coolify/app/Models/StandaloneKeydb.php

331 lines
9.6 KiB
PHP
Raw Normal View History

2024-04-10 13:00:46 +00:00
<?php
namespace App\Models;
use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasMetrics;
use App\Traits\HasSafeStringAttribute;
2024-04-10 13:00:46 +00:00
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
use Illuminate\Database\Eloquent\SoftDeletes;
class StandaloneKeydb extends BaseModel
{
use ClearsGlobalSearchCache, HasFactory, HasMetrics, HasSafeStringAttribute, SoftDeletes;
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
protected $guarded = [];
2024-06-10 20:43:34 +00:00
protected $appends = ['internal_db_url', 'external_db_url', 'server_status'];
2024-07-01 14:26:50 +00:00
protected $casts = [
'keydb_password' => 'encrypted',
'public_port_timeout' => 'integer',
'restart_count' => 'integer',
'last_restart_at' => 'datetime',
'last_restart_type' => 'string',
];
2024-04-10 13:00:46 +00:00
protected static function booted()
{
static::created(function ($database) {
LocalPersistentVolume::create([
2024-06-10 20:43:34 +00:00
'name' => 'keydb-data-'.$database->uuid,
2024-04-10 13:00:46 +00:00
'mount_path' => '/data',
'host_path' => null,
'resource_id' => $database->id,
'resource_type' => $database->getMorphClass(),
]);
});
2024-07-11 10:38:54 +00:00
static::forceDeleting(function ($database) {
2024-04-10 13:00:46 +00:00
$database->persistentStorages()->delete();
2024-07-11 10:38:54 +00:00
$database->scheduledBackups()->delete();
2024-04-10 13:00:46 +00:00
$database->environment_variables()->delete();
$database->tags()->detach();
});
static::saving(function ($database) {
if ($database->isDirty('status')) {
$database->forceFill(['last_online_at' => now()]);
}
});
2024-04-10 13:00:46 +00:00
}
2024-06-10 20:43:34 +00:00
/**
* Get query builder for KeyDB databases owned by current team.
* If you need all databases without further query chaining, use ownedByCurrentTeamCached() instead.
*/
public static function ownedByCurrentTeam()
{
return StandaloneKeydb::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
}
/**
* Get all KeyDB databases owned by current team (cached for request duration).
*/
public static function ownedByCurrentTeamCached()
{
return once(function () {
return StandaloneKeydb::ownedByCurrentTeam()->get();
});
}
protected function serverStatus(): Attribute
{
return Attribute::make(
get: function () {
return $this->destination->server->isFunctional();
}
);
}
public function isConfigurationChanged(bool $save = false)
{
2024-06-10 20:43:34 +00:00
$newConfigHash = $this->image.$this->ports_mappings.$this->keydb_conf;
$newConfigHash .= json_encode($this->environment_variables()->get('value')->sort());
$newConfigHash = md5($newConfigHash);
$oldConfigHash = data_get($this, 'config_hash');
if ($oldConfigHash === null) {
if ($save) {
$this->config_hash = $newConfigHash;
$this->save();
}
2024-06-10 20:43:34 +00:00
return true;
}
if ($oldConfigHash === $newConfigHash) {
return false;
} else {
if ($save) {
$this->config_hash = $newConfigHash;
$this->save();
}
2025-01-07 13:52:08 +00:00
return true;
}
}
2024-06-10 20:43:34 +00:00
2024-09-16 13:35:44 +00:00
public function isRunning()
{
return (bool) str($this->status)->contains('running');
}
public function isExited()
{
return (bool) str($this->status)->startsWith('exited');
}
2024-06-10 20:43:34 +00:00
public function workdir()
{
2024-06-10 20:43:34 +00:00
return database_configuration_dir()."/{$this->uuid}";
}
2024-06-10 20:43:34 +00:00
public function deleteConfigurations()
{
$server = data_get($this, 'destination.server');
$workdir = $this->workdir();
if (str($workdir)->endsWith($this->uuid)) {
2024-06-10 20:43:34 +00:00
instant_remote_process(['rm -rf '.$this->workdir()], $server, false);
}
}
public function deleteVolumes()
2024-07-11 10:38:54 +00:00
{
$persistentStorages = $this->persistentStorages()->get() ?? collect();
2024-07-11 10:38:54 +00:00
if ($persistentStorages->count() === 0) {
return;
}
$server = data_get($this, 'destination.server');
foreach ($persistentStorages as $storage) {
instant_remote_process(["docker volume rm -f $storage->name"], $server, false);
2024-07-11 10:38:54 +00:00
}
}
2024-04-10 13:00:46 +00:00
public function realStatus()
{
return $this->getRawOriginal('status');
}
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
public function status(): Attribute
{
return Attribute::make(
set: function ($value) {
if (str($value)->contains('(')) {
$status = str($value)->before('(')->trim()->value();
$health = str($value)->after('(')->before(')')->trim()->value() ?? 'unhealthy';
2024-06-10 20:43:34 +00:00
} elseif (str($value)->contains(':')) {
2024-04-10 13:00:46 +00:00
$status = str($value)->before(':')->trim()->value();
$health = str($value)->after(':')->trim()->value() ?? 'unhealthy';
} else {
$status = $value;
$health = 'unhealthy';
}
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
return "$status:$health";
},
get: function ($value) {
if (str($value)->contains('(')) {
$status = str($value)->before('(')->trim()->value();
$health = str($value)->after('(')->before(')')->trim()->value() ?? 'unhealthy';
2024-06-10 20:43:34 +00:00
} elseif (str($value)->contains(':')) {
2024-04-10 13:00:46 +00:00
$status = str($value)->before(':')->trim()->value();
$health = str($value)->after(':')->trim()->value() ?? 'unhealthy';
} else {
$status = $value;
$health = 'unhealthy';
}
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
return "$status:$health";
},
);
}
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
public function tags()
{
return $this->morphToMany(Tag::class, 'taggable');
}
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
public function project()
{
return data_get($this, 'environment.project');
}
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
public function team()
{
return data_get($this, 'environment.project.team');
}
2024-06-10 20:43:34 +00:00
public function sslCertificates()
{
return $this->morphMany(SslCertificate::class, 'resource');
}
2024-04-10 13:00:46 +00:00
public function link()
{
if (data_get($this, 'environment.project.uuid')) {
return route('project.database.configuration', [
'project_uuid' => data_get($this, 'environment.project.uuid'),
2024-11-22 15:03:20 +00:00
'environment_uuid' => data_get($this, 'environment.uuid'),
2024-06-10 20:43:34 +00:00
'database_uuid' => data_get($this, 'uuid'),
2024-04-10 13:00:46 +00:00
]);
}
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
return null;
}
2024-06-10 20:43:34 +00:00
2024-04-10 13:00:46 +00:00
public function isLogDrainEnabled()
{
return data_get($this, 'is_log_drain_enabled', false);
}
public function portsMappings(): Attribute
{
return Attribute::make(
2024-06-10 20:43:34 +00:00
set: fn ($value) => $value === '' ? null : $value,
2024-04-10 13:00:46 +00:00
);
}
public function portsMappingsArray(): Attribute
{
return Attribute::make(
get: fn () => is_null($this->ports_mappings)
? []
: explode(',', $this->ports_mappings),
);
}
2024-07-01 14:26:50 +00:00
public function databaseType(): Attribute
{
return new Attribute(
get: fn () => $this->type(),
);
}
2024-04-10 13:00:46 +00:00
public function type(): string
{
return 'standalone-keydb';
}
2024-06-10 20:43:34 +00:00
2024-07-01 14:26:50 +00:00
protected function internalDbUrl(): Attribute
{
return new Attribute(
2025-02-10 20:29:45 +00:00
get: function () {
$scheme = $this->enable_ssl ? 'rediss' : 'redis';
$port = $this->enable_ssl ? 6380 : 6379;
$encodedPass = rawurlencode($this->keydb_password);
$url = "{$scheme}://:{$encodedPass}@{$this->uuid}:{$port}/0";
2025-02-10 20:29:45 +00:00
if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
}
return $url;
}
2024-07-01 14:26:50 +00:00
);
}
protected function externalDbUrl(): Attribute
{
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
$serverIp = $this->destination->server->getIp;
if (empty($serverIp)) {
return null;
}
2025-02-10 20:29:45 +00:00
$scheme = $this->enable_ssl ? 'rediss' : 'redis';
$encodedPass = rawurlencode($this->keydb_password);
$url = "{$scheme}://:{$encodedPass}@{$serverIp}:{$this->public_port}/0";
2025-02-10 20:29:45 +00:00
if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
$url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
}
return $url;
2024-07-01 14:26:50 +00:00
}
return null;
}
);
}
2024-04-10 13:00:46 +00:00
public function environment()
{
return $this->belongsTo(Environment::class);
}
public function fileStorages()
{
return $this->morphMany(LocalFileVolume::class, 'resource');
}
public function destination()
{
return $this->morphTo();
}
public function runtime_environment_variables()
2024-04-10 13:00:46 +00:00
{
return $this->morphMany(EnvironmentVariable::class, 'resourceable');
2024-04-10 13:00:46 +00:00
}
public function persistentStorages()
{
return $this->morphMany(LocalPersistentVolume::class, 'resource');
}
public function scheduledBackups()
{
return $this->morphMany(ScheduledDatabaseBackup::class, 'database');
}
2024-06-20 11:17:06 +00:00
public function isBackupSolutionAvailable()
{
return false;
}
public function environment_variables()
{
return $this->morphMany(EnvironmentVariable::class, 'resourceable');
}
2024-04-10 13:00:46 +00:00
}