@@ -323,18 +323,20 @@ export default class Coolify {
323
323
existingEdgeFunctionSecret . length > 0
324
324
? existingEdgeFunctionSecret [ 0 ] . id
325
325
: null
326
+ if ( ! edgeFunctionSecretUUID ) {
327
+ throw new Error ( 'Edge function secret not found in vault' )
328
+ }
326
329
const existingSupabaseProjectURLSecret =
327
330
await sql `SELECT id FROM vault.decrypted_secrets where name = 'supabase_project_url'`
328
331
const supabaseProjectURLSecretUUID =
329
332
existingSupabaseProjectURLSecret . length > 0
330
333
? existingSupabaseProjectURLSecret [ 0 ] . id
331
334
: null
332
- if ( edgeFunctionSecretUUID ) {
333
- await sql `SELECT vault.update_secret(${ edgeFunctionSecretUUID } , ${ edgeFunctionSecret } , 'edge-function-secret', 'Generated secret for edge functions invoked by postgres')`
334
- }
335
- if ( supabaseProjectURLSecretUUID ) {
336
- await sql `SELECT vault.update_secret(${ supabaseProjectURLSecretUUID } , ${ supabase_url } , 'supabase_project_url', 'Generated supabase project url')`
335
+ if ( ! supabaseProjectURLSecretUUID ) {
336
+ throw new Error ( 'Supabase project url secret not found in vault' )
337
337
}
338
+ await sql `SELECT vault.update_secret(${ edgeFunctionSecretUUID } , ${ edgeFunctionSecret } , 'edge-function-secret', 'Generated secret for edge functions invoked by postgres')`
339
+ await sql `SELECT vault.update_secret(${ supabaseProjectURLSecretUUID } , ${ supabase_url } , 'supabase_project_url', 'Generated supabase project url')`
338
340
await sql . end ( )
339
341
await tunnel . disconnect ( )
340
342
console . log ( 'Secrets updated' )
@@ -509,7 +511,6 @@ export default class Coolify {
509
511
'SERVICE_SUPABASE_FUNCTIONS_DEPLOYMENT_KEY'
510
512
)
511
513
const edgeFunctionSecret = getServiceEnvOrThrow ( 'EDGE_FUNCTION_SECRET' )
512
-
513
514
console . log ( `SERVICE_SUPABASE_URL: ${ supabase_url } ` )
514
515
await this . createOrUpdateEnv ( {
515
516
serviceUUID : backendServiceUUID ,
@@ -526,15 +527,6 @@ export default class Coolify {
526
527
uuid : backendServiceUUID
527
528
}
528
529
} )
529
- //Update vault secrets
530
- await this . updateSecrets ( {
531
- serviceUUID : backendServiceUUID ,
532
- deployToken : deploymentKey ,
533
- postgres_db,
534
- postgres_password,
535
- edgeFunctionSecret,
536
- supabase_url
537
- } )
538
530
}
539
531
return {
540
532
backendServiceUUID,
@@ -546,7 +538,8 @@ export default class Coolify {
546
538
supabase_anon_key,
547
539
supabase_service_role_key,
548
540
deploymentKey,
549
- isNewSupabaseService
541
+ isNewSupabaseService,
542
+ edgeFunctionSecret
550
543
}
551
544
}
552
545
async cleanup ( {
@@ -615,7 +608,8 @@ export default class Coolify {
615
608
supabase_anon_key,
616
609
supabase_service_role_key,
617
610
deploymentKey,
618
- isNewSupabaseService
611
+ isNewSupabaseService,
612
+ edgeFunctionSecret
619
613
} = await this . getSupabaseServiceUUIDOrCreateNewOne ( {
620
614
supabaseComponentName,
621
615
ephemeral
@@ -652,6 +646,17 @@ export default class Coolify {
652
646
resetDb : isNewSupabaseService || reset_supabase_db ,
653
647
postgresPassword : postgres_password
654
648
} )
649
+ if ( isNewSupabaseService ) {
650
+ //Update vault secrets
651
+ await this . updateSecrets ( {
652
+ serviceUUID : backendServiceUUID ,
653
+ deployToken : deploymentKey ,
654
+ postgres_db,
655
+ postgres_password,
656
+ edgeFunctionSecret,
657
+ supabase_url
658
+ } )
659
+ }
655
660
656
661
const existingFrontendApp = existingApplications . data ?. find (
657
662
( app ) => app . name === frontendAppName
0 commit comments