coolify/app/Models/StandaloneMysql.php

368 lines
12 KiB
PHP
Raw Normal View History

2023-10-24 12:31:28 +00:00
<?php
namespace App\Models;
use App\Traits\ClearsGlobalSearchCache;
use App\Traits\HasSafeStringAttribute;
2023-10-24 12:31:28 +00:00
use Illuminate\Database\Eloquent\Casts\Attribute;
use Illuminate\Database\Eloquent\Factories\HasFactory;
2023-12-13 11:08:12 +00:00
use Illuminate\Database\Eloquent\SoftDeletes;
2023-10-24 12:31:28 +00:00
class StandaloneMysql extends BaseModel
{
use ClearsGlobalSearchCache, HasFactory, HasSafeStringAttribute, SoftDeletes;
2023-10-24 12:31:28 +00:00
protected $guarded = [];
2024-06-10 20:43:34 +00:00
protected $appends = ['internal_db_url', 'external_db_url', 'database_type', 'server_status'];
2024-07-01 14:26:50 +00:00
protected $casts = [
'mysql_password' => 'encrypted',
'mysql_root_password' => 'encrypted',
];
2023-10-24 12:31:28 +00:00
protected static function booted()
{
static::created(function ($database) {
LocalPersistentVolume::create([
2024-06-10 20:43:34 +00:00
'name' => 'mysql-data-'.$database->uuid,
2023-10-24 12:31:28 +00:00
'mount_path' => '/var/lib/mysql',
'host_path' => null,
'resource_id' => $database->id,
'resource_type' => $database->getMorphClass(),
]);
});
2024-07-11 10:38:54 +00:00
static::forceDeleting(function ($database) {
2023-10-24 12:31:28 +00:00
$database->persistentStorages()->delete();
2024-07-11 10:38:54 +00:00
$database->scheduledBackups()->delete();
2023-10-24 12:31:28 +00:00
$database->environment_variables()->delete();
2024-02-02 10:50:28 +00:00
$database->tags()->detach();
2023-10-24 12:31:28 +00:00
});
static::saving(function ($database) {
if ($database->isDirty('status')) {
$database->forceFill(['last_online_at' => now()]);
}
});
2023-10-24 12:31:28 +00:00
}
2024-06-10 20:43:34 +00:00
public static function ownedByCurrentTeam()
{
return StandaloneMysql::whereRelation('environment.project.team', 'id', currentTeam()->id)->orderBy('name');
}
protected function serverStatus(): Attribute
{
return Attribute::make(
get: function () {
return $this->destination->server->isFunctional();
}
);
}
public function isConfigurationChanged(bool $save = false)
{
2024-06-10 20:43:34 +00:00
$newConfigHash = $this->image.$this->ports_mappings.$this->mysql_conf;
$newConfigHash .= json_encode($this->environment_variables()->get('value')->sort());
$newConfigHash = md5($newConfigHash);
$oldConfigHash = data_get($this, 'config_hash');
if ($oldConfigHash === null) {
if ($save) {
$this->config_hash = $newConfigHash;
$this->save();
}
2024-06-10 20:43:34 +00:00
return true;
}
if ($oldConfigHash === $newConfigHash) {
return false;
} else {
if ($save) {
$this->config_hash = $newConfigHash;
$this->save();
}
2025-01-07 13:52:08 +00:00
return true;
}
}
2024-06-10 20:43:34 +00:00
2024-09-16 13:35:44 +00:00
public function isRunning()
{
return (bool) str($this->status)->contains('running');
}
public function isExited()
{
return (bool) str($this->status)->startsWith('exited');
}
2024-06-10 20:43:34 +00:00
public function workdir()
{
2024-06-10 20:43:34 +00:00
return database_configuration_dir()."/{$this->uuid}";
}
2024-06-10 20:43:34 +00:00
public function deleteConfigurations()
{
$server = data_get($this, 'destination.server');
$workdir = $this->workdir();
if (str($workdir)->endsWith($this->uuid)) {
2024-06-10 20:43:34 +00:00
instant_remote_process(['rm -rf '.$this->workdir()], $server, false);
}
}
2024-06-10 20:43:34 +00:00
public function deleteVolumes()
2024-07-11 10:38:54 +00:00
{
$persistentStorages = $this->persistentStorages()->get() ?? collect();
2024-07-11 10:38:54 +00:00
if ($persistentStorages->count() === 0) {
return;
}
$server = data_get($this, 'destination.server');
foreach ($persistentStorages as $storage) {
instant_remote_process(["docker volume rm -f $storage->name"], $server, false);
2024-07-11 10:38:54 +00:00
}
}
2024-02-07 13:55:06 +00:00
public function realStatus()
{
2024-06-10 20:43:34 +00:00
return $this->getRawOriginal('status');
2024-02-07 13:55:06 +00:00
}
2024-06-10 20:43:34 +00:00
2024-02-07 13:55:06 +00:00
public function status(): Attribute
{
return Attribute::make(
set: function ($value) {
if (str($value)->contains('(')) {
$status = str($value)->before('(')->trim()->value();
$health = str($value)->after('(')->before(')')->trim()->value() ?? 'unhealthy';
2024-06-10 20:43:34 +00:00
} elseif (str($value)->contains(':')) {
2024-02-07 13:55:06 +00:00
$status = str($value)->before(':')->trim()->value();
$health = str($value)->after(':')->trim()->value() ?? 'unhealthy';
} else {
$status = $value;
$health = 'unhealthy';
}
2024-06-10 20:43:34 +00:00
2024-02-07 13:55:06 +00:00
return "$status:$health";
},
get: function ($value) {
if (str($value)->contains('(')) {
$status = str($value)->before('(')->trim()->value();
$health = str($value)->after('(')->before(')')->trim()->value() ?? 'unhealthy';
2024-06-10 20:43:34 +00:00
} elseif (str($value)->contains(':')) {
2024-02-07 13:55:06 +00:00
$status = str($value)->before(':')->trim()->value();
$health = str($value)->after(':')->trim()->value() ?? 'unhealthy';
} else {
$status = $value;
$health = 'unhealthy';
}
2024-06-10 20:43:34 +00:00
2024-02-07 13:55:06 +00:00
return "$status:$health";
},
);
}
2024-06-10 20:43:34 +00:00
2024-02-02 10:50:28 +00:00
public function tags()
{
return $this->morphToMany(Tag::class, 'taggable');
}
2024-06-10 20:43:34 +00:00
public function project()
{
return data_get($this, 'environment.project');
}
2024-06-10 20:43:34 +00:00
2024-01-23 16:13:23 +00:00
public function team()
{
return data_get($this, 'environment.project.team');
}
2024-06-10 20:43:34 +00:00
public function sslCertificates()
{
return $this->morphMany(SslCertificate::class, 'resource');
}
public function link()
{
2023-11-30 11:21:53 +00:00
if (data_get($this, 'environment.project.uuid')) {
return route('project.database.configuration', [
'project_uuid' => data_get($this, 'environment.project.uuid'),
2024-11-22 15:03:20 +00:00
'environment_uuid' => data_get($this, 'environment.uuid'),
2024-06-10 20:43:34 +00:00
'database_uuid' => data_get($this, 'uuid'),
2023-11-30 11:21:53 +00:00
]);
}
2024-06-10 20:43:34 +00:00
2023-11-30 11:21:53 +00:00
return null;
}
2024-06-10 20:43:34 +00:00
2024-07-01 14:26:50 +00:00
public function databaseType(): Attribute
{
return new Attribute(
get: fn () => $this->type(),
);
}
2023-10-24 12:31:28 +00:00
public function type(): string
{
return 'standalone-mysql';
}
public function isLogDrainEnabled()
{
return data_get($this, 'is_log_drain_enabled', false);
}
2023-10-24 12:31:28 +00:00
public function portsMappings(): Attribute
{
return Attribute::make(
2024-06-10 20:43:34 +00:00
set: fn ($value) => $value === '' ? null : $value,
2023-10-24 12:31:28 +00:00
);
}
public function portsMappingsArray(): Attribute
{
return Attribute::make(
get: fn () => is_null($this->ports_mappings)
? []
: explode(',', $this->ports_mappings),
);
}
2024-07-01 14:26:50 +00:00
protected function internalDbUrl(): Attribute
{
return new Attribute(
2025-02-04 17:29:35 +00:00
get: function () {
$encodedUser = rawurlencode($this->mysql_user);
$encodedPass = rawurlencode($this->mysql_password);
$url = "mysql://{$encodedUser}:{$encodedPass}@{$this->uuid}:3306/{$this->mysql_database}";
2025-02-04 17:29:35 +00:00
if ($this->enable_ssl) {
$url .= "?ssl-mode={$this->ssl_mode}";
if (in_array($this->ssl_mode, ['VERIFY_CA', 'VERIFY_IDENTITY'])) {
$url .= '&ssl-ca=/etc/ssl/certs/coolify-ca.crt';
}
}
return $url;
},
2024-07-01 14:26:50 +00:00
);
}
protected function externalDbUrl(): Attribute
{
return new Attribute(
get: function () {
if ($this->is_public && $this->public_port) {
$serverIp = $this->destination->server->getIp;
if (empty($serverIp)) {
return null;
}
$encodedUser = rawurlencode($this->mysql_user);
$encodedPass = rawurlencode($this->mysql_password);
$url = "mysql://{$encodedUser}:{$encodedPass}@{$serverIp}:{$this->public_port}/{$this->mysql_database}";
2025-02-04 17:29:35 +00:00
if ($this->enable_ssl) {
$url .= "?ssl-mode={$this->ssl_mode}";
if (in_array($this->ssl_mode, ['VERIFY_CA', 'VERIFY_IDENTITY'])) {
$url .= '&ssl-ca=/etc/ssl/certs/coolify-ca.crt';
}
}
return $url;
2024-07-01 14:26:50 +00:00
}
return null;
}
);
}
2023-10-24 12:31:28 +00:00
public function environment()
{
return $this->belongsTo(Environment::class);
}
public function fileStorages()
{
return $this->morphMany(LocalFileVolume::class, 'resource');
}
public function destination()
{
return $this->morphTo();
}
public function runtime_environment_variables()
2023-10-24 12:31:28 +00:00
{
return $this->morphMany(EnvironmentVariable::class, 'resourceable');
2023-10-24 12:31:28 +00:00
}
public function persistentStorages()
{
return $this->morphMany(LocalPersistentVolume::class, 'resource');
}
public function scheduledBackups()
{
return $this->morphMany(ScheduledDatabaseBackup::class, 'database');
}
2024-06-20 11:17:06 +00:00
2024-10-21 20:57:00 +00:00
public function getCpuMetrics(int $mins = 5)
2024-06-20 11:17:06 +00:00
{
$server = $this->destination->server;
$container_name = $this->uuid;
2024-10-21 20:57:00 +00:00
$from = now()->subMinutes($mins)->toIso8601ZuluString();
$metrics = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl -H \"Authorization: Bearer {$server->settings->sentinel_token}\" http://localhost:8888/api/container/{$container_name}/cpu/history?from=$from'"], $server, false);
if (str($metrics)->contains('error')) {
$error = json_decode($metrics, true);
$error = data_get($error, 'error', 'Something is not okay, are you okay?');
if ($error === 'Unauthorized') {
2024-10-21 20:57:00 +00:00
$error = 'Unauthorized, please check your metrics token or restart Sentinel to set a new token.';
2024-06-20 11:17:06 +00:00
}
throw new \Exception($error);
2024-10-21 20:57:00 +00:00
}
$metrics = json_decode($metrics, true);
$parsedCollection = collect($metrics)->map(function ($metric) {
return [(int) $metric['time'], (float) $metric['percent']];
});
2024-06-20 11:17:06 +00:00
2024-10-21 20:57:00 +00:00
return $parsedCollection->toArray();
}
2024-06-20 11:17:06 +00:00
2024-10-21 20:57:00 +00:00
public function getMemoryMetrics(int $mins = 5)
{
$server = $this->destination->server;
$container_name = $this->uuid;
$from = now()->subMinutes($mins)->toIso8601ZuluString();
$metrics = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl -H \"Authorization: Bearer {$server->settings->sentinel_token}\" http://localhost:8888/api/container/{$container_name}/memory/history?from=$from'"], $server, false);
if (str($metrics)->contains('error')) {
$error = json_decode($metrics, true);
$error = data_get($error, 'error', 'Something is not okay, are you okay?');
if ($error === 'Unauthorized') {
2024-10-21 20:57:00 +00:00
$error = 'Unauthorized, please check your metrics token or restart Sentinel to set a new token.';
}
throw new \Exception($error);
2024-06-20 11:17:06 +00:00
}
2024-10-21 20:57:00 +00:00
$metrics = json_decode($metrics, true);
$parsedCollection = collect($metrics)->map(function ($metric) {
return [(int) $metric['time'], (float) $metric['used']];
});
return $parsedCollection->toArray();
2024-06-20 11:17:06 +00:00
}
public function isBackupSolutionAvailable()
{
return true;
}
public function environment_variables()
{
return $this->morphMany(EnvironmentVariable::class, 'resourceable')
->orderByRaw("
CASE
WHEN LOWER(key) LIKE 'service_%' THEN 1
WHEN is_required = true AND (value IS NULL OR value = '') THEN 2
ELSE 3
END,
LOWER(key) ASC
");
}
2023-10-24 12:31:28 +00:00
}