* feat(README): add InterviewPal sponsorship link and corresponding SVG icon
* chore(versions): update coolify version to 4.0.0-beta.413 and nightly version to 4.0.0-beta.414 in configuration files
* fix(terminal): enhance WebSocket client verification with authorized IPs in terminal server
* chore(versions): update realtime version to 1.0.8 in versions.json
* chore(versions): update realtime version to 1.0.8 in versions.json
* chore(docker): update soketi image version to 1.0.8 in production configuration files
* chore(versions): update coolify version to 4.0.0-beta.414 and nightly version to 4.0.0-beta.415 in configuration files
* fix(ApplicationDeploymentJob): ensure source is an object before checking GitHub app properties
* fix(ui): Disable livewire navigate feature (causing spam of setInterval())
* fix(ui): Remove required attribute from image input in service application view
* fix(ui): Change application image validation to be nullable in service application view
* fix(Server): Correct proxy path formatting for Traefik proxy type
* chore(versions): update coolify version to 4.0.0-beta.416 and nightly version to 4.0.0-beta.417 in configuration files; fix links in deployment view
* feat(Service): Add functionality to convert between applications and databases in docker-compose based applications
fix(ui): Fix service layout refresh on compose change
* fix(service): graceful shutdown of old container (#5731)
* refactor(Database): streamline container shutdown process and reduce timeout duration
* fix(ServerCheck): enhance proxy container check to ensure it is running before proceeding
* chore(seeder): update git branch from 'main' to 'v4.x' for multiple examples in ApplicationSeeder
* fix(applications): include pull_request_id in deployment queue check to prevent duplicate deployments
* refactor(core): streamline container stopping process and reduce timeout duration; update related methods for consistency
* fix(database): update label for image input field to improve clarity
* feat(migration): add 'is_migrated' and 'custom_type' columns to service_applications and service_databases tables
* feat(backup): implement custom database type selection and enhance scheduled backups management
* fix(ServerCheck): set default proxy status to 'exited' to handle missing container state
* fix(database): reduce container stop timeout from 300 to 30 seconds for improved responsiveness
* refactor(database): update DB facade usage for consistency across service files
* Update app/Livewire/Project/Service/Database.php
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
* refactor(database): enhance application conversion logic and add existence checks for databases and applications
* refactor(actions): standardize method naming for network and configuration deletion across application and service classes
* refactor(logdrain): consolidate log drain stopping logic to reduce redundancy
* refactor(StandaloneMariadb): add type hint for destination method to improve code clarity
* refactor(DeleteResourceJob): streamline resource deletion logic and improve conditional checks for database types
* refactor(jobs): update middleware to prevent job release after expiration for CleanupInstanceStuffsJob, RestartProxyJob, and ServerCheckJob
* fix(ui): system theming for charts (#5740)
* chore(deps-dev): bump vite from 6.2.6 to 6.3.4 (#5743)
Bumps [vite](https://github.com/vitejs/vite/tree/HEAD/packages/vite) from 6.2.6 to 6.3.4.
- [Release notes](https://github.com/vitejs/vite/releases)
- [Changelog](https://github.com/vitejs/vite/blob/main/packages/vite/CHANGELOG.md)
- [Commits](https://github.com/vitejs/vite/commits/v6.3.4/packages/vite)
---
updated-dependencies:
- dependency-name: vite
  dependency-version: 6.3.4
  dependency-type: direct:development
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* fix(dev): mount points?!
* fix(dev): proxy mount point
* fix(ui): allow adding scheduled backups for non-migrated databases
* fix(DatabaseBackupJob): escape PostgreSQL password in backup command (#5759)
* fix(ui): correct closing div tag in service index view
* Revert "fix(dev): mount points?!"
This reverts commit 365bf3cbf0.
---------
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: Jérémy <jeremy.derdaele@gmail.com>
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
Co-authored-by: Best Codes <106822363+The-Best-Codes@users.noreply.github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: busybox <29630035+busybox11@users.noreply.github.com>
		
	
		
			
				
	
	
		
			347 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			347 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
<?php
 | 
						|
 | 
						|
namespace App\Models;
 | 
						|
 | 
						|
use Illuminate\Database\Eloquent\Casts\Attribute;
 | 
						|
use Illuminate\Database\Eloquent\Factories\HasFactory;
 | 
						|
use Illuminate\Database\Eloquent\SoftDeletes;
 | 
						|
 | 
						|
class StandaloneDragonfly extends BaseModel
 | 
						|
{
 | 
						|
    use HasFactory, SoftDeletes;
 | 
						|
 | 
						|
    protected $guarded = [];
 | 
						|
 | 
						|
    protected $appends = ['internal_db_url', 'external_db_url', 'database_type', 'server_status'];
 | 
						|
 | 
						|
    protected $casts = [
 | 
						|
        'dragonfly_password' => 'encrypted',
 | 
						|
    ];
 | 
						|
 | 
						|
    protected static function booted()
 | 
						|
    {
 | 
						|
        static::created(function ($database) {
 | 
						|
            LocalPersistentVolume::create([
 | 
						|
                'name' => 'dragonfly-data-'.$database->uuid,
 | 
						|
                'mount_path' => '/data',
 | 
						|
                'host_path' => null,
 | 
						|
                'resource_id' => $database->id,
 | 
						|
                'resource_type' => $database->getMorphClass(),
 | 
						|
                'is_readonly' => true,
 | 
						|
            ]);
 | 
						|
        });
 | 
						|
        static::forceDeleting(function ($database) {
 | 
						|
            $database->persistentStorages()->delete();
 | 
						|
            $database->scheduledBackups()->delete();
 | 
						|
            $database->environment_variables()->delete();
 | 
						|
            $database->tags()->detach();
 | 
						|
        });
 | 
						|
        static::saving(function ($database) {
 | 
						|
            if ($database->isDirty('status')) {
 | 
						|
                $database->forceFill(['last_online_at' => now()]);
 | 
						|
            }
 | 
						|
        });
 | 
						|
    }
 | 
						|
 | 
						|
    protected function serverStatus(): Attribute
 | 
						|
    {
 | 
						|
        return Attribute::make(
 | 
						|
            get: function () {
 | 
						|
                return $this->destination->server->isFunctional();
 | 
						|
            }
 | 
						|
        );
 | 
						|
    }
 | 
						|
 | 
						|
    public function isConfigurationChanged(bool $save = false)
 | 
						|
    {
 | 
						|
        $newConfigHash = $this->image.$this->ports_mappings;
 | 
						|
        $newConfigHash .= json_encode($this->environment_variables()->get('value')->sort());
 | 
						|
        $newConfigHash = md5($newConfigHash);
 | 
						|
        $oldConfigHash = data_get($this, 'config_hash');
 | 
						|
        if ($oldConfigHash === null) {
 | 
						|
            if ($save) {
 | 
						|
                $this->config_hash = $newConfigHash;
 | 
						|
                $this->save();
 | 
						|
            }
 | 
						|
 | 
						|
            return true;
 | 
						|
        }
 | 
						|
        if ($oldConfigHash === $newConfigHash) {
 | 
						|
            return false;
 | 
						|
        } else {
 | 
						|
            if ($save) {
 | 
						|
                $this->config_hash = $newConfigHash;
 | 
						|
                $this->save();
 | 
						|
            }
 | 
						|
 | 
						|
            return true;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    public function isRunning()
 | 
						|
    {
 | 
						|
        return (bool) str($this->status)->contains('running');
 | 
						|
    }
 | 
						|
 | 
						|
    public function isExited()
 | 
						|
    {
 | 
						|
        return (bool) str($this->status)->startsWith('exited');
 | 
						|
    }
 | 
						|
 | 
						|
    public function workdir()
 | 
						|
    {
 | 
						|
        return database_configuration_dir()."/{$this->uuid}";
 | 
						|
    }
 | 
						|
 | 
						|
    public function deleteConfigurations()
 | 
						|
    {
 | 
						|
        $server = data_get($this, 'destination.server');
 | 
						|
        $workdir = $this->workdir();
 | 
						|
        if (str($workdir)->endsWith($this->uuid)) {
 | 
						|
            instant_remote_process(['rm -rf '.$this->workdir()], $server, false);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    public function deleteVolumes()
 | 
						|
    {
 | 
						|
        $persistentStorages = $this->persistentStorages()->get() ?? collect();
 | 
						|
        if ($persistentStorages->count() === 0) {
 | 
						|
            return;
 | 
						|
        }
 | 
						|
        $server = data_get($this, 'destination.server');
 | 
						|
        foreach ($persistentStorages as $storage) {
 | 
						|
            instant_remote_process(["docker volume rm -f $storage->name"], $server, false);
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    public function realStatus()
 | 
						|
    {
 | 
						|
        return $this->getRawOriginal('status');
 | 
						|
    }
 | 
						|
 | 
						|
    public function status(): Attribute
 | 
						|
    {
 | 
						|
        return Attribute::make(
 | 
						|
            set: function ($value) {
 | 
						|
                if (str($value)->contains('(')) {
 | 
						|
                    $status = str($value)->before('(')->trim()->value();
 | 
						|
                    $health = str($value)->after('(')->before(')')->trim()->value() ?? 'unhealthy';
 | 
						|
                } elseif (str($value)->contains(':')) {
 | 
						|
                    $status = str($value)->before(':')->trim()->value();
 | 
						|
                    $health = str($value)->after(':')->trim()->value() ?? 'unhealthy';
 | 
						|
                } else {
 | 
						|
                    $status = $value;
 | 
						|
                    $health = 'unhealthy';
 | 
						|
                }
 | 
						|
 | 
						|
                return "$status:$health";
 | 
						|
            },
 | 
						|
            get: function ($value) {
 | 
						|
                if (str($value)->contains('(')) {
 | 
						|
                    $status = str($value)->before('(')->trim()->value();
 | 
						|
                    $health = str($value)->after('(')->before(')')->trim()->value() ?? 'unhealthy';
 | 
						|
                } elseif (str($value)->contains(':')) {
 | 
						|
                    $status = str($value)->before(':')->trim()->value();
 | 
						|
                    $health = str($value)->after(':')->trim()->value() ?? 'unhealthy';
 | 
						|
                } else {
 | 
						|
                    $status = $value;
 | 
						|
                    $health = 'unhealthy';
 | 
						|
                }
 | 
						|
 | 
						|
                return "$status:$health";
 | 
						|
            },
 | 
						|
        );
 | 
						|
    }
 | 
						|
 | 
						|
    public function tags()
 | 
						|
    {
 | 
						|
        return $this->morphToMany(Tag::class, 'taggable');
 | 
						|
    }
 | 
						|
 | 
						|
    public function project()
 | 
						|
    {
 | 
						|
        return data_get($this, 'environment.project');
 | 
						|
    }
 | 
						|
 | 
						|
    public function team()
 | 
						|
    {
 | 
						|
        return data_get($this, 'environment.project.team');
 | 
						|
    }
 | 
						|
 | 
						|
    public function sslCertificates()
 | 
						|
    {
 | 
						|
        return $this->morphMany(SslCertificate::class, 'resource');
 | 
						|
    }
 | 
						|
 | 
						|
    public function link()
 | 
						|
    {
 | 
						|
        if (data_get($this, 'environment.project.uuid')) {
 | 
						|
            return route('project.database.configuration', [
 | 
						|
                'project_uuid' => data_get($this, 'environment.project.uuid'),
 | 
						|
                'environment_uuid' => data_get($this, 'environment.uuid'),
 | 
						|
                'database_uuid' => data_get($this, 'uuid'),
 | 
						|
            ]);
 | 
						|
        }
 | 
						|
 | 
						|
        return null;
 | 
						|
    }
 | 
						|
 | 
						|
    public function isLogDrainEnabled()
 | 
						|
    {
 | 
						|
        return data_get($this, 'is_log_drain_enabled', false);
 | 
						|
    }
 | 
						|
 | 
						|
    public function portsMappings(): Attribute
 | 
						|
    {
 | 
						|
        return Attribute::make(
 | 
						|
            set: fn ($value) => $value === '' ? null : $value,
 | 
						|
        );
 | 
						|
    }
 | 
						|
 | 
						|
    public function portsMappingsArray(): Attribute
 | 
						|
    {
 | 
						|
        return Attribute::make(
 | 
						|
            get: fn () => is_null($this->ports_mappings)
 | 
						|
                ? []
 | 
						|
                : explode(',', $this->ports_mappings),
 | 
						|
 | 
						|
        );
 | 
						|
    }
 | 
						|
 | 
						|
    public function databaseType(): Attribute
 | 
						|
    {
 | 
						|
        return new Attribute(
 | 
						|
            get: fn () => $this->type(),
 | 
						|
        );
 | 
						|
    }
 | 
						|
 | 
						|
    public function type(): string
 | 
						|
    {
 | 
						|
        return 'standalone-dragonfly';
 | 
						|
    }
 | 
						|
 | 
						|
    protected function internalDbUrl(): Attribute
 | 
						|
    {
 | 
						|
        return new Attribute(
 | 
						|
            get: function () {
 | 
						|
                $scheme = $this->enable_ssl ? 'rediss' : 'redis';
 | 
						|
                $port = $this->enable_ssl ? 6380 : 6379;
 | 
						|
                $encodedPass = rawurlencode($this->dragonfly_password);
 | 
						|
                $url = "{$scheme}://:{$encodedPass}@{$this->uuid}:{$port}/0";
 | 
						|
 | 
						|
                if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
 | 
						|
                    $url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
 | 
						|
                }
 | 
						|
 | 
						|
                return $url;
 | 
						|
            }
 | 
						|
        );
 | 
						|
    }
 | 
						|
 | 
						|
    protected function externalDbUrl(): Attribute
 | 
						|
    {
 | 
						|
        return new Attribute(
 | 
						|
            get: function () {
 | 
						|
                if ($this->is_public && $this->public_port) {
 | 
						|
                    $scheme = $this->enable_ssl ? 'rediss' : 'redis';
 | 
						|
                    $encodedPass = rawurlencode($this->dragonfly_password);
 | 
						|
                    $url = "{$scheme}://:{$encodedPass}@{$this->destination->server->getIp}:{$this->public_port}/0";
 | 
						|
 | 
						|
                    if ($this->enable_ssl && $this->ssl_mode === 'verify-ca') {
 | 
						|
                        $url .= '?cacert=/etc/ssl/certs/coolify-ca.crt';
 | 
						|
                    }
 | 
						|
 | 
						|
                    return $url;
 | 
						|
                }
 | 
						|
 | 
						|
                return null;
 | 
						|
            }
 | 
						|
        );
 | 
						|
    }
 | 
						|
 | 
						|
    public function environment()
 | 
						|
    {
 | 
						|
        return $this->belongsTo(Environment::class);
 | 
						|
    }
 | 
						|
 | 
						|
    public function fileStorages()
 | 
						|
    {
 | 
						|
        return $this->morphMany(LocalFileVolume::class, 'resource');
 | 
						|
    }
 | 
						|
 | 
						|
    public function destination()
 | 
						|
    {
 | 
						|
        return $this->morphTo();
 | 
						|
    }
 | 
						|
 | 
						|
    public function runtime_environment_variables()
 | 
						|
    {
 | 
						|
        return $this->morphMany(EnvironmentVariable::class, 'resourceable');
 | 
						|
    }
 | 
						|
 | 
						|
    public function persistentStorages()
 | 
						|
    {
 | 
						|
        return $this->morphMany(LocalPersistentVolume::class, 'resource');
 | 
						|
    }
 | 
						|
 | 
						|
    public function scheduledBackups()
 | 
						|
    {
 | 
						|
        return $this->morphMany(ScheduledDatabaseBackup::class, 'database');
 | 
						|
    }
 | 
						|
 | 
						|
    public function getCpuMetrics(int $mins = 5)
 | 
						|
    {
 | 
						|
        $server = $this->destination->server;
 | 
						|
        $container_name = $this->uuid;
 | 
						|
        $from = now()->subMinutes($mins)->toIso8601ZuluString();
 | 
						|
        $metrics = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl -H \"Authorization: Bearer {$server->settings->sentinel_token}\" http://localhost:8888/api/container/{$container_name}/cpu/history?from=$from'"], $server, false);
 | 
						|
        if (str($metrics)->contains('error')) {
 | 
						|
            $error = json_decode($metrics, true);
 | 
						|
            $error = data_get($error, 'error', 'Something is not okay, are you okay?');
 | 
						|
            if ($error === 'Unauthorized') {
 | 
						|
                $error = 'Unauthorized, please check your metrics token or restart Sentinel to set a new token.';
 | 
						|
            }
 | 
						|
            throw new \Exception($error);
 | 
						|
        }
 | 
						|
        $metrics = json_decode($metrics, true);
 | 
						|
        $parsedCollection = collect($metrics)->map(function ($metric) {
 | 
						|
            return [(int) $metric['time'], (float) $metric['percent']];
 | 
						|
        });
 | 
						|
 | 
						|
        return $parsedCollection->toArray();
 | 
						|
    }
 | 
						|
 | 
						|
    public function getMemoryMetrics(int $mins = 5)
 | 
						|
    {
 | 
						|
        $server = $this->destination->server;
 | 
						|
        $container_name = $this->uuid;
 | 
						|
        $from = now()->subMinutes($mins)->toIso8601ZuluString();
 | 
						|
        $metrics = instant_remote_process(["docker exec coolify-sentinel sh -c 'curl -H \"Authorization: Bearer {$server->settings->sentinel_token}\" http://localhost:8888/api/container/{$container_name}/memory/history?from=$from'"], $server, false);
 | 
						|
        if (str($metrics)->contains('error')) {
 | 
						|
            $error = json_decode($metrics, true);
 | 
						|
            $error = data_get($error, 'error', 'Something is not okay, are you okay?');
 | 
						|
            if ($error === 'Unauthorized') {
 | 
						|
                $error = 'Unauthorized, please check your metrics token or restart Sentinel to set a new token.';
 | 
						|
            }
 | 
						|
            throw new \Exception($error);
 | 
						|
        }
 | 
						|
        $metrics = json_decode($metrics, true);
 | 
						|
        $parsedCollection = collect($metrics)->map(function ($metric) {
 | 
						|
            return [(int) $metric['time'], (float) $metric['used']];
 | 
						|
        });
 | 
						|
 | 
						|
        return $parsedCollection->toArray();
 | 
						|
    }
 | 
						|
 | 
						|
    public function isBackupSolutionAvailable()
 | 
						|
    {
 | 
						|
        return false;
 | 
						|
    }
 | 
						|
 | 
						|
    public function environment_variables()
 | 
						|
    {
 | 
						|
        return $this->morphMany(EnvironmentVariable::class, 'resourceable')
 | 
						|
            ->orderBy('key', 'asc');
 | 
						|
    }
 | 
						|
}
 |