coolify/app/Livewire/Project/Database/Redis/General.php

258 lines
8.8 KiB
PHP
Raw Normal View History

2023-10-12 15:18:33 +00:00
<?php
2023-12-07 18:06:32 +00:00
namespace App\Livewire\Project\Database\Redis;
2023-10-12 15:18:33 +00:00
use App\Actions\Database\StartDatabaseProxy;
use App\Actions\Database\StopDatabaseProxy;
2025-02-07 21:36:36 +00:00
use App\Helpers\SslHelper;
2024-06-09 19:33:17 +00:00
use App\Models\Server;
2025-02-07 21:36:36 +00:00
use App\Models\SslCertificate;
2023-10-12 15:18:33 +00:00
use App\Models\StandaloneRedis;
use App\Support\ValidationPatterns;
use Carbon\Carbon;
2023-10-12 15:18:33 +00:00
use Exception;
use Illuminate\Foundation\Auth\Access\AuthorizesRequests;
use Illuminate\Support\Facades\Auth;
2023-10-12 15:18:33 +00:00
use Livewire\Component;
class General extends Component
{
use AuthorizesRequests;
2024-06-09 19:33:17 +00:00
public Server $server;
2024-06-10 20:43:34 +00:00
2023-10-12 15:18:33 +00:00
public StandaloneRedis $database;
2024-06-10 20:43:34 +00:00
public string $redis_username;
2024-10-21 10:13:42 +00:00
public ?string $redis_password;
2024-10-21 10:13:42 +00:00
public string $redis_version;
public ?string $db_url = null;
2024-06-10 20:43:34 +00:00
public ?string $db_url_public = null;
2023-10-12 15:18:33 +00:00
public ?Carbon $certificateValidUntil = null;
2025-02-07 21:36:36 +00:00
public function getListeners()
{
$userId = Auth::id();
return [
"echo-private:user.{$userId},DatabaseStatusChanged" => '$refresh',
'envsUpdated' => 'refresh',
'refresh',
];
}
protected function rules(): array
{
return [
'database.name' => ValidationPatterns::nameRules(),
'database.description' => ValidationPatterns::descriptionRules(),
'database.redis_conf' => 'nullable',
'database.image' => 'required',
'database.ports_mappings' => 'nullable',
'database.is_public' => 'nullable|boolean',
'database.public_port' => 'nullable|integer',
'database.is_log_drain_enabled' => 'nullable|boolean',
'database.custom_docker_run_options' => 'nullable',
'redis_username' => 'required',
'redis_password' => 'required',
'database.enable_ssl' => 'boolean',
];
}
protected function messages(): array
{
return array_merge(
ValidationPatterns::combinedMessages(),
[
'database.name.required' => 'The Name field is required.',
'database.name.regex' => 'The Name may only contain letters, numbers, spaces, dashes (-), underscores (_), dots (.), slashes (/), colons (:), and parentheses ().',
'database.description.regex' => 'The Description contains invalid characters. Only letters, numbers, spaces, and common punctuation (- _ . : / () \' " , ! ? @ # % & + = [] {} | ~ ` *) are allowed.',
'database.image.required' => 'The Docker Image field is required.',
'database.public_port.integer' => 'The Public Port must be an integer.',
'redis_username.required' => 'The Redis Username field is required.',
'redis_password.required' => 'The Redis Password field is required.',
]
);
}
2024-06-10 20:43:34 +00:00
2023-10-12 15:18:33 +00:00
protected $validationAttributes = [
'database.name' => 'Name',
'database.description' => 'Description',
2023-10-12 15:29:29 +00:00
'database.redis_conf' => 'Redis Configuration',
2023-10-12 15:18:33 +00:00
'database.image' => 'Image',
'database.ports_mappings' => 'Port Mapping',
'database.is_public' => 'Is Public',
'database.public_port' => 'Public Port',
'database.custom_docker_run_options' => 'Custom Docker Options',
2024-10-21 10:13:42 +00:00
'redis_username' => 'Redis Username',
'redis_password' => 'Redis Password',
2025-02-07 21:36:36 +00:00
'database.enable_ssl' => 'Enable SSL',
2023-10-12 15:18:33 +00:00
];
2024-06-10 20:43:34 +00:00
public function mount()
{
2024-06-10 20:43:34 +00:00
$this->server = data_get($this->database, 'destination.server');
2024-10-21 10:13:42 +00:00
$this->refreshView();
$existingCert = $this->database->sslCertificates()->first();
2025-02-07 21:36:36 +00:00
if ($existingCert) {
$this->certificateValidUntil = $existingCert->valid_until;
}
}
2024-06-10 20:43:34 +00:00
public function instantSaveAdvanced()
{
try {
$this->authorize('update', $this->database);
2024-06-10 20:43:34 +00:00
if (! $this->server->isLogDrainEnabled()) {
$this->database->is_log_drain_enabled = false;
2023-12-07 18:06:32 +00:00
$this->dispatch('error', 'Log drain is not enabled on the server. Please enable it first.');
2024-06-10 20:43:34 +00:00
return;
}
$this->database->save();
2024-02-22 13:53:42 +00:00
$this->dispatch('success', 'Database updated.');
2023-12-07 18:06:32 +00:00
$this->dispatch('success', 'You need to restart the service for the changes to take effect.');
} catch (Exception $e) {
return handleError($e, $this);
}
}
2024-06-10 20:43:34 +00:00
2023-10-24 12:31:28 +00:00
public function submit()
{
2023-10-12 15:18:33 +00:00
try {
$this->authorize('manageEnvironment', $this->database);
2023-10-12 15:18:33 +00:00
$this->validate();
2024-08-21 17:19:36 +00:00
2024-10-21 10:13:42 +00:00
if (version_compare($this->redis_version, '6.0', '>=')) {
$this->database->runtime_environment_variables()->updateOrCreate(
['key' => 'REDIS_USERNAME'],
['value' => $this->redis_username, 'resourceable_id' => $this->database->id]
2024-10-21 10:13:42 +00:00
);
2023-10-12 15:29:29 +00:00
}
2024-10-21 10:13:42 +00:00
$this->database->runtime_environment_variables()->updateOrCreate(
['key' => 'REDIS_PASSWORD'],
['value' => $this->redis_password, 'resourceable_id' => $this->database->id]
2024-10-21 10:13:42 +00:00
);
2024-08-21 17:19:36 +00:00
2023-10-12 15:18:33 +00:00
$this->database->save();
2024-02-22 13:53:42 +00:00
$this->dispatch('success', 'Database updated.');
2023-10-12 15:18:33 +00:00
} catch (Exception $e) {
return handleError($e, $this);
2024-10-21 10:13:42 +00:00
} finally {
$this->dispatch('refreshEnvs');
2023-10-12 15:18:33 +00:00
}
}
2024-06-10 20:43:34 +00:00
2023-10-12 15:18:33 +00:00
public function instantSave()
{
try {
$this->authorize('update', $this->database);
2024-06-10 20:43:34 +00:00
if ($this->database->is_public && ! $this->database->public_port) {
2023-12-07 18:06:32 +00:00
$this->dispatch('error', 'Public port is required.');
2023-10-12 15:18:33 +00:00
$this->database->is_public = false;
2024-06-10 20:43:34 +00:00
return;
2023-10-12 15:18:33 +00:00
}
if ($this->database->is_public) {
2024-06-10 20:43:34 +00:00
if (! str($this->database->status)->startsWith('running')) {
2023-12-07 18:06:32 +00:00
$this->dispatch('error', 'Database must be started to be publicly accessible.');
2023-10-24 12:31:28 +00:00
$this->database->is_public = false;
2024-06-10 20:43:34 +00:00
return;
2023-10-24 12:31:28 +00:00
}
StartDatabaseProxy::run($this->database);
2023-12-07 18:06:32 +00:00
$this->dispatch('success', 'Database is now publicly accessible.');
2023-10-12 15:18:33 +00:00
} else {
StopDatabaseProxy::run($this->database);
2023-12-07 18:06:32 +00:00
$this->dispatch('success', 'Database is no longer publicly accessible.');
2023-10-12 15:18:33 +00:00
}
$this->db_url_public = $this->database->external_db_url;
2023-10-12 15:18:33 +00:00
$this->database->save();
} catch (\Throwable $e) {
2024-06-10 20:43:34 +00:00
$this->database->is_public = ! $this->database->is_public;
2023-10-12 15:18:33 +00:00
return handleError($e, $this);
}
}
2024-06-10 20:43:34 +00:00
2025-02-07 21:36:36 +00:00
public function instantSaveSSL()
{
try {
$this->authorize('update', $this->database);
2025-02-07 21:36:36 +00:00
$this->database->save();
$this->dispatch('success', 'SSL configuration updated.');
} catch (Exception $e) {
return handleError($e, $this);
}
}
public function regenerateSslCertificate()
{
try {
$this->authorize('update', $this->database);
$existingCert = $this->database->sslCertificates()->first();
2025-02-07 21:36:36 +00:00
if (! $existingCert) {
$this->dispatch('error', 'No existing SSL certificate found for this database.');
return;
}
$caCert = SslCertificate::where('server_id', $existingCert->server_id)->where('is_ca_certificate', true)->first();
SslHelper::generateSslCertificate(
commonName: $existingCert->commonName,
subjectAlternativeNames: $existingCert->subjectAlternativeNames ?? [],
resourceType: $existingCert->resource_type,
resourceId: $existingCert->resource_id,
serverId: $existingCert->server_id,
caCert: $caCert->ssl_certificate,
caKey: $caCert->ssl_private_key,
configurationDir: $existingCert->configuration_dir,
mountPath: $existingCert->mount_path,
isPemKeyFileRequired: true,
2025-02-07 21:36:36 +00:00
);
$this->dispatch('success', 'SSL certificates regenerated. Restart database to apply changes.');
} catch (Exception $e) {
handleError($e, $this);
}
}
2023-10-12 15:18:33 +00:00
public function refresh(): void
{
$this->database->refresh();
2024-10-21 10:13:42 +00:00
$this->refreshView();
}
private function refreshView()
{
2024-10-21 10:13:42 +00:00
$this->db_url = $this->database->internal_db_url;
$this->db_url_public = $this->database->external_db_url;
$this->redis_version = $this->database->getRedisVersion();
$this->redis_username = $this->database->redis_username;
$this->redis_password = $this->database->redis_password;
2023-10-12 15:18:33 +00:00
}
public function render()
{
return view('livewire.project.database.redis.general');
}
public function isSharedVariable($name)
{
2024-10-21 10:13:42 +00:00
return $this->database->runtime_environment_variables()->where('key', $name)->where('is_shared', true)->exists();
}
}