import { updateServersBasedOnQuantity } from "@/pages/api/stripe/webhook"; import { createTRPCRouter, protectedProcedure } from "@/server/api/trpc"; import { db } from "@/server/db"; import { apiCreateServer, apiFindOneServer, apiRemoveServer, apiUpdateServer, apiUpdateServerMonitoring, applications, compose, mariadb, mongo, mysql, organization, postgres, redis, server, } from "@/server/db/schema"; import { IS_CLOUD, createServer, defaultCommand, deleteServer, findServerById, findServersByUserId, findUserById, getPublicIpWithFallback, haveActiveServices, removeDeploymentsByServerId, serverAudit, serverSetup, serverValidate, setupMonitoring, updateServerById, } from "@dokploy/server"; import { TRPCError } from "@trpc/server"; import { observable } from "@trpc/server/observable"; import { and, desc, eq, getTableColumns, isNotNull, sql } from "drizzle-orm"; import { z } from "zod"; export const serverRouter = createTRPCRouter({ create: protectedProcedure .input(apiCreateServer) .mutation(async ({ ctx, input }) => { try { const user = await findUserById(ctx.user.ownerId); const servers = await findServersByUserId(user.id); if (IS_CLOUD && servers.length >= user.serversQuantity) { throw new TRPCError({ code: "BAD_REQUEST", message: "You cannot create more servers", }); } const project = await createServer( input, ctx.session.activeOrganizationId, ); return project; } catch (error) { throw new TRPCError({ code: "BAD_REQUEST", message: "Error creating the server", cause: error, }); } }), one: protectedProcedure .input(apiFindOneServer) .query(async ({ input, ctx }) => { const server = await findServerById(input.serverId); if (server.organizationId !== ctx.session.activeOrganizationId) { throw new TRPCError({ code: "UNAUTHORIZED", message: "You are not authorized to access this server", }); } return server; }), getDefaultCommand: protectedProcedure .input(apiFindOneServer) .query(async () => { return defaultCommand(); }), all: protectedProcedure.query(async ({ ctx }) => { const result = await db .select({ ...getTableColumns(server), totalSum: sql`cast(count(${applications.applicationId}) + count(${compose.composeId}) + count(${redis.redisId}) + count(${mariadb.mariadbId}) + count(${mongo.mongoId}) + count(${mysql.mysqlId}) + count(${postgres.postgresId}) as integer)`, }) .from(server) .leftJoin(applications, eq(applications.serverId, server.serverId)) .leftJoin(compose, eq(compose.serverId, server.serverId)) .leftJoin(redis, eq(redis.serverId, server.serverId)) .leftJoin(mariadb, eq(mariadb.serverId, server.serverId)) .leftJoin(mongo, eq(mongo.serverId, server.serverId)) .leftJoin(mysql, eq(mysql.serverId, server.serverId)) .leftJoin(postgres, eq(postgres.serverId, server.serverId)) .where(eq(server.organizationId, ctx.session.activeOrganizationId)) .orderBy(desc(server.createdAt)) .groupBy(server.serverId); return result; }), count: protectedProcedure.query(async ({ ctx }) => { const organizations = await db.query.organization.findMany({ where: eq(organization.ownerId, ctx.user.id), with: { servers: true, }, }); const servers = organizations.flatMap((org) => org.servers); return servers.length ?? 0; }), withSSHKey: protectedProcedure.query(async ({ ctx }) => { const result = await db.query.server.findMany({ orderBy: desc(server.createdAt), where: IS_CLOUD ? and( isNotNull(server.sshKeyId), eq(server.organizationId, ctx.session.activeOrganizationId), eq(server.serverStatus, "active"), ) : and( isNotNull(server.sshKeyId), eq(server.organizationId, ctx.session.activeOrganizationId), ), }); return result; }), setup: protectedProcedure .input(apiFindOneServer) .mutation(async ({ input, ctx }) => { try { const server = await findServerById(input.serverId); if (server.organizationId !== ctx.session.activeOrganizationId) { throw new TRPCError({ code: "UNAUTHORIZED", message: "You are not authorized to setup this server", }); } const currentServer = await serverSetup(input.serverId); return currentServer; } catch (error) { throw error; } }), setupWithLogs: protectedProcedure .meta({ openapi: { path: "/deploy/server-with-logs", method: "POST", override: true, enabled: false, }, }) .input(apiFindOneServer) .subscription(async ({ input, ctx }) => { try { const server = await findServerById(input.serverId); if (server.organizationId !== ctx.session.activeOrganizationId) { throw new TRPCError({ code: "UNAUTHORIZED", message: "You are not authorized to setup this server", }); } return observable((emit) => { serverSetup(input.serverId, (log) => { emit.next(log); }); }); } catch (error) { throw error; } }), validate: protectedProcedure .input(apiFindOneServer) .query(async ({ input, ctx }) => { try { const server = await findServerById(input.serverId); if (server.organizationId !== ctx.session.activeOrganizationId) { throw new TRPCError({ code: "UNAUTHORIZED", message: "You are not authorized to validate this server", }); } const response = await serverValidate(input.serverId); return response as unknown as { docker: { enabled: boolean; version: string; }; rclone: { enabled: boolean; version: string; }; nixpacks: { enabled: boolean; version: string; }; buildpacks: { enabled: boolean; version: string; }; railpack: { enabled: boolean; version: string; }; isDokployNetworkInstalled: boolean; isSwarmInstalled: boolean; isMainDirectoryInstalled: boolean; }; } catch (error) { throw new TRPCError({ code: "BAD_REQUEST", message: error instanceof Error ? error?.message : `Error: ${error}`, cause: error as Error, }); } }), security: protectedProcedure .input(apiFindOneServer) .query(async ({ input, ctx }) => { try { const server = await findServerById(input.serverId); if (server.organizationId !== ctx.session.activeOrganizationId) { throw new TRPCError({ code: "UNAUTHORIZED", message: "You are not authorized to validate this server", }); } const response = await serverAudit(input.serverId); return response as unknown as { ufw: { installed: boolean; active: boolean; defaultIncoming: string; }; ssh: { enabled: boolean; keyAuth: boolean; permitRootLogin: string; passwordAuth: string; usePam: string; }; nonRootUser: { hasValidSudoUser: boolean; }; unattendedUpgrades: { installed: boolean; active: boolean; updateEnabled: number; upgradeEnabled: number; }; fail2ban: { installed: boolean; enabled: boolean; active: boolean; sshEnabled: string; sshMode: string; }; }; } catch (error) { throw new TRPCError({ code: "BAD_REQUEST", message: error instanceof Error ? error?.message : `Error: ${error}`, cause: error as Error, }); } }), setupMonitoring: protectedProcedure .input(apiUpdateServerMonitoring) .mutation(async ({ input, ctx }) => { try { const server = await findServerById(input.serverId); if (server.organizationId !== ctx.session.activeOrganizationId) { throw new TRPCError({ code: "UNAUTHORIZED", message: "You are not authorized to setup this server", }); } await updateServerById(input.serverId, { metricsConfig: { server: { type: "Remote", refreshRate: input.metricsConfig.server.refreshRate, retentionDays: input.metricsConfig.server.retentionDays, port: input.metricsConfig.server.port, token: input.metricsConfig.server.token, urlCallback: input.metricsConfig.server.urlCallback, cronJob: input.metricsConfig.server.cronJob, thresholds: { cpu: input.metricsConfig.server.thresholds.cpu, memory: input.metricsConfig.server.thresholds.memory, }, }, containers: { refreshRate: input.metricsConfig.containers.refreshRate, services: { include: input.metricsConfig.containers.services.include || [], exclude: input.metricsConfig.containers.services.exclude || [], }, }, }, }); const currentServer = await setupMonitoring(input.serverId); return currentServer; } catch (error) { throw error; } }), remove: protectedProcedure .input(apiRemoveServer) .mutation(async ({ input, ctx }) => { try { const server = await findServerById(input.serverId); if (server.organizationId !== ctx.session.activeOrganizationId) { throw new TRPCError({ code: "UNAUTHORIZED", message: "You are not authorized to delete this server", }); } const activeServers = await haveActiveServices(input.serverId); if (activeServers) { throw new TRPCError({ code: "BAD_REQUEST", message: "Server has active services, please delete them first", }); } const currentServer = await findServerById(input.serverId); await removeDeploymentsByServerId(currentServer); await deleteServer(input.serverId); if (IS_CLOUD) { const admin = await findUserById(ctx.user.ownerId); await updateServersBasedOnQuantity(admin.id, admin.serversQuantity); } return currentServer; } catch (error) { throw error; } }), update: protectedProcedure .input(apiUpdateServer) .mutation(async ({ input, ctx }) => { try { const server = await findServerById(input.serverId); if (server.organizationId !== ctx.session.activeOrganizationId) { throw new TRPCError({ code: "UNAUTHORIZED", message: "You are not authorized to update this server", }); } if (server.serverStatus === "inactive") { throw new TRPCError({ code: "NOT_FOUND", message: "Server is inactive", }); } const currentServer = await updateServerById(input.serverId, { ...input, }); return currentServer; } catch (error) { throw error; } }), publicIp: protectedProcedure.query(async () => { if (IS_CLOUD) { return ""; } const ip = await getPublicIpWithFallback(); return ip; }), getServerMetrics: protectedProcedure .input( z.object({ url: z.string(), token: z.string(), dataPoints: z.string(), }), ) .query(async ({ input }) => { try { const url = new URL(input.url); url.searchParams.append("limit", input.dataPoints); const response = await fetch(url.toString(), { headers: { Authorization: `Bearer ${input.token}`, }, }); if (!response.ok) { throw new Error( `Error ${response.status}: ${response.statusText}. Ensure the container is running and this service is included in the monitoring configuration.`, ); } const data = await response.json(); if (!Array.isArray(data) || data.length === 0) { throw new Error( [ "No monitoring data available. This could be because:", "", "1. You don't have setup the monitoring service, you can do in web server section.", "2. If you already have setup the monitoring service, wait a few minutes and refresh the page.", ].join("\n"), ); } return data as { cpu: string; cpuModel: string; cpuCores: number; cpuPhysicalCores: number; cpuSpeed: number; os: string; distro: string; kernel: string; arch: string; memUsed: string; memUsedGB: string; memTotal: string; uptime: number; diskUsed: string; totalDisk: string; networkIn: string; networkOut: string; timestamp: string; }[]; } catch (error) { throw error; } }), });