinationDocker: true,
|
|
persistentStorage: true,
|
|
serviceSecret: true,
|
|
minio: true,
|
|
plausibleAnalytics: true,
|
|
vscodeserver: true,
|
|
wordpress: true,
|
|
ghost: true,
|
|
meiliSearch: true,
|
|
umami: true,
|
|
hasura: true,
|
|
fider: true
|
|
};
|
|
|
|
export const uniqueName = (): string => uniqueNamesGenerator(customConfig);
|
|
export const asyncExecShell = util.promisify(child.exec);
|
|
export const asyncSleep = (delay: number): Promise<unknown> =>
|
|
new Promise((resolve) => setTimeout(resolve, delay));
|
|
export const prisma = new PrismaClient({
|
|
errorFormat: 'minimal'
|
|
});
|
|
|
|
export const base64Encode = (text: string): string => {
|
|
return Buffer.from(text).toString('base64');
|
|
};
|
|
export const base64Decode = (text: string): string => {
|
|
return Buffer.from(text, 'base64').toString('ascii');
|
|
};
|
|
export const decrypt = (hashString: string) => {
|
|
if (hashString) {
|
|
const hash = JSON.parse(hashString);
|
|
const decipher = crypto.createDecipheriv(
|
|
algorithm,
|
|
process.env['COOLIFY_SECRET_KEY'],
|
|
Buffer.from(hash.iv, 'hex')
|
|
);
|
|
const decrpyted = Buffer.concat([
|
|
decipher.update(Buffer.from(hash.content, 'hex')),
|
|
decipher.final()
|
|
]);
|
|
return decrpyted.toString();
|
|
}
|
|
};
|
|
export const encrypt = (text: string) => {
|
|
if (text) {
|
|
const iv = crypto.randomBytes(16);
|
|
const cipher = crypto.createCipheriv(algorithm, process.env['COOLIFY_SECRET_KEY'], iv);
|
|
const encrypted = Buffer.concat([cipher.update(text), cipher.final()]);
|
|
return JSON.stringify({
|
|
iv: iv.toString('hex'),
|
|
content: encrypted.toString('hex')
|
|
});
|
|
}
|
|
};
|
|
export async function checkDoubleBranch(branch: string, projectId: number): Promise<boolean> {
|
|
const applications = await prisma.application.findMany({ where: { branch, projectId } });
|
|
return applications.length > 1;
|
|
}
|
|
export async function isDNSValid(hostname: any, domain: string): Promise<any> {
|
|
const { isIP } = await import('is-ip');
|
|
let resolves = [];
|
|
try {
|
|
if (isIP(hostname)) {
|
|
resolves = [hostname];
|
|
} else {
|
|
resolves = await dns.resolve4(hostname);
|
|
}
|
|
} catch (error) {
|
|
throw 'Invalid DNS.'
|
|
}
|
|
|
|
try {
|
|
let ipDomainFound = false;
|
|
dns.setServers(['1.1.1.1', '8.8.8.8']);
|
|
const dnsResolve = await dns.resolve4(domain);
|
|
if (dnsResolve.length > 0) {
|
|
for (const ip of dnsResolve) {
|
|
if (resolves.includes(ip)) {
|
|
ipDomainFound = true;
|
|
}
|
|
}
|
|
}
|
|
if (!ipDomainFound) throw false;
|
|
} catch (error) {
|
|
throw 'DNS not set'
|
|
}
|
|
}
|
|
|
|
|
|
export function getDomain(domain: string): string {
|
|
return domain?.replace('https://', '').replace('http://', '');
|
|
}
|
|
|
|
export async function isDomainConfigured({
|
|
id,
|
|
fqdn,
|
|
checkOwn = false
|
|
}: {
|
|
id: string;
|
|
fqdn: string;
|
|
checkOwn?: boolean;
|
|
}): Promise<boolean> {
|
|
const domain = getDomain(fqdn);
|
|
const nakedDomain = domain.replace('www.', '');
|
|
const foundApp = await prisma.application.findFirst({
|
|
where: {
|
|
OR: [
|
|
{ fqdn: { endsWith: `//${nakedDomain}` } },
|
|
{ fqdn: { endsWith: `//www.${nakedDomain}` } }
|
|
],
|
|
id: { not: id }
|
|
},
|
|
select: { fqdn: true }
|
|
});
|
|
const foundService = await prisma.service.findFirst({
|
|
where: {
|
|
OR: [
|
|
{ fqdn: { endsWith: `//${nakedDomain}` } },
|
|
{ fqdn: { endsWith: `//www.${nakedDomain}` } },
|
|
{ minio: { apiFqdn: { endsWith: `//${nakedDomain}` } } },
|
|
{ minio: { apiFqdn: { endsWith: `//www.${nakedDomain}` } } }
|
|
],
|
|
id: { not: checkOwn ? undefined : id }
|
|
},
|
|
select: { fqdn: true }
|
|
});
|
|
|
|
const coolifyFqdn = await prisma.setting.findFirst({
|
|
where: {
|
|
OR: [
|
|
{ fqdn: { endsWith: `//${nakedDomain}` } },
|
|
{ fqdn: { endsWith: `//www.${nakedDomain}` } }
|
|
],
|
|
id: { not: id }
|
|
},
|
|
select: { fqdn: true }
|
|
});
|
|
return !!(foundApp || foundService || coolifyFqdn);
|
|
}
|
|
|
|
export async function getContainerUsage(engine: string, container: string): Promise<any> {
|
|
const host = getEngine(engine);
|
|
try {
|
|
const { stdout } = await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker container stats ${container} --no-stream --no-trunc --format "{{json .}}"`
|
|
);
|
|
return JSON.parse(stdout);
|
|
} catch (err) {
|
|
return {
|
|
MemUsage: 0,
|
|
CPUPerc: 0,
|
|
NetIO: 0
|
|
};
|
|
}
|
|
}
|
|
|
|
export async function checkDomainsIsValidInDNS({ hostname, fqdn, dualCerts }): Promise<any> {
|
|
const { isIP } = await import('is-ip');
|
|
const domain = getDomain(fqdn);
|
|
const domainDualCert = domain.includes('www.') ? domain.replace('www.', '') : `www.${domain}`;
|
|
dns.setServers(['1.1.1.1', '8.8.8.8']);
|
|
let resolves = [];
|
|
try {
|
|
if (isIP(hostname)) {
|
|
resolves = [hostname];
|
|
} else {
|
|
resolves = await dns.resolve4(hostname);
|
|
}
|
|
} catch (error) {
|
|
throw { status: 500, message: `Could not determine IP address for ${hostname}.` }
|
|
}
|
|
|
|
if (dualCerts) {
|
|
try {
|
|
const ipDomain = await dns.resolve4(domain);
|
|
const ipDomainDualCert = await dns.resolve4(domainDualCert);
|
|
|
|
let ipDomainFound = false;
|
|
let ipDomainDualCertFound = false;
|
|
|
|
for (const ip of ipDomain) {
|
|
if (resolves.includes(ip)) {
|
|
ipDomainFound = true;
|
|
}
|
|
}
|
|
for (const ip of ipDomainDualCert) {
|
|
if (resolves.includes(ip)) {
|
|
ipDomainDualCertFound = true;
|
|
}
|
|
}
|
|
if (ipDomainFound && ipDomainDualCertFound) return { status: 200 };
|
|
throw { status: 500, message: `DNS not set correctly or propogated.<br>Please check your DNS settings.` }
|
|
} catch (error) {
|
|
throw { status: 500, message: `DNS not set correctly or propogated.<br>Please check your DNS settings.` }
|
|
}
|
|
} else {
|
|
try {
|
|
const ipDomain = await dns.resolve4(domain);
|
|
let ipDomainFound = false;
|
|
for (const ip of ipDomain) {
|
|
if (resolves.includes(ip)) {
|
|
ipDomainFound = true;
|
|
}
|
|
}
|
|
if (ipDomainFound) return { status: 200 };
|
|
throw { status: 500, message: `DNS not set correctly or propogated.<br>Please check your DNS settings.` }
|
|
} catch (error) {
|
|
throw { status: 500, message: `DNS not set correctly or propogated.<br>Please check your DNS settings.` }
|
|
}
|
|
}
|
|
}
|
|
export function generateTimestamp(): string {
|
|
return `${day().format('HH:mm:ss.SSS')}`;
|
|
}
|
|
|
|
export async function listServicesWithIncludes(): Promise<any> {
|
|
return await prisma.service.findMany({
|
|
include,
|
|
orderBy: { createdAt: 'desc' }
|
|
});
|
|
}
|
|
|
|
export const supportedDatabaseTypesAndVersions = [
|
|
{
|
|
name: 'mongodb',
|
|
fancyName: 'MongoDB',
|
|
baseImage: 'bitnami/mongodb',
|
|
versions: ['5.0', '4.4', '4.2']
|
|
},
|
|
{ name: 'mysql', fancyName: 'MySQL', baseImage: 'bitnami/mysql', versions: ['8.0', '5.7'] },
|
|
{
|
|
name: 'mariadb',
|
|
fancyName: 'MariaDB',
|
|
baseImage: 'bitnami/mariadb',
|
|
versions: ['10.7', '10.6', '10.5', '10.4', '10.3', '10.2']
|
|
},
|
|
{
|
|
name: 'postgresql',
|
|
fancyName: 'PostgreSQL',
|
|
baseImage: 'bitnami/postgresql',
|
|
versions: ['14.4.0', '13.6.0', '12.10.0', '11.15.0', '10.20.0']
|
|
},
|
|
{
|
|
name: 'redis',
|
|
fancyName: 'Redis',
|
|
baseImage: 'bitnami/redis',
|
|
versions: ['6.2', '6.0', '5.0']
|
|
},
|
|
{ name: 'couchdb', fancyName: 'CouchDB', baseImage: 'bitnami/couchdb', versions: ['3.2.1'] }
|
|
];
|
|
export const supportedServiceTypesAndVersions = [
|
|
{
|
|
name: 'plausibleanalytics',
|
|
fancyName: 'Plausible Analytics',
|
|
baseImage: 'plausible/analytics',
|
|
images: ['bitnami/postgresql:13.2.0', 'yandex/clickhouse-server:21.3.2.5'],
|
|
versions: ['latest', 'stable'],
|
|
recommendedVersion: 'stable',
|
|
ports: {
|
|
main: 8000
|
|
}
|
|
},
|
|
{
|
|
name: 'nocodb',
|
|
fancyName: 'NocoDB',
|
|
baseImage: 'nocodb/nocodb',
|
|
versions: ['latest'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 8080
|
|
}
|
|
},
|
|
{
|
|
name: 'minio',
|
|
fancyName: 'MinIO',
|
|
baseImage: 'minio/minio',
|
|
versions: ['latest'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 9001
|
|
}
|
|
},
|
|
{
|
|
name: 'vscodeserver',
|
|
fancyName: 'VSCode Server',
|
|
baseImage: 'codercom/code-server',
|
|
versions: ['latest'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 8080
|
|
}
|
|
},
|
|
{
|
|
name: 'wordpress',
|
|
fancyName: 'Wordpress',
|
|
baseImage: 'wordpress',
|
|
images: ['bitnami/mysql:5.7'],
|
|
versions: ['latest', 'php8.1', 'php8.0', 'php7.4', 'php7.3'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 80
|
|
}
|
|
},
|
|
{
|
|
name: 'vaultwarden',
|
|
fancyName: 'Vaultwarden',
|
|
baseImage: 'vaultwarden/server',
|
|
versions: ['latest'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 80
|
|
}
|
|
},
|
|
{
|
|
name: 'languagetool',
|
|
fancyName: 'LanguageTool',
|
|
baseImage: 'silviof/docker-languagetool',
|
|
versions: ['latest'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 8010
|
|
}
|
|
},
|
|
{
|
|
name: 'n8n',
|
|
fancyName: 'n8n',
|
|
baseImage: 'n8nio/n8n',
|
|
versions: ['latest'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 5678
|
|
}
|
|
},
|
|
{
|
|
name: 'uptimekuma',
|
|
fancyName: 'Uptime Kuma',
|
|
baseImage: 'louislam/uptime-kuma',
|
|
versions: ['latest'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 3001
|
|
}
|
|
},
|
|
{
|
|
name: 'ghost',
|
|
fancyName: 'Ghost',
|
|
baseImage: 'bitnami/ghost',
|
|
images: ['bitnami/mariadb'],
|
|
versions: ['latest'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 2368
|
|
}
|
|
},
|
|
{
|
|
name: 'meilisearch',
|
|
fancyName: 'Meilisearch',
|
|
baseImage: 'getmeili/meilisearch',
|
|
images: [],
|
|
versions: ['latest'],
|
|
recommendedVersion: 'latest',
|
|
ports: {
|
|
main: 7700
|
|
}
|
|
},
|
|
{
|
|
name: 'umami',
|
|
fancyName: 'Umami',
|
|
baseImage: 'ghcr.io/mikecao/umami',
|
|
images: ['postgres:12-alpine'],
|
|
versions: ['postgresql-latest'],
|
|
recommendedVersion: 'postgresql-latest',
|
|
ports: {
|
|
main: 3000
|
|
}
|
|
},
|
|
{
|
|
name: 'hasura',
|
|
fancyName: 'Hasura',
|
|
baseImage: 'hasura/graphql-engine',
|
|
images: ['postgres:12-alpine'],
|
|
versions: ['latest', 'v2.8.3'],
|
|
recommendedVersion: 'v2.8.3',
|
|
ports: {
|
|
main: 8080
|
|
}
|
|
},
|
|
{
|
|
name: 'fider',
|
|
fancyName: 'Fider',
|
|
baseImage: 'getfider/fider',
|
|
images: ['postgres:12-alpine'],
|
|
versions: ['stable'],
|
|
recommendedVersion: 'stable',
|
|
ports: {
|
|
main: 3000
|
|
}
|
|
// },
|
|
// {
|
|
// name: 'appwrite',
|
|
// fancyName: 'AppWrite',
|
|
// baseImage: 'appwrite/appwrite',
|
|
// images: ['appwrite/influxdb', 'appwrite/telegraf', 'mariadb:10.7', 'redis:6.0-alpine3.12'],
|
|
// versions: ['latest', '0.13.0'],
|
|
// recommendedVersion: '0.13.0',
|
|
// ports: {
|
|
// main: 3000
|
|
// }
|
|
// }
|
|
}
|
|
];
|
|
|
|
export async function startTraefikProxy(engine: string): Promise<void> {
|
|
const host = getEngine(engine);
|
|
const found = await checkContainer(engine, 'coolify-proxy', true);
|
|
const { proxyPassword, proxyUser, id } = await listSettings();
|
|
if (!found) {
|
|
const { stdout: Config } = await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker network inspect bridge --format '{{json .IPAM.Config }}'`
|
|
);
|
|
const ip = JSON.parse(Config)[0].Gateway;
|
|
await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker run --restart always \
|
|
--add-host 'host.docker.internal:host-gateway' \
|
|
--add-host 'host.docker.internal:${ip}' \
|
|
-v coolify-traefik-letsencrypt:/etc/traefik/acme \
|
|
-v /var/run/docker.sock:/var/run/docker.sock \
|
|
--network coolify-infra \
|
|
-p "80:80" \
|
|
-p "443:443" \
|
|
--name coolify-proxy \
|
|
-d ${defaultTraefikImage} \
|
|
--entrypoints.web.address=:80 \
|
|
--entrypoints.web.forwardedHeaders.insecure=true \
|
|
--entrypoints.websecure.address=:443 \
|
|
--entrypoints.websecure.forwardedHeaders.insecure=true \
|
|
--providers.docker=true \
|
|
--providers.docker.exposedbydefault=false \
|
|
--providers.http.endpoint=${mainTraefikEndpoint} \
|
|
--providers.http.pollTimeout=5s \
|
|
--certificatesresolvers.letsencrypt.acme.httpchallenge=true \
|
|
--certificatesresolvers.letsencrypt.acme.storage=/etc/traefik/acme/acme.json \
|
|
--certificatesresolvers.letsencrypt.acme.httpchallenge.entrypoint=web \
|
|
--log.level=error`
|
|
);
|
|
await prisma.setting.update({ where: { id }, data: { proxyHash: null } });
|
|
await prisma.destinationDocker.updateMany({
|
|
where: { engine },
|
|
data: { isCoolifyProxyUsed: true }
|
|
});
|
|
}
|
|
await configureNetworkTraefikProxy(engine);
|
|
}
|
|
|
|
export async function configureNetworkTraefikProxy(engine: string): Promise<void> {
|
|
const host = getEngine(engine);
|
|
const destinations = await prisma.destinationDocker.findMany({ where: { engine } });
|
|
const { stdout: networks } = await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker ps -a --filter name=coolify-proxy --format '{{json .Networks}}'`
|
|
);
|
|
const configuredNetworks = networks.replace(/"/g, '').replace('\n', '').split(',');
|
|
for (const destination of destinations) {
|
|
if (!configuredNetworks.includes(destination.network)) {
|
|
await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker network connect ${destination.network} coolify-proxy`
|
|
);
|
|
}
|
|
}
|
|
}
|
|
|
|
export async function stopTraefikProxy(
|
|
engine: string
|
|
): Promise<{ stdout: string; stderr: string } | Error> {
|
|
const host = getEngine(engine);
|
|
const found = await checkContainer(engine, 'coolify-proxy');
|
|
await prisma.destinationDocker.updateMany({
|
|
where: { engine },
|
|
data: { isCoolifyProxyUsed: false }
|
|
});
|
|
const { id } = await prisma.setting.findFirst({});
|
|
await prisma.setting.update({ where: { id }, data: { proxyHash: null } });
|
|
try {
|
|
if (found) {
|
|
await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker stop -t 0 coolify-proxy && docker rm coolify-proxy`
|
|
);
|
|
}
|
|
} catch (error) {
|
|
return error;
|
|
}
|
|
}
|
|
|
|
export async function startCoolifyProxy(engine: string): Promise<void> {
|
|
const host = getEngine(engine);
|
|
const found = await checkContainer(engine, 'coolify-haproxy', true);
|
|
const { proxyPassword, proxyUser, id } = await listSettings();
|
|
if (!found) {
|
|
const { stdout: Config } = await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker network inspect bridge --format '{{json .IPAM.Config }}'`
|
|
);
|
|
const ip = JSON.parse(Config)[0].Gateway;
|
|
await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker run -e HAPROXY_USERNAME=${proxyUser} -e HAPROXY_PASSWORD=${proxyPassword} --restart always --add-host 'host.docker.internal:host-gateway' --add-host 'host.docker.internal:${ip}' -v coolify-ssl-certs:/usr/local/etc/haproxy/ssl --network coolify-infra -p "80:80" -p "443:443" -p "8404:8404" -p "5555:5555" -p "5000:5000" --name coolify-haproxy -d coollabsio/${defaultProxyImage}`
|
|
);
|
|
await prisma.setting.update({ where: { id }, data: { proxyHash: null } });
|
|
await prisma.destinationDocker.updateMany({
|
|
where: { engine },
|
|
data: { isCoolifyProxyUsed: true }
|
|
});
|
|
}
|
|
await configureNetworkCoolifyProxy(engine);
|
|
}
|
|
|
|
export async function configureNetworkCoolifyProxy(engine: string): Promise<void> {
|
|
const host = getEngine(engine);
|
|
const destinations = await prisma.destinationDocker.findMany({ where: { engine } });
|
|
const { stdout: networks } = await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker ps -a --filter name=coolify-haproxy --format '{{json .Networks}}'`
|
|
);
|
|
const configuredNetworks = networks.replace(/"/g, '').replace('\n', '').split(',');
|
|
for (const destination of destinations) {
|
|
if (!configuredNetworks.includes(destination.network)) {
|
|
await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker network connect ${destination.network} coolify-haproxy`
|
|
);
|
|
}
|
|
}
|
|
}
|
|
export async function listSettings(): Promise<any> {
|
|
const settings = await prisma.setting.findFirst({});
|
|
if (settings.proxyPassword) settings.proxyPassword = decrypt(settings.proxyPassword);
|
|
return settings;
|
|
}
|
|
|
|
|
|
|
|
// export async function stopCoolifyProxy(
|
|
// engine: string
|
|
// ): Promise<{ stdout: string; stderr: string } | Error> {
|
|
// const host = getEngine(engine);
|
|
// const found = await checkContainer(engine, 'coolify-haproxy');
|
|
// await prisma.destinationDocker.updateMany({
|
|
// where: { engine },
|
|
// data: { isCoolifyProxyUsed: false }
|
|
// });
|
|
// const { id } = await prisma.setting.findFirst({});
|
|
// await prisma.setting.update({ where: { id }, data: { proxyHash: null } });
|
|
// try {
|
|
// if (found) {
|
|
// await asyncExecShell(
|
|
// `DOCKER_HOST="${host}" docker stop -t 0 coolify-haproxy && docker rm coolify-haproxy`
|
|
// );
|
|
// }
|
|
// } catch (error) {
|
|
// return error;
|
|
// }
|
|
// }
|
|
|
|
export function generatePassword(length = 24, symbols = false): string {
|
|
return generator.generate({
|
|
length,
|
|
numbers: true,
|
|
strict: true,
|
|
symbols
|
|
});
|
|
}
|
|
|
|
export function generateDatabaseConfiguration(database: any):
|
|
| {
|
|
volume: string;
|
|
image: string;
|
|
ulimits: Record<string, unknown>;
|
|
privatePort: number;
|
|
environmentVariables: {
|
|
MYSQL_DATABASE: string;
|
|
MYSQL_PASSWORD: string;
|
|
MYSQL_ROOT_USER: string;
|
|
MYSQL_USER: string;
|
|
MYSQL_ROOT_PASSWORD: string;
|
|
};
|
|
}
|
|
| {
|
|
volume: string;
|
|
image: string;
|
|
ulimits: Record<string, unknown>;
|
|
privatePort: number;
|
|
environmentVariables: {
|
|
MONGODB_ROOT_USER: string;
|
|
MONGODB_ROOT_PASSWORD: string;
|
|
};
|
|
}
|
|
| {
|
|
volume: string;
|
|
image: string;
|
|
ulimits: Record<string, unknown>;
|
|
privatePort: number;
|
|
environmentVariables: {
|
|
MARIADB_ROOT_USER: string;
|
|
MARIADB_ROOT_PASSWORD: string;
|
|
MARIADB_USER: string;
|
|
MARIADB_PASSWORD: string;
|
|
MARIADB_DATABASE: string;
|
|
};
|
|
}
|
|
| {
|
|
volume: string;
|
|
image: string;
|
|
ulimits: Record<string, unknown>;
|
|
privatePort: number;
|
|
environmentVariables: {
|
|
POSTGRESQL_POSTGRES_PASSWORD: string;
|
|
POSTGRESQL_USERNAME: string;
|
|
POSTGRESQL_PASSWORD: string;
|
|
POSTGRESQL_DATABASE: string;
|
|
};
|
|
}
|
|
| {
|
|
volume: string;
|
|
image: string;
|
|
ulimits: Record<string, unknown>;
|
|
privatePort: number;
|
|
environmentVariables: {
|
|
REDIS_AOF_ENABLED: string;
|
|
REDIS_PASSWORD: string;
|
|
};
|
|
}
|
|
| {
|
|
volume: string;
|
|
image: string;
|
|
ulimits: Record<string, unknown>;
|
|
privatePort: number;
|
|
environmentVariables: {
|
|
COUCHDB_PASSWORD: string;
|
|
COUCHDB_USER: string;
|
|
};
|
|
} {
|
|
const {
|
|
id,
|
|
dbUser,
|
|
dbUserPassword,
|
|
rootUser,
|
|
rootUserPassword,
|
|
defaultDatabase,
|
|
version,
|
|
type,
|
|
settings: { appendOnly }
|
|
} = database;
|
|
const baseImage = getDatabaseImage(type);
|
|
if (type === 'mysql') {
|
|
return {
|
|
privatePort: 3306,
|
|
environmentVariables: {
|
|
MYSQL_USER: dbUser,
|
|
MYSQL_PASSWORD: dbUserPassword,
|
|
MYSQL_ROOT_PASSWORD: rootUserPassword,
|
|
MYSQL_ROOT_USER: rootUser,
|
|
MYSQL_DATABASE: defaultDatabase
|
|
},
|
|
image: `${baseImage}:${version}`,
|
|
volume: `${id}-${type}-data:/bitnami/mysql/data`,
|
|
ulimits: {}
|
|
};
|
|
} else if (type === 'mariadb') {
|
|
return {
|
|
privatePort: 3306,
|
|
environmentVariables: {
|
|
MARIADB_ROOT_USER: rootUser,
|
|
MARIADB_ROOT_PASSWORD: rootUserPassword,
|
|
MARIADB_USER: dbUser,
|
|
MARIADB_PASSWORD: dbUserPassword,
|
|
MARIADB_DATABASE: defaultDatabase
|
|
},
|
|
image: `${baseImage}:${version}`,
|
|
volume: `${id}-${type}-data:/bitnami/mariadb`,
|
|
ulimits: {}
|
|
};
|
|
} else if (type === 'mongodb') {
|
|
return {
|
|
privatePort: 27017,
|
|
environmentVariables: {
|
|
MONGODB_ROOT_USER: rootUser,
|
|
MONGODB_ROOT_PASSWORD: rootUserPassword
|
|
},
|
|
image: `${baseImage}:${version}`,
|
|
volume: `${id}-${type}-data:/bitnami/mongodb`,
|
|
ulimits: {}
|
|
};
|
|
} else if (type === 'postgresql') {
|
|
return {
|
|
privatePort: 5432,
|
|
environmentVariables: {
|
|
POSTGRESQL_POSTGRES_PASSWORD: rootUserPassword,
|
|
POSTGRESQL_PASSWORD: dbUserPassword,
|
|
POSTGRESQL_USERNAME: dbUser,
|
|
POSTGRESQL_DATABASE: defaultDatabase
|
|
},
|
|
image: `${baseImage}:${version}`,
|
|
volume: `${id}-${type}-data:/bitnami/postgresql`,
|
|
ulimits: {}
|
|
};
|
|
} else if (type === 'redis') {
|
|
return {
|
|
privatePort: 6379,
|
|
environmentVariables: {
|
|
REDIS_PASSWORD: dbUserPassword,
|
|
REDIS_AOF_ENABLED: appendOnly ? 'yes' : 'no'
|
|
},
|
|
image: `${baseImage}:${version}`,
|
|
volume: `${id}-${type}-data:/bitnami/redis/data`,
|
|
ulimits: {}
|
|
};
|
|
} else if (type === 'couchdb') {
|
|
return {
|
|
privatePort: 5984,
|
|
environmentVariables: {
|
|
COUCHDB_PASSWORD: dbUserPassword,
|
|
COUCHDB_USER: dbUser
|
|
},
|
|
image: `${baseImage}:${version}`,
|
|
volume: `${id}-${type}-data:/bitnami/couchdb`,
|
|
ulimits: {}
|
|
};
|
|
}
|
|
}
|
|
|
|
export function getDatabaseImage(type: string): string {
|
|
const found = supportedDatabaseTypesAndVersions.find((t) => t.name === type);
|
|
if (found) {
|
|
return found.baseImage;
|
|
}
|
|
return '';
|
|
}
|
|
|
|
export function getDatabaseVersions(type: string): string[] {
|
|
const found = supportedDatabaseTypesAndVersions.find((t) => t.name === type);
|
|
if (found) {
|
|
return found.versions;
|
|
}
|
|
return [];
|
|
}
|
|
|
|
|
|
export type ComposeFile = {
|
|
version: ComposerFileVersion;
|
|
services: Record<string, ComposeFileService>;
|
|
networks: Record<string, ComposeFileNetwork>;
|
|
volumes?: Record<string, ComposeFileVolume>;
|
|
};
|
|
|
|
export type ComposeFileService = {
|
|
container_name: string;
|
|
image?: string;
|
|
networks: string[];
|
|
environment?: Record<string, unknown>;
|
|
volumes?: string[];
|
|
ulimits?: unknown;
|
|
labels?: string[];
|
|
env_file?: string[];
|
|
extra_hosts?: string[];
|
|
restart: ComposeFileRestartOption;
|
|
depends_on?: string[];
|
|
command?: string;
|
|
ports?: string[];
|
|
build?: {
|
|
context: string;
|
|
dockerfile: string;
|
|
args?: Record<string, unknown>;
|
|
};
|
|
deploy?: {
|
|
restart_policy?: {
|
|
condition?: string;
|
|
delay?: string;
|
|
max_attempts?: number;
|
|
window?: string;
|
|
};
|
|
};
|
|
};
|
|
|
|
export type ComposerFileVersion =
|
|
| '3.8'
|
|
| '3.7'
|
|
| '3.6'
|
|
| '3.5'
|
|
| '3.4'
|
|
| '3.3'
|
|
| '3.2'
|
|
| '3.1'
|
|
| '3.0'
|
|
| '2.4'
|
|
| '2.3'
|
|
| '2.2'
|
|
| '2.1'
|
|
| '2.0';
|
|
|
|
export type ComposeFileRestartOption = 'no' | 'always' | 'on-failure' | 'unless-stopped';
|
|
|
|
export type ComposeFileNetwork = {
|
|
external: boolean;
|
|
};
|
|
|
|
export type ComposeFileVolume = {
|
|
external?: boolean;
|
|
name?: string;
|
|
};
|
|
|
|
export async function makeLabelForStandaloneDatabase({ id, image, volume }) {
|
|
const database = await prisma.database.findFirst({ where: { id } });
|
|
delete database.destinationDockerId;
|
|
delete database.createdAt;
|
|
delete database.updatedAt;
|
|
return [
|
|
'coolify.managed=true',
|
|
`coolify.version=${version}`,
|
|
`coolify.type=standalone-database`,
|
|
`coolify.configuration=${base64Encode(
|
|
JSON.stringify({
|
|
version,
|
|
image,
|
|
volume,
|
|
...database
|
|
})
|
|
)}`
|
|
];
|
|
}
|
|
export const createDirectories = async ({
|
|
repository,
|
|
buildId
|
|
}: {
|
|
repository: string;
|
|
buildId: string;
|
|
}): Promise<{ workdir: string; repodir: string }> => {
|
|
const repodir = `/tmp/build-sources/${repository}/`;
|
|
const workdir = `/tmp/build-sources/${repository}/${buildId}`;
|
|
|
|
await asyncExecShell(`mkdir -p ${workdir}`);
|
|
|
|
return {
|
|
workdir,
|
|
repodir
|
|
};
|
|
};
|
|
|
|
export async function startTcpProxy(
|
|
destinationDocker: any,
|
|
id: string,
|
|
publicPort: number,
|
|
privatePort: number
|
|
): Promise<{ stdout: string; stderr: string } | Error> {
|
|
const { network, engine } = destinationDocker;
|
|
const host = getEngine(engine);
|
|
|
|
const containerName = `haproxy-for-${publicPort}`;
|
|
const found = await checkContainer(engine, containerName, true);
|
|
const foundDependentContainer = await checkContainer(engine, id, true);
|
|
try {
|
|
if (foundDependentContainer && !found) {
|
|
const { stdout: Config } = await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker network inspect bridge --format '{{json .IPAM.Config }}'`
|
|
);
|
|
const ip = JSON.parse(Config)[0].Gateway;
|
|
return await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker run --restart always -e PORT=${publicPort} -e APP=${id} -e PRIVATE_PORT=${privatePort} --add-host 'host.docker.internal:host-gateway' --add-host 'host.docker.internal:${ip}' --network ${network} -p ${publicPort}:${publicPort} --name ${containerName} -d coollabsio/${defaultProxyImageTcp}`
|
|
);
|
|
}
|
|
if (!foundDependentContainer && found) {
|
|
return await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker stop -t 0 ${containerName} && docker rm ${containerName}`
|
|
);
|
|
}
|
|
} catch (error) {
|
|
return error;
|
|
}
|
|
}
|
|
|
|
|
|
export async function stopDatabaseContainer(
|
|
database: any
|
|
): Promise<boolean> {
|
|
let everStarted = false;
|
|
const {
|
|
id,
|
|
destinationDockerId,
|
|
destinationDocker: { engine }
|
|
} = database;
|
|
if (destinationDockerId) {
|
|
try {
|
|
const host = getEngine(engine);
|
|
const { stdout } = await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker inspect --format '{{json .State}}' ${id}`
|
|
);
|
|
if (stdout) {
|
|
everStarted = true;
|
|
await removeContainer({ id, engine });
|
|
}
|
|
} catch (error) {
|
|
//
|
|
}
|
|
}
|
|
return everStarted;
|
|
}
|
|
|
|
|
|
export async function stopTcpHttpProxy(
|
|
id: string,
|
|
destinationDocker: any,
|
|
publicPort: number,
|
|
forceName: string = null
|
|
): Promise<{ stdout: string; stderr: string } | Error> {
|
|
const { engine } = destinationDocker;
|
|
const host = getEngine(engine);
|
|
const settings = await listSettings();
|
|
let containerName = `${id}-${publicPort}`;
|
|
if (!settings.isTraefikUsed) {
|
|
containerName = `haproxy-for-${publicPort}`;
|
|
}
|
|
if (forceName) containerName = forceName;
|
|
const found = await checkContainer(engine, containerName);
|
|
|
|
try {
|
|
if (found) {
|
|
return await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker stop -t 0 ${containerName} && docker rm ${containerName}`
|
|
);
|
|
}
|
|
} catch (error) {
|
|
return error;
|
|
}
|
|
}
|
|
|
|
|
|
export async function updatePasswordInDb(database, user, newPassword, isRoot) {
|
|
const {
|
|
id,
|
|
type,
|
|
rootUser,
|
|
rootUserPassword,
|
|
dbUser,
|
|
dbUserPassword,
|
|
defaultDatabase,
|
|
destinationDockerId,
|
|
destinationDocker: { engine }
|
|
} = database;
|
|
if (destinationDockerId) {
|
|
const host = getEngine(engine);
|
|
if (type === 'mysql') {
|
|
await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker exec ${id} mysql -u ${rootUser} -p${rootUserPassword} -e \"ALTER USER '${user}'@'%' IDENTIFIED WITH caching_sha2_password BY '${newPassword}';\"`
|
|
);
|
|
} else if (type === 'mariadb') {
|
|
await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker exec ${id} mysql -u ${rootUser} -p${rootUserPassword} -e \"SET PASSWORD FOR '${user}'@'%' = PASSWORD('${newPassword}');\"`
|
|
);
|
|
} else if (type === 'postgresql') {
|
|
if (isRoot) {
|
|
await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker exec ${id} psql postgresql://postgres:${rootUserPassword}@${id}:5432/${defaultDatabase} -c "ALTER role postgres WITH PASSWORD '${newPassword}'"`
|
|
);
|
|
} else {
|
|
await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker exec ${id} psql postgresql://${dbUser}:${dbUserPassword}@${id}:5432/${defaultDatabase} -c "ALTER role ${user} WITH PASSWORD '${newPassword}'"`
|
|
);
|
|
}
|
|
} else if (type === 'mongodb') {
|
|
await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker exec ${id} mongo 'mongodb://${rootUser}:${rootUserPassword}@${id}:27017/admin?readPreference=primary&ssl=false' --eval "db.changeUserPassword('${user}','${newPassword}')"`
|
|
);
|
|
} else if (type === 'redis') {
|
|
await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker exec ${id} redis-cli -u redis://${dbUserPassword}@${id}:6379 --raw CONFIG SET requirepass ${newPassword}`
|
|
);
|
|
}
|
|
}
|
|
}
|
|
|
|
export async function getFreePort() {
|
|
const { default: getPort, portNumbers } = await import('get-port');
|
|
const data = await prisma.setting.findFirst();
|
|
const { minPort, maxPort } = data;
|
|
|
|
const dbUsed = await (
|
|
await prisma.database.findMany({
|
|
where: { publicPort: { not: null } },
|
|
select: { publicPort: true }
|
|
})
|
|
).map((a) => a.publicPort);
|
|
const wpFtpUsed = await (
|
|
await prisma.wordpress.findMany({
|
|
where: { ftpPublicPort: { not: null } },
|
|
select: { ftpPublicPort: true }
|
|
})
|
|
).map((a) => a.ftpPublicPort);
|
|
const wpUsed = await (
|
|
await prisma.wordpress.findMany({
|
|
where: { mysqlPublicPort: { not: null } },
|
|
select: { mysqlPublicPort: true }
|
|
})
|
|
).map((a) => a.mysqlPublicPort);
|
|
const minioUsed = await (
|
|
await prisma.minio.findMany({
|
|
where: { publicPort: { not: null } },
|
|
select: { publicPort: true }
|
|
})
|
|
).map((a) => a.publicPort);
|
|
const usedPorts = [...dbUsed, ...wpFtpUsed, ...wpUsed, ...minioUsed];
|
|
return await getPort({ port: portNumbers(minPort, maxPort), exclude: usedPorts });
|
|
}
|
|
|
|
|
|
export async function startTraefikTCPProxy(
|
|
destinationDocker: any,
|
|
id: string,
|
|
publicPort: number,
|
|
privatePort: number,
|
|
type?: string
|
|
): Promise<{ stdout: string; stderr: string } | Error> {
|
|
const { network, engine } = destinationDocker;
|
|
const host = getEngine(engine);
|
|
const containerName = `${id}-${publicPort}`;
|
|
const found = await checkContainer(engine, containerName, true);
|
|
let dependentId = id;
|
|
if (type === 'wordpressftp') dependentId = `${id}-ftp`;
|
|
const foundDependentContainer = await checkContainer(engine, dependentId, true);
|
|
try {
|
|
if (foundDependentContainer && !found) {
|
|
const { stdout: Config } = await asyncExecShell(
|
|
`DOCKER_HOST="${host}" docker network inspect bridge --format '{{json .IPAM.Config }}'`
|
|
);
|
|
const ip = JSON.parse(Config)[0].Gateway;
|
|
const tcpProxy = {
|
|
version: '3.5',
|
|
services: {
|
|
[`${id}-${publicPort}`]: {
|
|
container_name: containerName,
|
|
image: 'traefik:v2.6',
|
|
command: [
|
|
`--entrypoints.tcp.address=:${publicPort}`,
|
|
`--entryPoints.tcp.forwardedHeaders.insecure=true`,
|
|
`--providers.http.endpoint=${otherTraefikEndpoint}?id=${id}&privatePort=${privatePort}&publicPort=${publicPort}&type=tcp&address=${dependentId}`,
|
|
'--providers.http.pollTimeout=2s',
|
|
'--log.level=error'
|
|
],
|
|
ports: [`${publicPort}:${publicPort}`],
|
|
extra_hosts: ['host.docker.internal:host-gateway', `host.docker.internal:${ip}`],
|
|
volumes: ['/var/run/docker.sock:/var/run/docker.sock'],
|
|
networks: ['coolify-infra', network]
|
|
}
|
|
},
|
|
networks: {
|
|
[network]: {
|
|
external: false,
|
|
name: network
|
|
},
|
|
'coolify-infra': {
|
|
external: false,
|
|
name: 'coolify-infra'
|
|
}
|
|
}
|
|
};
|
|
await fs.writeFile(`/tmp/docker-compose-${id}.yaml`, yaml.dump(tcpProxy));
|
|
await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker compose -f /tmp/docker-compose-${id}.yaml up -d`
|
|
);
|
|
await fs.rm(`/tmp/docker-compose-${id}.yaml`);
|
|
}
|
|
if (!foundDependentContainer && found) {
|
|
return await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker stop -t 0 ${containerName} && docker rm ${containerName}`
|
|
);
|
|
}
|
|
} catch (error) {
|
|
console.log(error);
|
|
return error;
|
|
}
|
|
}
|
|
|
|
export async function getServiceFromDB({ id, teamId }: { id: string; teamId: string }): Promise<any> {
|
|
const settings = await prisma.setting.findFirst();
|
|
const body = await prisma.service.findFirst({
|
|
where: { id, teams: { some: { id: teamId === '0' ? undefined : teamId } } },
|
|
include
|
|
});
|
|
let { type } = body
|
|
type = fixType(type)
|
|
|
|
if (body?.serviceSecret.length > 0) {
|
|
body.serviceSecret = body.serviceSecret.map((s) => {
|
|
s.value = decrypt(s.value);
|
|
return s;
|
|
});
|
|
}
|
|
body[type] = { ...body[type], ...getUpdateableFields(type, body[type]) }
|
|
return { ...body, settings };
|
|
}
|
|
|
|
export function getServiceImage(type: string): string {
|
|
const found = supportedServiceTypesAndVersions.find((t) => t.name === type);
|
|
if (found) {
|
|
return found.baseImage;
|
|
}
|
|
return '';
|
|
}
|
|
|
|
export function getServiceImages(type: string): string[] {
|
|
const found = supportedServiceTypesAndVersions.find((t) => t.name === type);
|
|
if (found) {
|
|
return found.images;
|
|
}
|
|
return [];
|
|
}
|
|
|
|
export async function configureServiceType({
|
|
id,
|
|
type
|
|
}: {
|
|
id: string;
|
|
type: string;
|
|
}): Promise<void> {
|
|
if (type === 'plausibleanalytics') {
|
|
const password = encrypt(generatePassword());
|
|
const postgresqlUser = cuid();
|
|
const postgresqlPassword = encrypt(generatePassword());
|
|
const postgresqlDatabase = 'plausibleanalytics';
|
|
const secretKeyBase = encrypt(generatePassword(64));
|
|
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type,
|
|
plausibleAnalytics: {
|
|
create: {
|
|
postgresqlDatabase,
|
|
postgresqlUser,
|
|
postgresqlPassword,
|
|
password,
|
|
secretKeyBase
|
|
}
|
|
}
|
|
}
|
|
});
|
|
} else if (type === 'nocodb') {
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: { type }
|
|
});
|
|
} else if (type === 'minio') {
|
|
const rootUser = cuid();
|
|
const rootUserPassword = encrypt(generatePassword());
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: { type, minio: { create: { rootUser, rootUserPassword } } }
|
|
});
|
|
} else if (type === 'vscodeserver') {
|
|
const password = encrypt(generatePassword());
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: { type, vscodeserver: { create: { password } } }
|
|
});
|
|
} else if (type === 'wordpress') {
|
|
const mysqlUser = cuid();
|
|
const mysqlPassword = encrypt(generatePassword());
|
|
const mysqlRootUser = cuid();
|
|
const mysqlRootUserPassword = encrypt(generatePassword());
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type,
|
|
wordpress: { create: { mysqlPassword, mysqlRootUserPassword, mysqlRootUser, mysqlUser } }
|
|
}
|
|
});
|
|
} else if (type === 'vaultwarden') {
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type
|
|
}
|
|
});
|
|
} else if (type === 'languagetool') {
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type
|
|
}
|
|
});
|
|
} else if (type === 'n8n') {
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type
|
|
}
|
|
});
|
|
} else if (type === 'uptimekuma') {
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type
|
|
}
|
|
});
|
|
} else if (type === 'ghost') {
|
|
const defaultEmail = `${cuid()}@example.com`;
|
|
const defaultPassword = encrypt(generatePassword());
|
|
const mariadbUser = cuid();
|
|
const mariadbPassword = encrypt(generatePassword());
|
|
const mariadbRootUser = cuid();
|
|
const mariadbRootUserPassword = encrypt(generatePassword());
|
|
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type,
|
|
ghost: {
|
|
create: {
|
|
defaultEmail,
|
|
defaultPassword,
|
|
mariadbUser,
|
|
mariadbPassword,
|
|
mariadbRootUser,
|
|
mariadbRootUserPassword
|
|
}
|
|
}
|
|
}
|
|
});
|
|
} else if (type === 'meilisearch') {
|
|
const masterKey = encrypt(generatePassword(32));
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type,
|
|
meiliSearch: { create: { masterKey } }
|
|
}
|
|
});
|
|
} else if (type === 'umami') {
|
|
const umamiAdminPassword = encrypt(generatePassword());
|
|
const postgresqlUser = cuid();
|
|
const postgresqlPassword = encrypt(generatePassword());
|
|
const postgresqlDatabase = 'umami';
|
|
const hashSalt = encrypt(generatePassword(64));
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type,
|
|
umami: {
|
|
create: {
|
|
umamiAdminPassword,
|
|
postgresqlDatabase,
|
|
postgresqlPassword,
|
|
postgresqlUser,
|
|
hashSalt
|
|
}
|
|
}
|
|
}
|
|
});
|
|
} else if (type === 'hasura') {
|
|
const postgresqlUser = cuid();
|
|
const postgresqlPassword = encrypt(generatePassword());
|
|
const postgresqlDatabase = 'hasura';
|
|
const graphQLAdminPassword = encrypt(generatePassword());
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type,
|
|
hasura: {
|
|
create: {
|
|
postgresqlDatabase,
|
|
postgresqlPassword,
|
|
postgresqlUser,
|
|
graphQLAdminPassword
|
|
}
|
|
}
|
|
}
|
|
});
|
|
} else if (type === 'fider') {
|
|
const postgresqlUser = cuid();
|
|
const postgresqlPassword = encrypt(generatePassword());
|
|
const postgresqlDatabase = 'fider';
|
|
const jwtSecret = encrypt(generatePassword(64, true));
|
|
await prisma.service.update({
|
|
where: { id },
|
|
data: {
|
|
type,
|
|
fider: {
|
|
create: {
|
|
postgresqlDatabase,
|
|
postgresqlPassword,
|
|
postgresqlUser,
|
|
jwtSecret
|
|
}
|
|
}
|
|
}
|
|
});
|
|
}
|
|
}
|
|
|
|
export async function removeService({ id }: { id: string }): Promise<void> {
|
|
await prisma.servicePersistentStorage.deleteMany({ where: { serviceId: id } });
|
|
await prisma.meiliSearch.deleteMany({ where: { serviceId: id } });
|
|
await prisma.fider.deleteMany({ where: { serviceId: id } });
|
|
await prisma.ghost.deleteMany({ where: { serviceId: id } });
|
|
await prisma.umami.deleteMany({ where: { serviceId: id } });
|
|
await prisma.hasura.deleteMany({ where: { serviceId: id } });
|
|
await prisma.plausibleAnalytics.deleteMany({ where: { serviceId: id } });
|
|
await prisma.minio.deleteMany({ where: { serviceId: id } });
|
|
await prisma.vscodeserver.deleteMany({ where: { serviceId: id } });
|
|
await prisma.wordpress.deleteMany({ where: { serviceId: id } });
|
|
await prisma.serviceSecret.deleteMany({ where: { serviceId: id } });
|
|
|
|
await prisma.service.delete({ where: { id } });
|
|
}
|
|
|
|
export function saveUpdateableFields(type: string, data: any) {
|
|
let update = {};
|
|
if (type && serviceFields[type]) {
|
|
serviceFields[type].map((k) => {
|
|
let temp = data[k.name]
|
|
if (temp) {
|
|
if (k.isEncrypted) {
|
|
temp = encrypt(temp)
|
|
}
|
|
if (k.isLowerCase) {
|
|
temp = temp.toLowerCase()
|
|
}
|
|
if (k.isNumber) {
|
|
temp = Number(temp)
|
|
}
|
|
if (k.isBoolean) {
|
|
temp = Boolean(temp)
|
|
}
|
|
}
|
|
update[k.name] = temp
|
|
});
|
|
}
|
|
return update
|
|
}
|
|
|
|
export function getUpdateableFields(type: string, data: any) {
|
|
let update = {};
|
|
if (type && serviceFields[type]) {
|
|
serviceFields[type].map((k) => {
|
|
let temp = data[k.name]
|
|
if (temp) {
|
|
if (k.isEncrypted) {
|
|
temp = decrypt(temp)
|
|
}
|
|
update[k.name] = temp
|
|
}
|
|
update[k.name] = temp
|
|
});
|
|
}
|
|
return update
|
|
}
|
|
|
|
export function fixType(type) {
|
|
// Hack to fix the type case sensitivity...
|
|
if (type === 'plausibleanalytics') type = 'plausibleAnalytics';
|
|
if (type === 'meilisearch') type = 'meiliSearch';
|
|
return type
|
|
}
|
|
|
|
export const getServiceMainPort = (service: string) => {
|
|
const serviceType = supportedServiceTypesAndVersions.find((s) => s.name === service);
|
|
if (serviceType) {
|
|
return serviceType.ports.main;
|
|
}
|
|
return null;
|
|
};
|
|
|
|
|
|
export function makeLabelForServices(type) {
|
|
return [
|
|
'coolify.managed=true',
|
|
`coolify.version=${version}`,
|
|
`coolify.type=service`,
|
|
`coolify.service.type=${type}`
|
|
];
|
|
}
|
|
export function errorHandler({ status = 500, message = 'Unknown error.' }: { status: number, message: string | any }) {
|
|
if (message.message) message = message.message
|
|
throw { status, message };
|
|
}
|
|
export async function generateSshKeyPair(): Promise<{ publicKey: string; privateKey: string }> {
|
|
return await new Promise((resolve, reject) => {
|
|
forge.pki.rsa.generateKeyPair({ bits: 4096, workers: -1 }, function (err, keys) {
|
|
if (keys) {
|
|
resolve({
|
|
publicKey: forge.ssh.publicKeyToOpenSSH(keys.publicKey),
|
|
privateKey: forge.ssh.privateKeyToOpenSSH(keys.privateKey)
|
|
});
|
|
} else {
|
|
reject(keys);
|
|
}
|
|
});
|
|
});
|
|
}
|
|
|
|
export async function stopBuild(buildId, applicationId) {
|
|
let count = 0;
|
|
await new Promise<void>(async (resolve, reject) => {
|
|
const { destinationDockerId, status } = await prisma.build.findFirst({ where: { id: buildId } });
|
|
const { engine } = await prisma.destinationDocker.findFirst({ where: { id: destinationDockerId } });
|
|
const host = getEngine(engine);
|
|
let interval = setInterval(async () => {
|
|
try {
|
|
if (status === 'failed') {
|
|
clearInterval(interval);
|
|
return resolve();
|
|
}
|
|
if (count > 100) {
|
|
clearInterval(interval);
|
|
return reject(new Error('Build canceled'));
|
|
}
|
|
|
|
const { stdout: buildContainers } = await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker container ls --filter "label=coolify.buildId=${buildId}" --format '{{json .}}'`
|
|
);
|
|
if (buildContainers) {
|
|
const containersArray = buildContainers.trim().split('\n');
|
|
for (const container of containersArray) {
|
|
const containerObj = JSON.parse(container);
|
|
const id = containerObj.ID;
|
|
if (!containerObj.Names.startsWith(`${applicationId}`)) {
|
|
await removeContainer({ id, engine });
|
|
await cleanupDB(buildId);
|
|
clearInterval(interval);
|
|
return resolve();
|
|
}
|
|
}
|
|
}
|
|
count++;
|
|
} catch (error) { }
|
|
}, 100);
|
|
});
|
|
}
|
|
|
|
async function cleanupDB(buildId: string) {
|
|
const data = await prisma.build.findUnique({ where: { id: buildId } });
|
|
if (data?.status === 'queued' || data?.status === 'running') {
|
|
await prisma.build.update({ where: { id: buildId }, data: { status: 'failed' } });
|
|
}
|
|
}
|
|
|
|
export function convertTolOldVolumeNames(type) {
|
|
if (type === 'nocodb') {
|
|
return 'nc'
|
|
}
|
|
}
|
|
export async function getAvailableServices(): Promise<any> {
|
|
const { data } = await axios.get(`https://gist.githubusercontent.com/andrasbacsai/4aac36d8d6214dbfc34fa78110554a50/raw/291a957ee6ac01d480465623e183a30230ad921f/availableServices.json`)
|
|
return data
|
|
}
|
|
export async function cleanupDockerStorage(host, lowDiskSpace, force) {
|
|
// Cleanup old coolify images
|
|
try {
|
|
let { stdout: images } = await asyncExecShell(
|
|
`DOCKER_HOST=${host} docker images coollabsio/coolify --filter before="coollabsio/coolify:${version}" -q | xargs `
|
|
);
|
|
images = images.trim();
|
|
if (images) {
|
|
await asyncExecShell(`DOCKER_HOST=${host} docker rmi -f ${images}`);
|
|
}
|
|
} catch (error) {
|
|
//console.log(error);
|
|
}
|
|
if (lowDiskSpace || force) {
|
|
if (isDev) {
|
|
if (!force) console.log(`[DEV MODE] Low disk space: ${lowDiskSpace}`);
|
|
return
|
|
}
|
|
try {
|
|
await asyncExecShell(`DOCKER_HOST=${host} docker container prune -f`);
|
|
} catch (error) {
|
|
//console.log(error);
|
|
}
|
|
try {
|
|
await asyncExecShell(`DOCKER_HOST=${host} docker image prune -f`);
|
|
} catch (error) {
|
|
//console.log(error);
|
|
}
|
|
try {
|
|
await asyncExecShell(`DOCKER_HOST=${host} docker image prune -a -f`);
|
|
} catch (error) {
|
|
//console.log(error);
|
|
}
|
|
}
|
|
} |