Refactor (#10)

* refactor: cleanup duplicated logic

* refactor: cleanup config.rs

* refactor: cleanup explain.rs

* refactor: cleanup instance.rs

* refactor: cleanup

* refactor: use UnixStream instead of status file

* Refactor vm lifetime (#8)

* fix: handle vm supervisor being killed

* fix: fixed the loop connection retry

* refactor: extracted vm_manager liveness check logic

* Script failure report (#9)

* feat: added script failure report

* feat: vm error report can also report ssh.sh

* refactor: liveness check when connecting to ssh

* fix: fixed the wrong InstanceError::VMError

* fix: fixed the is_lock_stable
This commit is contained in:
Finn Sheng
2026-02-15 18:09:38 -05:00
committed by GitHub
parent e1d484ee9d
commit 23726d7420
16 changed files with 1362 additions and 800 deletions
Generated
+17
View File
@@ -82,6 +82,12 @@ dependencies = [
"windows-sys 0.61.2",
]
[[package]]
name = "anyhow"
version = "1.0.101"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5f0e0fee31ef5ed1ba1316088939cea399010ed7731dba877ed44aeb407a75ea"
[[package]]
name = "assert_cmd"
version = "2.1.2"
@@ -144,6 +150,15 @@ version = "3.19.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5dd9dc738b7a8311c7ade152424974d8115f2cdad61e8dab8dac9f2362298510"
[[package]]
name = "bytesize"
version = "2.3.1"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "6bd91ee7b2422bcb158d90ef4d14f75ef67f340943fc4149891dcce8f8b972a3"
dependencies = [
"serde_core",
]
[[package]]
name = "cassowary"
version = "0.3.0"
@@ -1305,8 +1320,10 @@ checksum = "ba73ea9cf16a25df0c8caa16c51acb937d5712a8429db78a3ee29d5dcacd3a65"
name = "vibebox"
version = "0.3.1"
dependencies = [
"anyhow",
"assert_cmd",
"block2",
"bytesize",
"clap",
"color-eyre",
"crossterm",
+2
View File
@@ -42,6 +42,8 @@ ratatui = { version = "0.29.0", features = ["unstable-rendered-line-info"] }
tracing = "0.1"
tracing-subscriber = { version = "0.3", features = ["env-filter"] }
dialoguer = "0.12.0"
bytesize = {version = "2.3.1",features = ["serde"]}
anyhow = "1.0.101"
[dev-dependencies]
assert_cmd = "2"
+14 -10
View File
@@ -25,7 +25,7 @@
5. [x] Implement rendering functions for header, terminal area, input area, completions, and status bar.
6. [x] Implement async event loop (keyboard, resize, tick) with crossterm EventStream + tokio.
7. [x] Add a standalone TUI CLI binary (no main.rs wiring) with placeholder VM info and TODOs for VM integration.
8. [ ] Run tests and validate coverage for the new module.
8. [x] Run tests and validate coverage for the new module.
## TUI
@@ -49,19 +49,23 @@
4. [x] set up the cli.
9. [x] fix ui overlap, and consistency issue.
10. [x] `purge-cache` to clear the cache.
11. [ ] intensive integration test.
11. [x] intensive integration test.
## Publish
1. [ ] write the docs.
2. [ ] setup quick install link.
3. [ ] setup website.
1. [x] write the docs.
2. [x] setup quick install link.
3. [x] setup website.
## Stage 2
1. [ ] retouch the cli ux.
2. [ ] refactor the code.
3. [ ] Redirect vm output to log.
4. [ ] Redirect vm output to vibebox starting it.
5. [ ] use anyhow to sync api.
6. [ ] add support for ipv6.
2. [x] refactor the code.
3. [ ] refactor the mount system.
4. [x] refactor the vm process lifetime.
5. [x] Redirect vm output to log.
6. [x] Redirect vm output to vibebox starting it.
7. [x] use anyhow to sync api.
8. [ ] add support for ipv6.
9. [x] use UnixStream instead of status file
10. [x] liveness check should also happen when waiting for ssh port
+8 -7
View File
@@ -21,15 +21,16 @@ fn main() -> Result<()> {
color_eyre::install()?;
tracing::info!("starting vm supervisor");
let cwd = env::current_dir().map_err(|err| color_eyre::eyre::eyre!(err.to_string()))?;
let config = config::load_config(&cwd);
let instance_dir = instance::ensure_instance_dir(&cwd)
let project_dir = env::current_dir().map_err(|err| color_eyre::eyre::eyre!(err.to_string()))?;
let config = config::load_config(&project_dir)
.map_err(|err| color_eyre::eyre::eyre!(err.to_string()))?;
let _ = instance::touch_last_active(&instance_dir);
let _ = instance::ensure_instance_dir(&project_dir)
.map_err(|err| color_eyre::eyre::eyre!(err.to_string()))?;
let _ = instance::touch_last_active(&project_dir);
let args = vm::VmArg {
cpu_count: config.box_cfg.cpu_count,
ram_bytes: config.box_cfg.ram_mb.saturating_mul(1024 * 1024),
disk_bytes: config.box_cfg.disk_gb.saturating_mul(1024 * 1024 * 1024),
ram_bytes: config.box_cfg.ram_size.as_u64(),
disk_bytes: config.box_cfg.disk_size.as_u64(),
no_default_mounts: false,
mounts: config.box_cfg.mounts.clone(),
};
@@ -37,7 +38,7 @@ fn main() -> Result<()> {
tracing::info!(auto_shutdown_ms, "vm supervisor config");
let result = vm_manager::run_manager(args, auto_shutdown_ms);
let _ = instance::touch_last_active(&instance_dir);
let _ = instance::touch_last_active(&project_dir);
if let Err(err) = result {
tracing::error!(error = %err, "vm supervisor exited");
return Err(color_eyre::eyre::eyre!(err.to_string()));
+53 -95
View File
@@ -1,3 +1,7 @@
use bytesize::ByteSize;
use clap::Parser;
use color_eyre::Result;
use dialoguer::Confirm;
use std::{
env,
ffi::OsString,
@@ -6,10 +10,6 @@ use std::{
path::{Path, PathBuf},
sync::{Arc, Mutex},
};
use clap::Parser;
use color_eyre::Result;
use dialoguer::Confirm;
use time::OffsetDateTime;
use time::format_description::well_known::Rfc3339;
use tracing_subscriber::filter::LevelFilter;
@@ -17,8 +17,9 @@ use tracing_subscriber::registry::Registry;
use tracing_subscriber::{EnvFilter, fmt, prelude::*, reload};
use vibebox::tui::{AppState, VmInfo};
use vibebox::utils::relative_to_home;
use vibebox::{
SessionManager, commands, config, explain, instance, session_manager, tui, vm, vm_manager,
SessionManager, commands, config, explain, instance, session_manager, tui, vm_manager,
};
#[derive(Debug, Parser)]
@@ -56,53 +57,26 @@ fn main() -> Result<()> {
let config_override = cli.config.clone();
let raw_args: Vec<OsString> = env::args_os().collect();
let config = config::load_config_with_path(&cwd, config_override.as_deref());
let config = config::load_config_with_path(&cwd, config_override.as_deref())
.map_err(|err| color_eyre::eyre::eyre!(err.to_string()))?;
if env::var("VIBEBOX_VM_MANAGER").as_deref() == Ok("1") {
tracing::info!("starting vm manager mode");
let args = vm::VmArg {
cpu_count: config.box_cfg.cpu_count,
ram_bytes: config.box_cfg.ram_mb.saturating_mul(1024 * 1024),
disk_bytes: config.box_cfg.disk_gb.saturating_mul(1024 * 1024 * 1024),
no_default_mounts: false,
mounts: config.box_cfg.mounts.clone(),
};
let auto_shutdown_ms = config.supervisor.auto_shutdown_ms;
tracing::info!(auto_shutdown_ms, "vm manager config");
if let Err(err) = vm_manager::run_manager(args, auto_shutdown_ms) {
tracing::error!(error = %err, "vm manager exited");
return Err(color_eyre::eyre::eyre!(err.to_string()));
}
return Ok(());
}
vm::ensure_signed();
let vm_args = vm::VmArg {
cpu_count: config.box_cfg.cpu_count,
ram_bytes: config.box_cfg.ram_mb.saturating_mul(1024 * 1024),
disk_bytes: config.box_cfg.disk_gb.saturating_mul(1024 * 1024 * 1024),
no_default_mounts: false,
mounts: config.box_cfg.mounts.clone(),
};
let auto_shutdown_ms = config.supervisor.auto_shutdown_ms;
let vm_info = VmInfo {
max_memory_mb: vm_args.ram_bytes / (1024 * 1024),
cpu_cores: vm_args.cpu_count,
max_disk_gb: (vm_args.disk_bytes as f32) / 1024.0 / 1024.0 / 1024.0,
max_memory: config.box_cfg.ram_size,
cpu_cores: config.box_cfg.cpu_count,
max_disk: config.box_cfg.disk_size,
system_name: "Debian".to_string(), // TODO: read system name from the VM.
auto_shutdown_ms,
auto_shutdown_ms: config.supervisor.auto_shutdown_ms,
};
if let Ok(manager) = SessionManager::new() {
if let Err(err) = manager.update_global_sessions(&cwd) {
tracing::warn!(error = %err, "failed to update a global session list");
}
} else {
tracing::warn!("failed to initialize session manager");
tracing::error!("failed to initialize session manager");
std::process::exit(1);
}
let commands = commands::build_commands();
let app = Arc::new(Mutex::new(AppState::new(cwd.clone(), vm_info, commands)));
{
let mut locked = app.lock().expect("app state poisoned");
tui::render_tui_once(&mut locked)?;
@@ -112,24 +86,40 @@ fn main() -> Result<()> {
writeln!(stdout)?;
stdout.flush()?;
}
warn_disk_size_mismatch(&cwd, vm_args.disk_bytes);
warn_disk_size_mismatch(&cwd, config.box_cfg.disk_size);
if let Some(handle) = stderr_handle {
let _ = handle.modify(|filter| *filter = LevelFilter::INFO);
}
tracing::debug!(auto_shutdown_ms, "auto shutdown config");
let manager_conn =
vm_manager::ensure_manager(&raw_args, auto_shutdown_ms, config_override.as_deref())
.map_err(|err| {
tracing::error!(error = %err, "failed to ensure vm manager");
color_eyre::eyre::eyre!(err.to_string())
})?;
instance::run_with_ssh(manager_conn).map_err(|err| {
tracing::debug!(config.supervisor.auto_shutdown_ms, "auto shutdown config");
let manager_conn = vm_manager::ensure_manager(
&raw_args,
config.supervisor.auto_shutdown_ms,
config_override.as_deref(),
)
.map_err(|err| {
tracing::error!(error = %err, "failed to ensure vm manager");
color_eyre::eyre::eyre!(err.to_string())
})?;
if let Err(err) = instance::run_with_ssh(manager_conn) {
if let Some(instance::InstanceError::UnexpectedDisconnection) =
err.downcast_ref::<instance::InstanceError>()
{
tracing::warn!("vm manager disconnected; exiting vibebox");
} else if let Some(instance::InstanceError::VMError(vm_error)) =
err.downcast_ref::<instance::InstanceError>()
{
tracing::error!("[vm]: {vm_error}");
tracing::info!("vibecoding paused: the VM says today is a rest day 😴");
std::process::exit(1);
} else {
let message = err.to_string();
tracing::error!(error = %message, "vibebox exited: uncaught error");
return Err(color_eyre::eyre::eyre!(message));
}
}
tracing::info!("See you again — keep vibecoding (no SEVs, only vibes) 😈");
Ok(())
@@ -211,13 +201,14 @@ fn handle_command(command: Command, cwd: &Path, config_override: Option<&Path>)
"Purged {} file{} totaling {} from {}",
file_count,
if file_count == 1 { "" } else { "s" },
format_bytes(total_bytes),
ByteSize(total_bytes),
cache_dir.display()
);
Ok(())
}
Command::Explain => {
let config = config::load_config_with_path(cwd, config_override);
let config = config::load_config_with_path(cwd, config_override)
.map_err(|err| color_eyre::eyre::eyre!(err.to_string()))?;
let mounts = explain::build_mount_rows(cwd, &config)
.map_err(|err| color_eyre::eyre::eyre!(err.to_string()))?;
let networks = explain::build_network_rows(cwd)
@@ -240,20 +231,6 @@ fn project_name(directory: &Path) -> String {
.to_string()
}
fn relative_to_home(directory: &Path) -> String {
let Ok(home) = env::var("HOME") else {
return directory.display().to_string();
};
let home_path = PathBuf::from(home);
if let Ok(stripped) = directory.strip_prefix(&home_path) {
if stripped.components().next().is_none() {
return "~".to_string();
}
return format!("~/{}", stripped.display());
}
directory.display().to_string()
}
fn cache_dir() -> Result<PathBuf> {
let home = env::var("HOME").map(PathBuf::from)?;
let cache_home = env::var("XDG_CACHE_HOME")
@@ -302,23 +279,6 @@ fn measure_dir(path: &Path) -> Result<(u64, u64)> {
Ok((file_count, total_bytes))
}
fn format_bytes(bytes: u64) -> String {
const KB: f64 = 1024.0;
const MB: f64 = KB * 1024.0;
const GB: f64 = MB * 1024.0;
let b = bytes as f64;
if b >= GB {
format!("{:.2} GB", b / GB)
} else if b >= MB {
format!("{:.1} MB", b / MB)
} else if b >= KB {
format!("{:.1} KB", b / KB)
} else {
format!("{} B", bytes)
}
}
fn format_last_active(value: Option<&str>) -> String {
let Some(raw) = value else {
return "-".to_string();
@@ -360,24 +320,22 @@ fn format_last_active(value: Option<&str>) -> String {
format!("{} day{} ago", days, if days == 1 { "" } else { "s" })
}
fn warn_disk_size_mismatch(cwd: &Path, configured_bytes: u64) {
fn warn_disk_size_mismatch(cwd: &Path, configured_size: ByteSize) {
let instance_raw = cwd
.join(session_manager::INSTANCE_DIR_NAME)
.join("instance.raw");
let Ok(meta) = fs::metadata(&instance_raw) else {
return;
};
let current_bytes = meta.len();
if current_bytes == configured_bytes {
let current_size = ByteSize::b(meta.len());
if current_size == configured_size {
return;
}
let current_gb = current_bytes as f64 / (1024.0 * 1024.0 * 1024.0);
let target_gb = configured_bytes as f64 / (1024.0 * 1024.0 * 1024.0);
tracing::warn!(
"instance disk size does not match config (current {:.2} GB, config {:.2} GB). \
"instance disk size does not match config (current {}, config {}). \
disk_gb applies only on init. Run `vibebox reset` to recreate or set disk_gb to match; using the existing disk.",
current_gb,
target_gb
current_size,
configured_size,
);
}
@@ -386,13 +344,13 @@ type StderrHandle = reload::Handle<LevelFilter, Registry>;
fn init_tracing(cwd: &Path) -> Option<StderrHandle> {
let filter = EnvFilter::try_from_default_env().unwrap_or_else(|_| EnvFilter::new("debug"));
let file_filter = filter.clone();
let stderr_is_tty = std::io::stderr().is_terminal();
let stderr_is_tty = io::stderr().is_terminal();
let ansi = stderr_is_tty && env::var("VIBEBOX_LOG_NO_COLOR").is_err();
let file = instance::ensure_instance_dir(cwd)
.ok()
.and_then(|instance_dir| {
let log_path = instance_dir.join("cli.log");
std::fs::OpenOptions::new()
fs::OpenOptions::new()
.create(true)
.write(true)
.truncate(true)
@@ -406,7 +364,7 @@ fn init_tracing(cwd: &Path) -> Option<StderrHandle> {
.with_target(false)
.with_ansi(ansi)
.without_time()
.with_writer(std::io::stderr)
.with_writer(io::stderr)
.with_filter(stderr_filter);
let subscriber = tracing_subscriber::registry().with(stderr_layer);
if let Some(file) = file {
@@ -424,7 +382,7 @@ fn init_tracing(cwd: &Path) -> Option<StderrHandle> {
let stderr_layer = fmt::layer()
.with_target(false)
.with_ansi(ansi)
.with_writer(std::io::stderr)
.with_writer(io::stderr)
.with_filter(filter);
let subscriber = tracing_subscriber::registry().with(stderr_layer);
if let Some(file) = file {
+467 -77
View File
@@ -1,13 +1,14 @@
use anyhow::{Context, Error, Result, bail};
use bytesize::ByteSize;
use serde::{Deserialize, Serialize};
use std::{
env, fs, io,
path::{Path, PathBuf},
};
use serde::{Deserialize, Serialize};
use crate::vm::DirectoryShare;
pub const CONFIG_FILENAME: &str = "vibebox.toml";
const CONFIG_FILENAME: &str = "vibebox.toml";
pub const CONFIG_PATH_ENV: &str = "VIBEBOX_CONFIG_PATH";
const DEFAULT_CPU_COUNT: usize = 2;
@@ -22,20 +23,83 @@ pub struct Config {
pub supervisor: SupervisorConfig,
}
const MI_B: u64 = 1024 * 1024;
const GI_B: u64 = 1024 * 1024 * 1024;
mod serde_mb {
use super::{ByteSize, MI_B};
use serde::{Deserialize, Deserializer, Serializer};
pub fn serialize<S>(v: &ByteSize, s: S) -> Result<S::Ok, S::Error>
where
S: Serializer,
{
let bytes = v.0;
if !bytes.is_multiple_of(MI_B) {
return Err(serde::ser::Error::custom(
"ram_mb must be an integer number of MB",
));
}
s.serialize_u64(bytes / MI_B)
}
pub fn deserialize<'de, D>(d: D) -> Result<ByteSize, D::Error>
where
D: Deserializer<'de>,
{
let mb = u64::deserialize(d)?;
let bytes = mb
.checked_mul(MI_B)
.ok_or_else(|| serde::de::Error::custom("ram_mb overflow"))?;
Ok(ByteSize(bytes))
}
}
mod serde_gb {
use super::{ByteSize, GI_B};
use serde::{Deserialize, Deserializer, Serializer};
pub fn serialize<S>(v: &ByteSize, s: S) -> Result<S::Ok, S::Error>
where
S: Serializer,
{
let bytes = v.0;
if !bytes.is_multiple_of(GI_B) {
return Err(serde::ser::Error::custom(
"disk_gb must be an integer number of GB",
));
}
s.serialize_u64(bytes / GI_B)
}
pub fn deserialize<'de, D>(d: D) -> Result<ByteSize, D::Error>
where
D: Deserializer<'de>,
{
let gb = u64::deserialize(d)?;
let bytes = gb
.checked_mul(GI_B)
.ok_or_else(|| serde::de::Error::custom("disk_gb overflow"))?;
Ok(ByteSize(bytes))
}
}
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct BoxConfig {
pub cpu_count: usize,
pub ram_mb: u64,
pub disk_gb: u64,
#[serde(rename = "ram_mb", with = "serde_mb")]
pub ram_size: ByteSize,
#[serde(rename = "disk_gb", with = "serde_gb")]
pub disk_size: ByteSize,
pub mounts: Vec<String>,
}
impl Default for BoxConfig {
fn default() -> Self {
Self {
cpu_count: default_cpu_count(),
ram_mb: default_ram_mb(),
disk_gb: default_disk_gb(),
cpu_count: DEFAULT_CPU_COUNT,
ram_size: ByteSize::mib(DEFAULT_RAM_MB),
disk_size: ByteSize::gib(DEFAULT_DISK_GB),
mounts: default_mounts(),
}
}
@@ -49,23 +113,11 @@ pub struct SupervisorConfig {
impl Default for SupervisorConfig {
fn default() -> Self {
Self {
auto_shutdown_ms: default_auto_shutdown_ms(),
auto_shutdown_ms: DEFAULT_AUTO_SHUTDOWN_MS,
}
}
}
fn default_cpu_count() -> usize {
DEFAULT_CPU_COUNT
}
fn default_ram_mb() -> u64 {
DEFAULT_RAM_MB
}
fn default_auto_shutdown_ms() -> u64 {
DEFAULT_AUTO_SHUTDOWN_MS
}
fn default_mounts() -> Vec<String> {
vec![
"~/.codex:~/.codex:read-write".into(),
@@ -73,19 +125,12 @@ fn default_mounts() -> Vec<String> {
]
}
fn default_disk_gb() -> u64 {
DEFAULT_DISK_GB
}
pub fn config_path(project_root: &Path) -> PathBuf {
project_root.join(CONFIG_FILENAME)
}
pub fn ensure_config_file(
project_root: &Path,
override_path: Option<&Path>,
) -> Result<PathBuf, io::Error> {
let path = resolve_config_path(project_root, override_path);
pub fn ensure_config_file(project_root: &Path, override_path: Option<&Path>) -> Result<PathBuf> {
let path = resolve_config_path(project_root, override_path)?;
if !path.exists() {
let default_config = Config::default();
let contents = toml::to_string_pretty(&default_config).unwrap_or_default();
@@ -95,32 +140,24 @@ pub fn ensure_config_file(
Ok(path)
}
pub fn load_config(project_root: &Path) -> Config {
pub fn load_config(project_root: &Path) -> Result<Config> {
load_config_with_path(project_root, None)
}
pub fn load_config_with_path(project_root: &Path, override_path: Option<&Path>) -> Config {
let path = match ensure_config_file(project_root, override_path) {
Ok(path) => path,
Err(err) => die(&format!("failed to create config: {err}")),
};
let raw = match fs::read_to_string(&path) {
Ok(raw) => raw,
Err(err) => die(&format!("failed to read config: {err}")),
};
pub fn load_config_with_path(project_root: &Path, override_path: Option<&Path>) -> Result<Config> {
let path =
ensure_config_file(project_root, override_path).context("failed to create config")?;
let raw = fs::read_to_string(&path).context("failed to read config")?;
let trimmed = raw.trim();
tracing::debug!(path = %path.display(), bytes = raw.len(), "loaded vibebox config");
if trimmed.is_empty() {
die(&format!(
bail!(format!(
"config file ({}) is empty. Required fields: [box].cpu_count (integer), [box].ram_mb (integer), [box].disk_gb (integer), [box].mounts (array of strings), [supervisor].auto_shutdown_ms (integer)",
path.display()
));
}
let value: toml::Value = match toml::from_str(trimmed) {
Ok(value) => value,
Err(err) => die(&format!("invalid config: {err}")),
};
let value: toml::Value = toml::from_str(trimmed).context("invalid config")?;
let schema_errors = validate_schema(&value);
if !schema_errors.is_empty() {
let message = format!(
@@ -128,27 +165,28 @@ pub fn load_config_with_path(project_root: &Path, override_path: Option<&Path>)
path.display(),
schema_errors.join("\n- ")
);
die(&message);
bail!(message);
}
let config: Config = match toml::from_str(trimmed) {
Ok(config) => config,
Err(err) => die(&format!("invalid config: {err}")),
};
validate_or_exit(&config);
config
let config: Config = toml::from_str(trimmed).context("invalid config")?;
validate_config(&config).map_err(Error::msg)?;
Ok(config)
}
fn resolve_config_path(project_root: &Path, override_path: Option<&Path>) -> PathBuf {
let root = match fs::canonicalize(project_root) {
Ok(root) => root,
Err(err) => die(&format!("failed to resolve project root: {err}")),
};
fn resolve_config_path(project_root: &Path, override_path: Option<&Path>) -> Result<PathBuf> {
let env_override = env::var_os(CONFIG_PATH_ENV).map(PathBuf::from);
resolve_config_path_inner(project_root, override_path, env_override)
}
let override_path = override_path
.map(PathBuf::from)
.or_else(|| env::var_os(CONFIG_PATH_ENV).map(PathBuf::from));
let raw_path = if let Some(path) = override_path {
fn resolve_config_path_inner(
project_root: &Path,
override_path: Option<&Path>,
env_override: Option<PathBuf>,
) -> Result<PathBuf> {
let root = fs::canonicalize(project_root).context("failed to resolve project root")?;
let selected_path = override_path.map(PathBuf::from).or(env_override);
let raw_path = if let Some(path) = selected_path {
if path.is_absolute() {
path
} else {
@@ -159,14 +197,50 @@ fn resolve_config_path(project_root: &Path, override_path: Option<&Path>) -> Pat
};
let normalized = normalize_path(&raw_path);
if !normalized.starts_with(&root) {
die(&format!(
let resolved =
resolve_path_for_boundary_check(&normalized).context("failed to resolve config path")?;
if !resolved.starts_with(&root) {
bail!(
"config path must be within {}: {}",
root.display(),
normalized.display()
));
resolved.display()
);
}
normalized
Ok(normalized)
}
fn resolve_path_for_boundary_check(path: &Path) -> Result<PathBuf, io::Error> {
if path.exists() {
return fs::canonicalize(path);
}
let (ancestor, missing) = nearest_existing_ancestor(path)?;
let mut resolved = fs::canonicalize(ancestor)?;
for part in missing {
resolved.push(part);
}
Ok(resolved)
}
fn nearest_existing_ancestor(path: &Path) -> Result<(&Path, Vec<std::ffi::OsString>), io::Error> {
let mut current = path;
let mut missing = Vec::new();
while !current.exists() {
let name = current.file_name().ok_or_else(|| {
io::Error::new(
io::ErrorKind::InvalidInput,
format!("path has no existing ancestor: {}", path.display()),
)
})?;
missing.push(name.to_os_string());
current = current.parent().ok_or_else(|| {
io::Error::new(
io::ErrorKind::InvalidInput,
format!("path has no parent: {}", path.display()),
)
})?;
}
missing.reverse();
Ok((current, missing))
}
fn normalize_path(path: &Path) -> PathBuf {
@@ -263,27 +337,343 @@ fn validate_string_array(
}
}
fn validate_or_exit(config: &Config) {
fn validate_config(config: &Config) -> Result<(), String> {
if config.box_cfg.cpu_count == 0 {
die("box.cpu_count must be >= 1");
return Err("box.cpu_count must be >= 1".to_string());
}
if config.box_cfg.ram_mb == 0 {
die("box.ram_mb must be >= 1");
if config.box_cfg.ram_size.as_mib() == 0.0 {
return Err("box.ram_mb must be >= 1".to_string());
}
if config.box_cfg.disk_gb == 0 {
die("box.disk_gb must be >= 1");
if config.box_cfg.disk_size.as_gib() == 0.0 {
return Err("box.disk_gb must be >= 1".to_string());
}
if config.supervisor.auto_shutdown_ms == 0 {
die("supervisor.auto_shutdown_ms must be >= 1");
return Err("supervisor.auto_shutdown_ms must be >= 1".to_string());
}
for spec in &config.box_cfg.mounts {
if let Err(err) = DirectoryShare::from_mount_spec(spec) {
die(&format!("invalid mount spec '{spec}': {err}"));
return Err(format!("invalid mount spec '{spec}': {err}"));
}
}
Ok(())
}
fn die(message: &str) -> ! {
tracing::error!("{message}");
std::process::exit(1);
#[cfg(test)]
mod tests {
use super::*;
use std::ffi::OsString;
use std::sync::Mutex;
use tempfile::TempDir;
static ENV_MUTEX: Mutex<()> = Mutex::new(());
struct EnvGuard {
key: &'static str,
previous: Option<OsString>,
}
impl EnvGuard {
fn set(key: &'static str, value: &Path) -> Self {
let previous = env::var_os(key);
unsafe {
env::set_var(key, value);
}
Self { key, previous }
}
}
impl Drop for EnvGuard {
fn drop(&mut self) {
match &self.previous {
Some(value) => unsafe {
env::set_var(self.key, value);
},
None => unsafe {
env::remove_var(self.key);
},
}
}
}
#[test]
fn default_config_serializes_with_legacy_keys() {
let cfg = Config::default();
let serialized = toml::to_string(&cfg).expect("default config should serialize");
assert!(serialized.contains("ram_mb = 2048"));
assert!(serialized.contains("disk_gb = 5"));
assert!(!serialized.contains("ram_size"));
assert!(!serialized.contains("disk_size"));
}
#[test]
fn config_deserializes_sizes_from_mb_and_gb() {
let raw = r#"
[box]
cpu_count = 4
ram_mb = 3072
disk_gb = 12
mounts = ["~/src:~/src:read-write"]
[supervisor]
auto_shutdown_ms = 15000
"#;
let cfg: Config = toml::from_str(raw).expect("config should deserialize");
assert_eq!(cfg.box_cfg.cpu_count, 4);
assert_eq!(cfg.box_cfg.ram_size.as_u64(), ByteSize::mib(3072).as_u64());
assert_eq!(cfg.box_cfg.disk_size.as_u64(), ByteSize::gib(12).as_u64());
assert_eq!(cfg.supervisor.auto_shutdown_ms, 15000);
}
#[test]
fn serialize_rejects_non_integral_mb_or_gb() {
let cfg = Config {
box_cfg: BoxConfig {
cpu_count: 2,
ram_size: ByteSize::b((2 * MI_B) + 1),
disk_size: ByteSize::gib(5),
mounts: default_mounts(),
},
supervisor: SupervisorConfig::default(),
};
let err = toml::to_string(&cfg).expect_err("serialization should reject invalid MB");
assert!(
err.to_string()
.contains("ram_mb must be an integer number of MB")
);
let cfg = Config {
box_cfg: BoxConfig {
cpu_count: 2,
ram_size: ByteSize::mib(2048),
disk_size: ByteSize::b((5 * GI_B) + 1),
mounts: default_mounts(),
},
supervisor: SupervisorConfig::default(),
};
let err = toml::to_string(&cfg).expect_err("serialization should reject invalid GB");
assert!(
err.to_string()
.contains("disk_gb must be an integer number of GB")
);
}
#[test]
fn normalize_path_removes_dot_and_parent_components() {
let normalized = normalize_path(Path::new("/tmp/project/./nested/../config.toml"));
assert_eq!(normalized, PathBuf::from("/tmp/project/config.toml"));
}
#[test]
fn validate_schema_returns_errors_for_missing_required_fields() {
let value: toml::Value = toml::from_str(
r#"
[box]
cpu_count = 2
"#,
)
.expect("toml should parse");
let errors = validate_schema(&value);
assert!(errors.iter().any(|e| e == "missing [supervisor] table"));
assert!(errors.iter().any(|e| e == "missing [box].ram_mb (integer)"));
assert!(
errors
.iter()
.any(|e| e == "missing [box].disk_gb (integer)")
);
assert!(
errors
.iter()
.any(|e| e == "missing [box].mounts (array of strings)")
);
}
#[test]
fn validate_schema_errors_when_supervisor_is_not_table() {
let value: toml::Value = toml::from_str(
r#"
supervisor = 123
[box]
cpu_count = 2
ram_mb = 2048
disk_gb = 5
mounts = []
"#,
)
.expect("toml should parse");
let errors = validate_schema(&value);
assert!(errors.iter().any(|e| e == "[supervisor] must be a table"));
}
#[test]
fn ensure_config_file_creates_default_config_if_absent() {
let temp = TempDir::new().expect("temp dir should be created");
let root = fs::canonicalize(temp.path()).expect("temp dir should canonicalize");
let path = ensure_config_file(&root, None).expect("config should be created");
let raw = fs::read_to_string(&path).expect("created config should be readable");
let parsed: Config = toml::from_str(&raw).expect("created config should be valid");
assert_eq!(path, root.join("vibebox.toml"));
assert_eq!(parsed.box_cfg.cpu_count, DEFAULT_CPU_COUNT);
assert_eq!(
parsed.box_cfg.ram_size.as_u64(),
ByteSize::mib(DEFAULT_RAM_MB).as_u64()
);
assert_eq!(
parsed.box_cfg.disk_size.as_u64(),
ByteSize::gib(DEFAULT_DISK_GB).as_u64()
);
}
#[test]
fn load_config_creates_and_loads_default_config() {
let _lock = ENV_MUTEX.lock().expect("env lock should be acquired");
let temp = TempDir::new().expect("temp dir should be created");
let root = fs::canonicalize(temp.path()).expect("temp dir should canonicalize");
let home = root.join("home");
fs::create_dir_all(home.join(".codex")).expect("home .codex should be created");
fs::create_dir_all(home.join(".claude")).expect("home .claude should be created");
let _home_guard = EnvGuard::set("HOME", &home);
let cfg = load_config(&root).expect("load_config should succeed");
assert_eq!(cfg.box_cfg.cpu_count, DEFAULT_CPU_COUNT);
assert_eq!(
cfg.box_cfg.ram_size.as_u64(),
ByteSize::mib(DEFAULT_RAM_MB).as_u64()
);
assert_eq!(
cfg.box_cfg.disk_size.as_u64(),
ByteSize::gib(DEFAULT_DISK_GB).as_u64()
);
assert!(root.join("vibebox.toml").exists());
}
#[test]
fn load_config_with_path_uses_override_path() {
let _lock = ENV_MUTEX.lock().expect("env lock should be acquired");
let temp = TempDir::new().expect("temp dir should be created");
let root = fs::canonicalize(temp.path()).expect("temp dir should canonicalize");
let home = root.join("home");
fs::create_dir_all(home.join(".codex")).expect("home .codex should be created");
fs::create_dir_all(home.join(".claude")).expect("home .claude should be created");
let _home_guard = EnvGuard::set("HOME", &home);
let override_path = root.join("custom.toml");
fs::write(
&override_path,
r#"
[box]
cpu_count = 6
ram_mb = 4096
disk_gb = 9
mounts = ["~/.codex:~/.codex:read-write", "~/.claude:~/.claude:read-write"]
[supervisor]
auto_shutdown_ms = 12345
"#,
)
.expect("override config should be written");
let cfg = load_config_with_path(&root, Some(Path::new("custom.toml")))
.expect("load_config_with_path should succeed");
assert_eq!(cfg.box_cfg.cpu_count, 6);
assert_eq!(cfg.box_cfg.ram_size.as_u64(), ByteSize::mib(4096).as_u64());
assert_eq!(cfg.box_cfg.disk_size.as_u64(), ByteSize::gib(9).as_u64());
assert_eq!(cfg.supervisor.auto_shutdown_ms, 12345);
assert!(!root.join("vibebox.toml").exists());
}
#[test]
fn resolve_config_path_uses_env_override_when_cli_override_missing() {
let temp = TempDir::new().expect("temp dir should be created");
let root = fs::canonicalize(temp.path()).expect("temp dir should canonicalize");
let resolved = resolve_config_path_inner(&root, None, Some(PathBuf::from("custom.toml")))
.expect("env override path should resolve");
assert_eq!(resolved, root.join("custom.toml"));
}
#[test]
fn resolve_config_path_rejects_env_override_outside_project() {
let temp = TempDir::new().expect("temp dir should be created");
let root = fs::canonicalize(temp.path()).expect("temp dir should canonicalize");
let err = resolve_config_path_inner(&root, None, Some(PathBuf::from("../escape.toml")))
.expect_err("outside-project path should be rejected");
assert!(
err.to_string().contains("config path must be within"),
"expected bounds-check error, got: {err}"
);
}
#[test]
fn validate_config_rejects_invalid_values() {
let cfg = Config {
box_cfg: BoxConfig {
cpu_count: 0,
ram_size: ByteSize::mib(2048),
disk_size: ByteSize::gib(5),
mounts: vec![],
},
supervisor: SupervisorConfig::default(),
};
let err = validate_config(&cfg).expect_err("cpu_count=0 should fail");
assert_eq!(err, "box.cpu_count must be >= 1");
let cfg = Config {
box_cfg: BoxConfig {
cpu_count: 2,
ram_size: ByteSize::mib(2048),
disk_size: ByteSize::gib(5),
mounts: vec!["/definitely/missing:/tmp/missing:read-write".to_string()],
},
supervisor: SupervisorConfig::default(),
};
let err = validate_config(&cfg).expect_err("invalid mount should fail");
assert!(err.starts_with("invalid mount spec"));
}
#[test]
fn resolve_config_path_accepts_symlinked_project_root() {
let temp = TempDir::new().expect("temp dir should be created");
let actual_root = temp.path().join("actual");
let link_root = temp.path().join("linked");
fs::create_dir_all(&actual_root).expect("actual root should exist");
std::os::unix::fs::symlink(&actual_root, &link_root).expect("symlink should be created");
let resolved = resolve_config_path_inner(&link_root, Some(Path::new("vibebox.toml")), None)
.expect("symlinked project root should resolve");
assert_eq!(resolved, link_root.join("vibebox.toml"));
}
#[test]
fn resolve_config_path_rejects_symlink_escape() {
let temp = TempDir::new().expect("temp dir should be created");
let project_root = temp.path().join("project");
let outside_root = temp.path().join("outside");
fs::create_dir_all(&project_root).expect("project root should exist");
fs::create_dir_all(&outside_root).expect("outside root should exist");
std::os::unix::fs::symlink(&outside_root, project_root.join("link"))
.expect("escape symlink should be created");
let err = resolve_config_path_inner(&project_root, Some(Path::new("link/cfg.toml")), None)
.expect_err("symlink escape should be rejected");
assert!(
err.to_string().contains("config path must be within"),
"expected bounds-check error, got: {err}"
);
}
}
+28
View File
@@ -0,0 +1,28 @@
#!/usr/bin/env bash
set -Eeuo pipefail
__vibebox_err_reported=0
__vibebox_report_error() {
local rc="$1"
local line="$2"
local msg="${3:-}"
if [ "$__vibebox_err_reported" -eq 0 ]; then
msg="${msg//$'\n'/ }"
msg="${msg//$'\r'/ }"
if [ -n "$msg" ]; then
echo "VIBEBOX_SCRIPT_ERROR:__LABEL__:${line}:${rc} ${msg}"
else
echo "VIBEBOX_SCRIPT_ERROR:__LABEL__:${line}:${rc}"
fi
__vibebox_err_reported=1
fi
}
vibebox_fail() {
local msg="${1:-script failed}"
local rc="${2:-1}"
__vibebox_report_error "$rc" "${LINENO}" "$msg"
exit "$rc"
}
trap 'rc="$?"; __vibebox_report_error "$rc" "${LINENO}" "command failed: ${BASH_COMMAND:-unknown}"' ERR
trap 'rc="$?"; if [ "$rc" -ne 0 ]; then __vibebox_report_error "$rc" "${LINENO}" "script exited with code ${rc}"; fi' EXIT
__SCRIPT_BODY__
+32 -47
View File
@@ -1,31 +1,31 @@
use crate::instance::InstanceConfig;
use crate::utils::relative_to_home;
use crate::{config, instance, session_manager, tui};
use anyhow::{Context, Result, bail};
use std::{
env,
error::Error,
path::{Path, PathBuf},
};
use crate::{config, instance, session_manager, tui};
pub fn build_mount_rows(
cwd: &Path,
config: &config::Config,
) -> Result<Vec<tui::MountListRow>, Box<dyn Error + Send + Sync>> {
pub fn build_mount_rows(project: &Path, config: &config::Config) -> Result<Vec<tui::MountListRow>> {
let mut rows = Vec::new();
rows.extend(default_mounts(cwd)?);
let guest_home = resolve_guest_home(cwd)?;
rows.extend(default_mounts(project)?);
let guest_home = resolve_guest_home(project);
for spec in &config.box_cfg.mounts {
rows.push(parse_mount_spec(cwd, spec, false, &guest_home)?);
rows.push(parse_mount_spec(project, spec, false, &guest_home)?);
}
Ok(rows)
}
pub fn build_network_rows(
cwd: &Path,
) -> Result<Vec<tui::NetworkListRow>, Box<dyn Error + Send + Sync>> {
let instance_dir = cwd.join(session_manager::INSTANCE_DIR_NAME);
pub fn build_network_rows(project_dir: &Path) -> Result<Vec<tui::NetworkListRow>> {
let mut vm_ip = "-".to_string();
if let Ok(Some(ip)) = instance::read_instance_vm_ip(&instance_dir) {
vm_ip = ip;
if let Ok(config) = instance::read_instance_config(project_dir) {
match config.vm_ipv4 {
None => {}
Some(ip) => {
vm_ip = ip;
}
}
}
let host_to_vm = if vm_ip == "-" {
"ssh: <pending>:22".to_string()
@@ -41,13 +41,13 @@ pub fn build_network_rows(
Ok(vec![row])
}
fn default_mounts(cwd: &Path) -> Result<Vec<tui::MountListRow>, Box<dyn Error + Send + Sync>> {
fn default_mounts(cwd: &Path) -> Result<Vec<tui::MountListRow>> {
let project_name = cwd
.file_name()
.and_then(|name| name.to_str())
.unwrap_or("project");
.with_context(|| "failed to get project name")?;
let project_guest = format!("~/{project_name}");
let project_host = display_path(cwd);
let project_host = relative_to_home(cwd);
let mut rows = vec![tui::MountListRow {
host: project_host,
guest: project_guest,
@@ -57,14 +57,14 @@ fn default_mounts(cwd: &Path) -> Result<Vec<tui::MountListRow>, Box<dyn Error +
let home = env::var("HOME")
.map(PathBuf::from)
.unwrap_or_else(|_| PathBuf::from("/"));
.with_context(|| "failed to get home directory")?;
let cache_home = env::var("XDG_CACHE_HOME")
.map(PathBuf::from)
.unwrap_or_else(|_| home.join(".cache"));
let cache_dir = cache_home.join(session_manager::GLOBAL_CACHE_DIR_NAME);
let guest_mise_cache = cache_dir.join(".guest-mise-cache");
rows.push(tui::MountListRow {
host: display_path(&guest_mise_cache),
host: relative_to_home(&guest_mise_cache),
guest: "/root/.local/share/mise".to_string(),
mode: "read-write".to_string(),
default_mount: "yes".to_string(),
@@ -77,10 +77,10 @@ fn parse_mount_spec(
spec: &str,
default_mount: bool,
guest_home: &str,
) -> Result<tui::MountListRow, Box<dyn Error + Send + Sync>> {
) -> Result<tui::MountListRow> {
let parts: Vec<&str> = spec.split(':').collect();
if parts.len() < 2 || parts.len() > 3 {
return Err(format!("invalid mount spec: {spec}").into());
bail!["invalid mount spec: {spec}"];
}
let host_part = parts[0];
let guest_part = parts[1];
@@ -89,11 +89,10 @@ fn parse_mount_spec(
"read-only" => "read-only",
"read-write" => "read-write",
other => {
return Err(format!(
bail![format!(
"invalid mount mode '{}'; expected read-only or read-write",
other
)
.into());
)];
}
}
} else {
@@ -116,22 +115,22 @@ fn display_host_spec(cwd: &Path, host: &str) -> String {
}
let host_path = PathBuf::from(host);
if host_path.is_absolute() {
return display_path(&host_path);
return relative_to_home(&host_path);
}
let candidate = cwd.join(&host_path);
if candidate.is_absolute() {
display_path(&candidate)
relative_to_home(&candidate)
} else {
host.to_string()
}
}
fn resolve_guest_home(cwd: &Path) -> Result<String, Box<dyn Error + Send + Sync>> {
let instance_dir = cwd.join(session_manager::INSTANCE_DIR_NAME);
if let Ok(Some(user)) = instance::read_instance_ssh_user(&instance_dir) {
return Ok(format!("/home/{user}"));
fn resolve_guest_home(project_dir: &Path) -> String {
let config = instance::read_instance_config(project_dir);
match config {
Ok(config) => format!("/home/{}", config.ssh_user),
Err(_) => format!("/home/{}", InstanceConfig::default().ssh_user),
}
Ok(format!("/home/{}", instance::DEFAULT_SSH_USER))
}
fn resolve_guest_display(guest: &str, guest_home: &str) -> String {
@@ -155,17 +154,3 @@ fn resolve_guest_display(guest: &str, guest_home: &str) -> String {
format!("/root/{guest}")
}
}
fn display_path(path: &Path) -> String {
let Ok(home) = env::var("HOME") else {
return path.display().to_string();
};
let home_path = PathBuf::from(home);
if let Ok(stripped) = path.strip_prefix(&home_path) {
if stripped.components().next().is_none() {
return "~".to_string();
}
return format!("~/{}", stripped.display());
}
path.display().to_string()
}
+292 -157
View File
@@ -1,82 +1,140 @@
use anyhow::{Context, Result, bail};
use serde::{Deserialize, Serialize};
use std::os::unix::fs::FileTypeExt;
use std::{
env, fs,
io::{self},
io::{self, IsTerminal, Read},
net::{SocketAddr, TcpStream},
os::unix::{fs::PermissionsExt, net::UnixStream},
path::{Path, PathBuf},
process::{Command, Stdio},
sync::{Arc, Mutex},
process::{Child, Command, Stdio},
sync::{
Arc, Mutex,
atomic::{AtomicBool, Ordering},
mpsc,
},
thread,
time::{Duration, Instant},
};
use serde::{Deserialize, Serialize};
use time::{OffsetDateTime, format_description::well_known::Rfc3339};
use uuid::Uuid;
use crate::{
commands,
session_manager::{INSTANCE_DIR_NAME, INSTANCE_FILENAME},
session_manager::INSTANCE_DIR_NAME,
session_manager::{VM_MANAGER_PID_NAME, VM_MANAGER_SOCKET_NAME},
vm::{self, LoginAction},
};
pub const STATUS_VM_ERROR_PREFIX: &str = "error:";
const SSH_KEY_NAME: &str = "ssh_key";
#[cfg_attr(feature = "mock-vm", allow(dead_code))]
pub(crate) const VM_ROOT_LOG_NAME: &str = "vm_root.log";
pub(crate) const STATUS_FILE_NAME: &str = "status.txt";
pub(crate) const DEFAULT_SSH_USER: &str = "vibecoder";
const SSH_CONNECT_RETRIES: usize = 30;
const INSTANCE_FILENAME: &str = "instance.toml";
const DEFAULT_SSH_USER: &str = "vibecoder";
const SSH_CONNECT_RETRIES: usize = 10;
const SSH_CONNECT_DELAY_MS: u64 = 500;
const SSH_SETUP_SCRIPT: &str = include_str!("ssh.sh");
const STATUS_PREFIX: &str = "status:";
#[derive(Debug, Clone, Serialize, Deserialize)]
pub(crate) struct InstanceConfig {
#[serde(default)]
id: String,
#[serde(default = "default_ssh_user")]
ssh_user: String,
#[serde(default)]
sudo_password: String,
#[serde(default)]
last_active: Option<String>,
#[serde(default)]
pub(crate) vm_ipv4: Option<String>,
#[derive(Debug, Clone, Copy, PartialEq, Eq)]
pub enum VmLiveness {
RunningWithSocket { pid: u32 },
RunningWithoutSocket { pid: u32 },
NotRunningOrMissing,
}
impl InstanceConfig {
pub(crate) fn ssh_user_display(&self) -> String {
if self.ssh_user.trim().is_empty() {
DEFAULT_SSH_USER.to_string()
} else {
self.ssh_user.clone()
pub fn vm_liveness(project_root: &Path) -> Result<VmLiveness> {
let instance_dir = ensure_instance_dir(project_root)?;
let pid_path = instance_dir.join(VM_MANAGER_PID_NAME);
let socket_path = instance_dir.join(VM_MANAGER_SOCKET_NAME);
fn pid_is_alive(pid: u32) -> bool {
let pid = pid as libc::pid_t;
let result = unsafe { libc::kill(pid, 0) };
if result == 0 {
return true;
}
match io::Error::last_os_error().raw_os_error() {
Some(code) if code == libc::EPERM => true,
Some(code) if code == libc::ESRCH => false,
_ => false,
}
}
let Ok(content) = fs::read_to_string(pid_path) else {
return Ok(VmLiveness::NotRunningOrMissing);
};
let Ok(pid) = content.trim().parse::<u32>() else {
return Ok(VmLiveness::NotRunningOrMissing);
};
if !pid_is_alive(pid) {
return Ok(VmLiveness::NotRunningOrMissing);
}
let has_socket = fs::metadata(socket_path)
.map(|meta| meta.file_type().is_socket())
.unwrap_or(false);
if has_socket {
Ok(VmLiveness::RunningWithSocket { pid })
} else {
Ok(VmLiveness::RunningWithoutSocket { pid })
}
}
#[derive(Debug, thiserror::Error)]
pub enum InstanceError {
#[error("unexpected disconnection from vm manager")]
UnexpectedDisconnection,
#[error("{0}")]
VMError(String),
}
fn default_ssh_user() -> String {
DEFAULT_SSH_USER.to_string()
}
pub fn run_with_ssh(manager_conn: UnixStream) -> Result<(), Box<dyn std::error::Error>> {
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct InstanceConfig {
#[serde(default)]
pub id: String,
#[serde(default = "default_ssh_user")]
pub ssh_user: String,
#[serde(default)]
sudo_password: String,
#[serde(default)]
pub last_active: Option<String>,
#[serde(default)]
pub vm_ipv4: Option<String>,
}
impl Default for InstanceConfig {
fn default() -> Self {
Self {
id: Uuid::now_v7().to_string(),
ssh_user: DEFAULT_SSH_USER.to_string(),
sudo_password: Uuid::now_v7().simple().to_string(),
last_active: None,
vm_ipv4: None,
}
}
}
pub fn run_with_ssh(manager_conn: UnixStream) -> Result<()> {
let project_root = env::current_dir()?;
tracing::info!(root = %project_root.display(), "starting ssh session");
let instance_dir = ensure_instance_dir(&project_root)?;
tracing::debug!(instance_dir = %instance_dir.display(), "instance dir ready");
let (ssh_key, _ssh_pub) = ensure_ssh_keypair(&instance_dir)?;
let config = load_or_create_instance_config(&instance_dir)?;
let config = load_or_create_instance_config(&project_root)?;
let ssh_user = config.ssh_user.clone();
tracing::debug!(ssh_user = %ssh_user, "loaded instance config");
let _manager_conn = manager_conn;
wait_for_vm_ipv4(&instance_dir, Duration::from_secs(480))?;
wait_for_vm_ipv4(&project_root, Duration::from_secs(480), &manager_conn)?;
let ip = load_or_create_instance_config(&instance_dir)?
let ip = load_or_create_instance_config(&project_root)?
.vm_ipv4
.ok_or("VM IPv4 not available")?;
.with_context(|| "failed to load instance IP address")?;
tracing::info!(ip = %ip, "vm ipv4 ready");
run_ssh_session(ssh_key, ssh_user, ip)
run_ssh_session(ssh_key, ssh_user, ip, manager_conn, project_root)
}
pub fn ensure_instance_dir(project_root: &Path) -> Result<PathBuf, io::Error> {
@@ -85,9 +143,7 @@ pub fn ensure_instance_dir(project_root: &Path) -> Result<PathBuf, io::Error> {
Ok(instance_dir)
}
pub(crate) fn ensure_ssh_keypair(
instance_dir: &Path,
) -> Result<(PathBuf, PathBuf), Box<dyn std::error::Error>> {
pub fn ensure_ssh_keypair(instance_dir: &Path) -> Result<(PathBuf, PathBuf)> {
let private_key = instance_dir.join(SSH_KEY_NAME);
let public_key = instance_dir.join(format!("{SSH_KEY_NAME}.pub"));
@@ -109,7 +165,9 @@ pub(crate) fn ensure_ssh_keypair(
"-N",
"",
"-f",
private_key.to_str().ok_or("ssh key path not utf-8")?,
private_key
.to_str()
.with_context(|| "ssh key path not utf-8")?,
"-C",
"vibebox",
])
@@ -119,7 +177,7 @@ pub(crate) fn ensure_ssh_keypair(
.status()?;
if !status.success() {
return Err("ssh-keygen failed".into());
bail!("ssh-keygen failed");
}
fs::set_permissions(&private_key, fs::Permissions::from_mode(0o600))?;
@@ -128,98 +186,66 @@ pub(crate) fn ensure_ssh_keypair(
Ok((private_key, public_key))
}
pub(crate) fn load_or_create_instance_config(
instance_dir: &Path,
) -> Result<InstanceConfig, Box<dyn std::error::Error>> {
let config_path = instance_dir.join(INSTANCE_FILENAME);
let mut config = if config_path.exists() {
let raw = fs::read_to_string(&config_path)?;
toml::from_str::<InstanceConfig>(&raw)?
} else {
InstanceConfig {
id: String::new(),
ssh_user: default_ssh_user(),
sudo_password: String::new(),
last_active: None,
vm_ipv4: None,
}
};
pub fn load_or_create_instance_config(project_dir: &Path) -> Result<InstanceConfig> {
let mut exist = true;
let mut config = read_instance_config(project_dir).unwrap_or_else(|_| {
exist = false;
InstanceConfig::default()
});
let mut changed = false;
if config.ssh_user.trim().is_empty() {
config.ssh_user = default_ssh_user();
config.ssh_user = InstanceConfig::default().ssh_user;
changed = true;
}
if config.id.trim().is_empty() {
config.id = Uuid::now_v7().to_string();
config.id = InstanceConfig::default().id;
changed = true;
}
if config.sudo_password.trim().is_empty() {
config.sudo_password = generate_password();
config.sudo_password = InstanceConfig::default().sudo_password;
changed = true;
}
if !config_path.exists() || changed {
write_instance_config(&config_path, &config)?;
if !exist || changed {
write_instance_config(project_dir, &config)?;
}
Ok(config)
}
fn read_instance_config(
instance_dir: &Path,
) -> Result<Option<InstanceConfig>, Box<dyn std::error::Error>> {
let config_path = instance_dir.join(INSTANCE_FILENAME);
pub fn read_instance_config(project_dir: &Path) -> Result<InstanceConfig> {
// todo maybe verify schema?
let config_path = project_dir.join(INSTANCE_DIR_NAME).join(INSTANCE_FILENAME);
if !config_path.exists() {
return Ok(None);
bail!("instance config file does not exist");
}
let raw = fs::read_to_string(&config_path)?;
let config = toml::from_str::<InstanceConfig>(&raw)?;
Ok(Some(config))
Ok(config)
}
pub fn read_instance_vm_ip(
instance_dir: &Path,
) -> Result<Option<String>, Box<dyn std::error::Error>> {
let config = read_instance_config(instance_dir)?;
Ok(config.and_then(|cfg| cfg.vm_ipv4))
}
pub fn read_instance_ssh_user(
instance_dir: &Path,
) -> Result<Option<String>, Box<dyn std::error::Error>> {
let config = read_instance_config(instance_dir)?;
Ok(config
.map(|cfg| cfg.ssh_user)
.filter(|user| !user.trim().is_empty()))
}
pub fn touch_last_active(instance_dir: &Path) -> Result<(), Box<dyn std::error::Error>> {
let mut config = load_or_create_instance_config(instance_dir)?;
pub fn touch_last_active(project_dir: &Path) -> Result<()> {
let mut config = load_or_create_instance_config(project_dir)?;
let now = OffsetDateTime::now_utc().format(&Rfc3339)?;
config.last_active = Some(now);
write_instance_config(&instance_dir.join(INSTANCE_FILENAME), &config)?;
write_instance_config(project_dir, &config)?;
Ok(())
}
pub(crate) fn write_instance_config(
path: &Path,
config: &InstanceConfig,
) -> Result<(), Box<dyn std::error::Error>> {
pub fn write_instance_config(project_dir: &Path, config: &InstanceConfig) -> Result<()> {
let path = project_dir.join(INSTANCE_DIR_NAME).join(INSTANCE_FILENAME);
let data = toml::to_string_pretty(config)?;
fs::write(path, data)?;
fs::set_permissions(path, fs::Permissions::from_mode(0o600))?;
fs::create_dir_all(project_dir.join(INSTANCE_DIR_NAME))?;
fs::write(&path, data)?;
fs::set_permissions(&path, fs::Permissions::from_mode(0o600))?;
Ok(())
}
fn generate_password() -> String {
Uuid::now_v7().simple().to_string()
}
#[cfg_attr(feature = "mock-vm", allow(dead_code))]
pub(crate) fn extract_ipv4(line: &str) -> Option<String> {
pub fn extract_ipv4(line: &str) -> Option<String> {
let mut current = String::new();
let mut best: Option<String> = None;
@@ -238,51 +264,68 @@ pub(crate) fn extract_ipv4(line: &str) -> Option<String> {
best
}
fn handle_manager_line(line: &str, last_status: &mut Option<String>) -> Result<()> {
if let Some(status) = line.strip_prefix(STATUS_PREFIX) {
let status = status.trim();
if let Some(message) = status.strip_prefix(STATUS_VM_ERROR_PREFIX) {
let message = message.trim();
if message.is_empty() {
bail!("vm manager reported startup failure");
}
return Err(InstanceError::VMError(message.to_string()).into());
}
if !status.is_empty() && last_status.as_deref() != Some(status) {
tracing::info!("[background]: {}", status);
*last_status = Some(status.to_string());
}
}
Ok(())
}
fn wait_for_vm_ipv4(
instance_dir: &Path,
project_dir: &Path,
timeout: Duration,
) -> Result<(), Box<dyn std::error::Error>> {
manager_conn: &UnixStream,
) -> Result<()> {
let start = Instant::now();
let mut next_log_at = start + Duration::from_secs(10);
let mut next_status_check = start;
let mut stream = manager_conn.try_clone()?;
let _ = stream.set_read_timeout(Some(Duration::from_millis(250)));
let mut read_buf = [0u8; 1024];
let mut pending = String::new();
tracing::info!("waiting for vm ipv4");
let status_path = instance_dir.join(STATUS_FILE_NAME);
let mut last_status: Option<String> = None;
let mut status_missing = true;
let mut once_hint = false;
loop {
let config = load_or_create_instance_config(instance_dir)?;
match stream.read(&mut read_buf) {
Ok(0) => {
bail!("vm manager disconnected before VM became ready");
}
Ok(n) => {
pending.push_str(&String::from_utf8_lossy(&read_buf[..n]));
while let Some(pos) = pending.find('\n') {
let line = pending[..pos].trim().to_string();
pending.drain(..=pos);
handle_manager_line(&line, &mut last_status)?;
}
}
Err(err) if err.kind() == io::ErrorKind::WouldBlock => {}
Err(err) if err.kind() == io::ErrorKind::TimedOut => {}
Err(err) if err.kind() == io::ErrorKind::Interrupted => {}
Err(err) => {
tracing::warn!(error = %err, "failed to read vm manager status stream");
}
}
let config = load_or_create_instance_config(project_dir)?;
if config.vm_ipv4.is_some() {
let _ = fs::remove_file(&status_path);
return Ok(());
}
if start.elapsed() > timeout {
let _ = fs::remove_file(&status_path);
return Err("Timed out waiting for VM IPv4".into());
bail!("timed out waiting for VM IPv4");
}
let now = Instant::now();
if now >= next_status_check {
match fs::read_to_string(&status_path) {
Ok(status) => {
status_missing = false;
let status = status.trim().to_string();
if status.starts_with("error:") {
let _ = fs::remove_file(&status_path);
let message = status.trim_start_matches("error:").trim().to_string();
return Err(message.into());
}
if !status.is_empty() && last_status.as_deref() != Some(status.as_str()) {
tracing::info!("[background]: {}", status);
last_status = Some(status);
next_log_at = now + Duration::from_secs(20);
}
}
Err(_) => {
status_missing = true;
}
}
next_status_check = now + Duration::from_millis(500);
}
if now >= next_log_at {
let waited = start.elapsed();
if waited.as_secs() > 15 && !once_hint {
@@ -291,12 +334,9 @@ fn wait_for_vm_ipv4(
);
once_hint = true;
}
if status_missing {
tracing::info!("still waiting for vm ipv4, {}s elapsed", waited.as_secs(),);
}
tracing::info!("still waiting for vm ipv4, {}s elapsed", waited.as_secs(),);
next_log_at += Duration::from_secs(20);
}
thread::sleep(Duration::from_millis(200));
}
}
@@ -304,9 +344,14 @@ fn run_ssh_session(
ssh_key: PathBuf,
ssh_user: String,
ip: String,
) -> Result<(), Box<dyn std::error::Error>> {
manager_conn: UnixStream,
project_root: PathBuf,
) -> Result<()> {
let mut attempts = 0usize;
loop {
if matches!(vm_liveness(&project_root)?, VmLiveness::NotRunningOrMissing) {
return Err(InstanceError::UnexpectedDisconnection.into());
}
attempts += 1;
if !ssh_port_open(&ip) {
tracing::debug!(attempts, "ssh port doesn't open yet");
@@ -318,9 +363,7 @@ fn run_ssh_session(
SSH_CONNECT_RETRIES
);
if attempts >= SSH_CONNECT_RETRIES {
return Err(
format!("ssh port not ready after {SSH_CONNECT_RETRIES} attempts").into(),
);
bail!("ssh port not ready after {SSH_CONNECT_RETRIES} attempts");
}
thread::sleep(Duration::from_millis(SSH_CONNECT_DELAY_MS));
continue;
@@ -334,10 +377,10 @@ fn run_ssh_session(
attempts,
SSH_CONNECT_RETRIES
);
let status = Command::new("ssh")
let child = Command::new("ssh")
.args([
"-i",
ssh_key.to_str().unwrap_or(".vibebox/ssh_key"),
ssh_key.to_str().with_context(|| "invalid path")?,
"-o",
"IdentitiesOnly=yes",
"-o",
@@ -362,27 +405,67 @@ fn run_ssh_session(
.stdin(Stdio::inherit())
.stdout(Stdio::inherit())
.stderr(Stdio::inherit())
.status();
.spawn();
match status {
Ok(status) if status.success() => {
tracing::info!(status = %status, "ssh exited");
break;
}
Ok(status) if status.code() == Some(255) => {
tracing::warn!(status = %status, "ssh connection failed");
if attempts >= SSH_CONNECT_RETRIES {
return Err(format!("ssh failed after {SSH_CONNECT_RETRIES} attempts").into());
match child {
Ok(mut child) => {
let done = Arc::new(AtomicBool::new(false));
let done_for_monitor = done.clone();
let (disconnect_tx, disconnect_rx) = mpsc::channel::<()>();
let mut manager_stream = manager_conn.try_clone()?;
let _ = manager_stream.set_read_timeout(Some(Duration::from_millis(250)));
thread::spawn(move || {
let mut buf = [0u8; 1];
while !done_for_monitor.load(Ordering::Relaxed) {
match manager_stream.read(&mut buf) {
Ok(0) => {
let _ = disconnect_tx.send(());
return;
}
Ok(_) => {}
Err(err) if err.kind() == io::ErrorKind::WouldBlock => {}
Err(err) if err.kind() == io::ErrorKind::TimedOut => {}
Err(err) if err.kind() == io::ErrorKind::Interrupted => {}
Err(_) => {
let _ = disconnect_tx.send(());
return;
}
}
}
});
let status = loop {
if disconnect_rx.try_recv().is_ok() {
done.store(true, Ordering::Relaxed);
terminate_ssh_child(&mut child);
restore_terminal_after_disconnect();
return Err(InstanceError::UnexpectedDisconnection.into());
}
if let Some(status) = child.try_wait()? {
done.store(true, Ordering::Relaxed);
break status;
}
thread::sleep(Duration::from_millis(100));
};
if status.success() {
tracing::info!(status = %status, "ssh exited");
break;
}
if status.code() == Some(255) {
tracing::warn!(status = %status, "ssh connection failed");
if attempts >= SSH_CONNECT_RETRIES {
bail!("ssh failed after {SSH_CONNECT_RETRIES} attempts");
}
thread::sleep(Duration::from_millis(500));
continue;
}
thread::sleep(Duration::from_millis(500));
}
Ok(status) => {
tracing::info!(status = %status, "ssh exited");
break;
}
Err(err) => {
tracing::error!(error = %err, "failed to start ssh");
return Err(format!("failed to start ssh: {err}").into());
bail!("failed to start ssh: {err}");
}
}
}
@@ -390,6 +473,30 @@ fn run_ssh_session(
Ok(())
}
fn terminate_ssh_child(child: &mut Child) {
let pid = child.id() as i32;
unsafe {
libc::kill(pid, libc::SIGTERM);
}
let deadline = Instant::now() + Duration::from_millis(700);
while Instant::now() < deadline {
match child.try_wait() {
Ok(Some(_)) => return,
Ok(None) => thread::sleep(Duration::from_millis(50)),
Err(_) => break,
}
}
let _ = child.kill();
let _ = child.wait();
}
fn restore_terminal_after_disconnect() {
if io::stdin().is_terminal() {
let _ = Command::new("stty").arg("sane").status();
}
eprintln!();
}
#[cfg_attr(feature = "mock-vm", allow(dead_code))]
fn is_ipv4_candidate(candidate: &str) -> bool {
let parts: Vec<&str> = candidate.split('.').collect();
@@ -412,10 +519,10 @@ fn ssh_port_open(ip: &str) -> bool {
Ok(addr) => addr,
Err(_) => return false,
};
TcpStream::connect_timeout(&addr, std::time::Duration::from_millis(500)).is_ok()
TcpStream::connect_timeout(&addr, Duration::from_millis(500)).is_ok()
}
pub(crate) fn build_ssh_login_actions(
pub fn build_ssh_login_actions(
config: &Arc<Mutex<InstanceConfig>>,
project_name: &str,
project_guest_dir: &str,
@@ -430,7 +537,7 @@ pub(crate) fn build_ssh_login_actions(
let key_path = format!("{guest_dir}/{key_name}.pub");
let setup_script = SSH_SETUP_SCRIPT
let ssh_script = SSH_SETUP_SCRIPT
.replace("__SSH_USER__", &ssh_user)
.replace("__SUDO_PASSWORD__", &sudo_password)
.replace("__PROJECT_NAME__", project_name)
@@ -438,8 +545,36 @@ pub(crate) fn build_ssh_login_actions(
.replace("__KEY_PATH__", &key_path)
.replace("__VIBEBOX_SHELL_SCRIPT__", &commands::render_shell_script())
.replace("__VIBEBOX_HOME_LINKS__", home_links_script);
let setup = vm::script_command_from_content("ssh_setup", &setup_script)
let setup = vm::script_command_from_content("ssh.sh", &ssh_script)
.expect("ssh setup script contained invalid marker");
vec![LoginAction::Send(setup)]
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn handle_manager_line_updates_status() {
let mut last_status = None;
handle_manager_line("status: preparing VM image...", &mut last_status)
.expect("status should be accepted");
assert_eq!(last_status.as_deref(), Some("preparing VM image..."));
}
#[test]
fn handle_manager_line_ignores_non_status_lines() {
let mut last_status = None;
handle_manager_line("pid=123", &mut last_status).expect("non-status lines are ignored");
assert!(last_status.is_none());
}
#[test]
fn handle_manager_line_surfaces_error_status() {
let mut last_status = None;
let err = handle_manager_line("status: error: vm failed to boot", &mut last_status)
.expect_err("error status should fail");
assert_eq!(err.to_string(), "vm failed to boot");
}
}
+1
View File
@@ -8,3 +8,4 @@ pub mod vm_manager;
pub use session_manager::{SessionError, SessionManager, SessionRecord};
pub mod config;
pub mod utils;
+56 -93
View File
@@ -1,19 +1,18 @@
use anyhow::Result;
use std::{
env, fs,
io::{self, Write},
os::unix::fs::FileTypeExt,
path::{Path, PathBuf},
};
use crate::config::config_path;
use crate::instance::{VmLiveness, read_instance_config, vm_liveness};
use serde::{Deserialize, Serialize};
use crate::config::CONFIG_FILENAME;
pub const INSTANCE_DIR_NAME: &str = ".vibebox";
pub const GLOBAL_CACHE_DIR_NAME: &str = "vibebox";
pub const GLOBAL_DIR_NAME: &str = ".vibebox";
pub const INSTANCE_FILENAME: &str = "instance.toml";
pub const SESSION_TOML_SUFFIX: &str = ".toml";
const SESSION_TOML_SUFFIX: &str = ".toml";
pub const VM_MANAGER_SOCKET_NAME: &str = "vm.sock";
pub const VM_MANAGER_PID_NAME: &str = "vm.pid";
const SESSIONS_DIR_NAME: &str = "sessions";
@@ -32,14 +31,6 @@ struct SessionEntry {
pub id: String,
}
#[derive(Debug, Default, Deserialize)]
struct InstanceMetadata {
#[serde(default)]
id: Option<String>,
#[serde(default)]
last_active: Option<String>,
}
#[derive(Debug)]
pub struct SessionManager {
sessions_dir: PathBuf,
@@ -61,7 +52,7 @@ pub enum SessionError {
#[error("Session directory does not exist: {0}")]
MissingDirectory(PathBuf),
#[error(transparent)]
Io(#[from] std::io::Error),
Io(#[from] io::Error),
#[error(transparent)]
TomlDe(#[from] toml::de::Error),
#[error(transparent)]
@@ -94,8 +85,8 @@ impl SessionManager {
let mut added = false;
if has_config {
let meta = read_instance_metadata(&directory)?;
if let Some(id) = meta.id {
let id = read_instance_config(&directory).map_or(None, |config| Some(config.id));
if let Some(id) = id {
let record = SessionEntry {
directory: directory.clone(),
id: id.clone(),
@@ -110,7 +101,6 @@ impl SessionManager {
} else {
tracing::warn!(
directory = %directory.display(),
file = INSTANCE_FILENAME,
"missing session id in instance file"
);
}
@@ -148,12 +138,13 @@ impl SessionManager {
}
let mut records = Vec::with_capacity(sessions.len());
for session in sessions {
let meta = read_instance_metadata(&session.directory)?;
let last_active =
read_instance_config(&session.directory).map_or(None, |option| option.last_active);
let active = is_session_active(&session.directory);
records.push(SessionRecord {
directory: session.directory,
id: session.id,
last_active: meta.last_active,
last_active,
active,
});
}
@@ -271,43 +262,22 @@ fn is_vibebox_dir(directory: &Path) -> bool {
if !directory.is_absolute() {
return false;
}
directory.join(CONFIG_FILENAME).is_file()
config_path(directory).is_file()
}
fn is_session_active(directory: &Path) -> bool {
let instance_dir = directory.join(INSTANCE_DIR_NAME);
let pid_path = instance_dir.join(VM_MANAGER_PID_NAME);
let socket_path = instance_dir.join(VM_MANAGER_SOCKET_NAME);
let pid = read_pid(&pid_path);
let is_alive = pid.map(pid_is_alive).unwrap_or(false);
if !is_alive {
let _ = fs::remove_file(&pid_path);
return false;
}
if let Ok(metadata) = fs::metadata(&socket_path) {
return metadata.file_type().is_socket();
}
true
}
fn read_pid(path: &Path) -> Option<u32> {
let content = fs::read_to_string(path).ok()?;
content.trim().parse::<u32>().ok()
}
fn pid_is_alive(pid: u32) -> bool {
let pid = pid as libc::pid_t;
let result = unsafe { libc::kill(pid, 0) };
if result == 0 {
return true;
}
match std::io::Error::last_os_error().raw_os_error() {
Some(code) if code == libc::EPERM => true,
Some(code) if code == libc::ESRCH => false,
_ => false,
match vm_liveness(directory) {
Ok(liveness) => match liveness {
VmLiveness::RunningWithSocket { .. } => true,
VmLiveness::RunningWithoutSocket { .. } => true,
VmLiveness::NotRunningOrMissing => {
let _ = fs::remove_file(&pid_path);
false
}
},
Err(_) => false,
}
}
@@ -315,31 +285,11 @@ fn read_session_file(path: &Path) -> Result<SessionEntry, SessionError> {
let raw = fs::read_to_string(path)?;
let record: SessionEntry = toml::from_str(&raw)?;
if record.id.trim().is_empty() {
return Err(std::io::Error::new(io::ErrorKind::InvalidData, "session id missing").into());
return Err(io::Error::new(io::ErrorKind::InvalidData, "session id missing").into());
}
Ok(record)
}
fn read_instance_metadata(directory: &Path) -> Result<InstanceMetadata, SessionError> {
let instance_path = directory.join(INSTANCE_DIR_NAME).join(INSTANCE_FILENAME);
if !instance_path.exists() {
return Ok(InstanceMetadata::default());
}
let raw = fs::read_to_string(&instance_path)?;
let mut meta: InstanceMetadata = toml::from_str(&raw)?;
if let Some(id) = &meta.id
&& id.trim().is_empty()
{
meta.id = None;
}
if let Some(last_active) = &meta.last_active
&& last_active.trim().is_empty()
{
meta.last_active = None;
}
Ok(meta)
}
fn atomic_write(path: &Path, content: &[u8]) -> io::Result<()> {
let Some(parent) = path.parent() else {
return Err(io::Error::new(
@@ -362,6 +312,7 @@ fn atomic_write(path: &Path, content: &[u8]) -> io::Result<()> {
#[cfg(test)]
mod tests {
use super::*;
use crate::instance::{InstanceConfig, write_instance_config};
use std::fs;
use tempfile::TempDir;
@@ -375,11 +326,14 @@ mod tests {
dir
}
fn write_instance(project_dir: &Path, id: &str, last_active: &str) {
let instance_dir = project_dir.join(INSTANCE_DIR_NAME);
fs::create_dir_all(&instance_dir).unwrap();
let content = format!("id = \"{id}\"\nlast_active = \"{last_active}\"\n");
fs::write(instance_dir.join(INSTANCE_FILENAME), content).unwrap();
fn write_instance(project_dir: &Path, id: &str, last_active: &str) -> Result<()> {
fs::create_dir_all(project_dir)?;
let mut config = InstanceConfig::default();
config.id = id.to_string();
config.last_active = Some(last_active.to_string());
write_instance_config(project_dir, &config)
}
#[test]
@@ -387,11 +341,14 @@ mod tests {
let temp = TempDir::new().unwrap();
let mgr = manager(&temp);
let project_dir = create_project_dir(&temp);
fs::write(project_dir.join(CONFIG_FILENAME), "").unwrap();
write_instance(
&project_dir,
"019bf290-cccc-7c23-ba1d-dce7e6d40693",
"2026-02-07T05:00:00Z",
fs::write(config_path(project_dir.as_path()), "").unwrap();
assert!(
write_instance(
&project_dir,
"019bf290-cccc-7c23-ba1d-dce7e6d40693",
"2026-02-07T05:00:00Z",
)
.is_ok()
);
let dirs = mgr.update_global_sessions(&project_dir).unwrap();
@@ -412,15 +369,18 @@ mod tests {
let temp = TempDir::new().unwrap();
let mgr = manager(&temp);
let project_dir = create_project_dir(&temp);
fs::write(project_dir.join(CONFIG_FILENAME), "").unwrap();
write_instance(
&project_dir,
"019bf290-cccc-7c23-ba1d-dce7e6d40693",
"2026-02-07T05:00:00Z",
fs::write(config_path(project_dir.as_path()), "").unwrap();
assert!(
write_instance(
&project_dir,
"019bf290-cccc-7c23-ba1d-dce7e6d40693",
"2026-02-07T05:00:00Z",
)
.is_ok()
);
let _ = mgr.update_global_sessions(&project_dir).unwrap();
fs::remove_file(project_dir.join(CONFIG_FILENAME)).unwrap();
fs::remove_file(config_path(project_dir.as_path())).unwrap();
let sessions = mgr.list_sessions().unwrap();
assert!(sessions.is_empty());
@@ -451,11 +411,14 @@ mod tests {
let temp = TempDir::new().unwrap();
let mgr = manager(&temp);
let project_dir = create_project_dir(&temp);
fs::write(project_dir.join(CONFIG_FILENAME), "").unwrap();
write_instance(
&project_dir,
"019bf290-cccc-7c23-ba1d-dce7e6d40693",
"2026-02-07T05:00:00Z",
fs::write(config_path(project_dir.as_path()), "").unwrap();
assert!(
write_instance(
&project_dir,
"019bf290-cccc-7c23-ba1d-dce7e6d40693",
"2026-02-07T05:00:00Z",
)
.is_ok()
);
let _ = mgr.update_global_sessions(&project_dir).unwrap();
+13 -10
View File
@@ -114,8 +114,8 @@ mise_ok() { command -v mise >/dev/null 2>&1 || [ -x "$MISE_BIN" ]; }
mise_install() {
if [ ! -x "$MISE_BIN" ] && ! command -v mise >/dev/null 2>&1; then
if ! curl https://mise.run | HOME="$USER_HOME" sh; then
mise_warn "mise install script failed (continuing)"
return 0
mise_warn "mise install script failed"
return 1
fi
fi
echo 'eval "$(~/.local/bin/mise activate bash)"' >> "${USER_HOME}/.bashrc"
@@ -141,18 +141,21 @@ MISE
touch "${USER_HOME}/.config/mise/mise.lock"
if [ -x "$MISE_BIN" ]; then
if ! HOME="$USER_HOME" "$MISE_BIN" install; then
mise_warn "mise install failed (continuing)"
return 0
mise_warn "mise install failed"
return 1
fi
else
if ! HOME="$USER_HOME" mise install; then
mise_warn "mise install failed (continuing)"
return 0
mise_warn "mise install failed"
return 1
fi
fi
}
mise_install || true
if ! mise_install; then
diag "mise installation failed"
vibebox_fail "mise installation failed" 1
fi
# 3) start ssh (don't swallow failures)
# If ssh is already active, don't force start/restart.
@@ -160,7 +163,7 @@ if ! systemctl is-active --quiet ssh; then
if ! systemctl start ssh; then
diag "systemctl start ssh failed"
dump_diag
exit 1
vibebox_fail "failed to start ssh service" 1
fi
fi
@@ -198,7 +201,7 @@ done
if [ -z "$dev" ] || [ -z "$ip" ]; then
diag "no stable IPv4 on default route interface"
dump_diag
exit 1
vibebox_fail "no stable ipv4 route on default interface" 1
fi
# 5) strong verify: ssh must listen externally (0.0.0.0:22 or $ip:22 or [::]:22)
@@ -217,7 +220,7 @@ done
if ! listens_ok; then
diag "sshd not listening on 0.0.0.0:22 / ${ip}:22"
dump_diag
exit 1
vibebox_fail "sshd is not listening on the expected address" 1
fi
ip a
+31 -31
View File
@@ -1,10 +1,4 @@
use std::{
io::{self, Write},
os::unix::io::OwnedFd,
path::PathBuf,
sync::{Arc, Mutex},
};
use bytesize::ByteSize;
use color_eyre::Result;
use crossterm::{
cursor::{MoveTo, Show},
@@ -22,6 +16,12 @@ use ratatui::{
text::{Line, Span, Text},
widgets::{Block, Borders, Cell, List, ListItem, Paragraph, Row, Table, Widget},
};
use std::{
io::{self, Write},
os::unix::io::OwnedFd,
path::PathBuf,
sync::{Arc, Mutex},
};
use crate::vm;
@@ -39,9 +39,9 @@ const INFO_LINE_COUNT: u16 = 5;
#[derive(Debug, Clone)]
pub struct VmInfo {
pub max_memory_mb: u64,
pub max_memory: ByteSize,
pub cpu_cores: usize,
pub max_disk_gb: f32,
pub max_disk: ByteSize,
pub system_name: String,
pub auto_shutdown_ms: u64,
}
@@ -474,27 +474,27 @@ fn write_buffer_with_style(buffer: &Buffer, out: &mut impl Write) -> io::Result<
Ok(())
}
fn map_color(color: ratatui::style::Color) -> CrosstermColor {
fn map_color(color: Color) -> CrosstermColor {
match color {
ratatui::style::Color::Reset => CrosstermColor::Reset,
ratatui::style::Color::Black => CrosstermColor::Black,
ratatui::style::Color::Red => CrosstermColor::DarkRed,
ratatui::style::Color::Green => CrosstermColor::DarkGreen,
ratatui::style::Color::Yellow => CrosstermColor::DarkYellow,
ratatui::style::Color::Blue => CrosstermColor::DarkBlue,
ratatui::style::Color::Magenta => CrosstermColor::DarkMagenta,
ratatui::style::Color::Cyan => CrosstermColor::DarkCyan,
ratatui::style::Color::Gray => CrosstermColor::Grey,
ratatui::style::Color::DarkGray => CrosstermColor::DarkGrey,
ratatui::style::Color::LightRed => CrosstermColor::Red,
ratatui::style::Color::LightGreen => CrosstermColor::Green,
ratatui::style::Color::LightYellow => CrosstermColor::Yellow,
ratatui::style::Color::LightBlue => CrosstermColor::Blue,
ratatui::style::Color::LightMagenta => CrosstermColor::Magenta,
ratatui::style::Color::LightCyan => CrosstermColor::Cyan,
ratatui::style::Color::White => CrosstermColor::White,
ratatui::style::Color::Rgb(r, g, b) => CrosstermColor::Rgb { r, g, b },
ratatui::style::Color::Indexed(i) => CrosstermColor::AnsiValue(i),
Color::Reset => CrosstermColor::Reset,
Color::Black => CrosstermColor::Black,
Color::Red => CrosstermColor::DarkRed,
Color::Green => CrosstermColor::DarkGreen,
Color::Yellow => CrosstermColor::DarkYellow,
Color::Blue => CrosstermColor::DarkBlue,
Color::Magenta => CrosstermColor::DarkMagenta,
Color::Cyan => CrosstermColor::DarkCyan,
Color::Gray => CrosstermColor::Grey,
Color::DarkGray => CrosstermColor::DarkGrey,
Color::LightRed => CrosstermColor::Red,
Color::LightGreen => CrosstermColor::Green,
Color::LightYellow => CrosstermColor::Yellow,
Color::LightBlue => CrosstermColor::Blue,
Color::LightMagenta => CrosstermColor::Magenta,
Color::LightCyan => CrosstermColor::Cyan,
Color::White => CrosstermColor::White,
Color::Rgb(r, g, b) => CrosstermColor::Rgb { r, g, b },
Color::Indexed(i) => CrosstermColor::AnsiValue(i),
}
}
@@ -574,8 +574,8 @@ fn render_header(buffer: &mut Buffer, area: Rect, app: &AppState) {
Span::raw("CPU / Memory / Disk: "),
Span::styled(
format!(
"{} cores / {} MB / {} GB",
app.vm_info.cpu_cores, app.vm_info.max_memory_mb, app.vm_info.max_disk_gb
"{} cores / {} / {}",
app.vm_info.cpu_cores, app.vm_info.max_memory, app.vm_info.max_disk
),
Style::default().fg(Color::Green),
),
+18
View File
@@ -0,0 +1,18 @@
use std::{
env,
path::{Path, PathBuf},
};
pub fn relative_to_home(directory: &Path) -> String {
let Ok(home) = env::var("HOME") else {
return directory.display().to_string();
};
let home_path = PathBuf::from(home);
if let Ok(stripped) = directory.strip_prefix(&home_path) {
if stripped.components().next().is_none() {
return "~".to_string();
}
return format!("~/{}", stripped.display());
}
directory.display().to_string()
}
+126 -159
View File
@@ -1,5 +1,5 @@
use crate::instance::STATUS_FILE_NAME;
use crate::session_manager::{GLOBAL_CACHE_DIR_NAME, INSTANCE_DIR_NAME};
use anyhow::{Context, Error, Result, bail};
use std::{
env, fs,
io::{self, Write},
@@ -23,6 +23,7 @@ use std::{
};
use block2::RcBlock;
use bytesize::ByteSize;
use dispatch2::DispatchQueue;
use objc2::{AnyThread, rc::Retained, runtime::ProtocolObject};
use objc2_foundation::*;
@@ -34,49 +35,19 @@ const DEBIAN_COMPRESSED_SIZE_BYTES: u64 = 280901576;
const SHARED_DIRECTORIES_TAG: &str = "shared";
pub const PROJECT_GUEST_BASE: &str = "/usr/local/vibebox-mounts";
const BYTES_PER_MB: u64 = 1024 * 1024;
const DEFAULT_CPU_COUNT: usize = 2;
const DEFAULT_RAM_MB: u64 = 2048;
const DEFAULT_RAM_BYTES: u64 = DEFAULT_RAM_MB * BYTES_PER_MB;
const START_TIMEOUT: Duration = Duration::from_secs(60);
const LOGIN_EXPECT_TIMEOUT: Duration = Duration::from_secs(120);
const PROVISION_EXPECT_TIMEOUT: Duration = Duration::from_secs(900);
struct StatusFile {
path: PathBuf,
cleared: AtomicBool,
}
impl StatusFile {
fn new(path: PathBuf) -> Self {
Self {
path,
cleared: AtomicBool::new(false),
}
}
fn update(&self, message: &str) {
let _ = fs::write(&self.path, message);
}
}
impl Drop for StatusFile {
fn drop(&mut self) {
if !self.cleared.load(Ordering::SeqCst) {
let _ = fs::remove_file(&self.path);
self.cleared.store(true, Ordering::SeqCst);
}
}
}
const ERROR_REPORT_SCRIPT: &str = include_str!("error_report.sh");
const PROVISION_SCRIPT: &str = include_str!("provision.sh");
const PROVISION_SCRIPT_NAME: &str = "provision.sh";
const RESIZE_DISK_SCRIPT: &str = include_str!("resize_disk.sh");
const DEFAULT_RAW_NAME: &str = "default.raw";
const INSTANCE_RAW_NAME: &str = "instance.raw";
const BASE_DISK_RAW_NAME: &str = "disk.raw";
#[derive(Clone)]
pub(crate) enum LoginAction {
pub enum LoginAction {
Expect {
text: String,
timeout: Duration,
@@ -88,23 +59,20 @@ pub(crate) enum LoginAction {
},
Send(String),
}
use crate::config::BoxConfig;
use LoginAction::*;
#[derive(Clone)]
pub(crate) struct DirectoryShare {
pub struct DirectoryShare {
host: PathBuf,
guest: PathBuf,
read_only: bool,
}
impl DirectoryShare {
pub(crate) fn new(
host: PathBuf,
mut guest: PathBuf,
read_only: bool,
) -> Result<Self, Box<dyn std::error::Error>> {
pub fn new(host: PathBuf, mut guest: PathBuf, read_only: bool) -> Result<Self> {
if !host.exists() {
return Err(format!("Host path does not exist: {}", host.display()).into());
bail!(format!("host path does not exist: {}", host.display()));
}
if !guest.is_absolute() {
guest = PathBuf::from("/root").join(guest);
@@ -116,10 +84,10 @@ impl DirectoryShare {
})
}
pub(crate) fn from_mount_spec(spec: &str) -> Result<Self, Box<dyn std::error::Error>> {
pub fn from_mount_spec(spec: &str) -> Result<Self> {
let parts: Vec<&str> = spec.split(':').collect();
if parts.len() < 2 || parts.len() > 3 {
return Err(format!("Invalid mount spec: {spec}").into());
bail!(format!("invalid mount spec: {spec}"));
}
let host = expand_tilde_path(parts[0]);
let guest = PathBuf::from(parts[1]);
@@ -128,11 +96,10 @@ impl DirectoryShare {
"read-only" => true,
"read-write" => false,
_ => {
return Err(format!(
bail!(format!(
"Invalid mount mode '{}'; expected read-only or read-write",
parts[2]
)
.into());
));
}
}
} else {
@@ -176,19 +143,28 @@ pub struct VmArg {
pub mounts: Vec<String>,
}
pub fn run_with_args<F>(args: VmArg, io_handler: F) -> Result<(), Box<dyn std::error::Error>>
type StatusEmitter<'a> = dyn Fn(&str) + std::marker::Send + Sync + 'a;
fn emit_status(status: Option<&StatusEmitter<'_>>, message: &str) {
if let Some(status) = status {
status(message);
}
}
pub fn run_with_args<F>(args: VmArg, io_handler: F) -> Result<()>
where
F: FnOnce(Arc<OutputMonitor>, OwnedFd, OwnedFd) -> IoContext,
{
run_with_args_and_extras(args, io_handler, Vec::new(), Vec::new())
run_with_args_and_extras(args, io_handler, Vec::new(), Vec::new(), None)
}
pub(crate) fn run_with_args_and_extras<F>(
pub fn run_with_args_and_extras<F>(
args: VmArg,
io_handler: F,
extra_login_actions: Vec<LoginAction>,
extra_directory_shares: Vec<DirectoryShare>,
) -> Result<(), Box<dyn std::error::Error>>
status: Option<&StatusEmitter<'_>>,
) -> Result<()>
where
F: FnOnce(Arc<OutputMonitor>, OwnedFd, OwnedFd) -> IoContext,
{
@@ -197,7 +173,7 @@ where
let project_root = env::current_dir()?;
let project_name = project_root
.file_name()
.ok_or("Project directory has no name")?
.with_context(|| "Project directory has no name")?
.to_string_lossy()
.into_owned();
@@ -210,8 +186,8 @@ where
let instance_dir = project_root.join(INSTANCE_DIR_NAME);
fs::create_dir_all(&instance_dir)?;
let status_file = StatusFile::new(instance_dir.join(STATUS_FILE_NAME));
status_file.update("preparing VM image...");
emit_status(status, "preparing VM image...");
tracing::info!("preparing VM image...");
let provision_log = instance_dir.join("provision.log");
let basename_compressed = DEBIAN_COMPRESSED_DISK_URL.rsplit('/').next().unwrap();
@@ -236,14 +212,14 @@ where
&base_compressed,
&default_raw,
std::slice::from_ref(&mise_directory_share),
Some(&status_file),
Some(&provision_log),
status,
)?;
let _ = ensure_instance_disk(
&instance_raw,
&default_raw,
args.disk_bytes,
Some(&status_file),
ByteSize(args.disk_bytes),
status,
)?;
let base_size = fs::metadata(&default_raw)?.len();
let instance_size = fs::metadata(&instance_raw)?.len();
@@ -273,7 +249,7 @@ where
}
if needs_resize {
let resize_cmd = script_command_from_content("resize_disk", RESIZE_DISK_SCRIPT)?;
let resize_cmd = script_command_from_content("resize_disk.sh", RESIZE_DISK_SCRIPT)?;
login_actions.push(Send(resize_cmd));
}
@@ -289,25 +265,29 @@ where
&directory_shares[..],
args.cpu_count,
args.ram_bytes,
Some(&status_file),
status,
io_handler,
)
}
pub(crate) fn script_command_from_content(
label: &str,
script: &str,
) -> Result<String, Box<dyn std::error::Error>> {
pub fn script_command_from_content(label: &str, script: &str) -> Result<String> {
let marker = "VIBE_SCRIPT_EOF";
let guest_dir = "/tmp/vibe-scripts";
let guest_path = format!("{guest_dir}/{label}.sh");
let script_body = match script.split_once('\n') {
Some((first, rest)) if first.starts_with("#!") => rest,
_ => script,
};
let wrapped_script = ERROR_REPORT_SCRIPT
.replace("__LABEL__", label)
.replace("__SCRIPT_BODY__", script_body);
let command = format!(
"mkdir -p {guest_dir}\ncat >{guest_path} <<'{marker}'\n{script}\n{marker}\nchmod +x {guest_path}\n{guest_path}"
"mkdir -p {guest_dir}\ncat >{guest_path} <<'{marker}'\n{wrapped_script}\n{marker}\nchmod +x {guest_path}\n{guest_path}"
);
if script.contains(marker) {
return Err(
format!("Script '{label}' contains marker '{marker}', cannot safely upload").into(),
);
bail!(format!(
"Script '{label}' contains marker '{marker}', cannot safely upload"
));
}
Ok(command)
}
@@ -504,18 +484,16 @@ impl IoControl {
fn ensure_base_image(
base_raw: &Path,
base_compressed: &Path,
status: Option<&StatusFile>,
) -> Result<(), Box<dyn std::error::Error>> {
status: Option<&StatusEmitter<'_>>,
) -> Result<()> {
if base_raw.exists() {
return Ok(());
}
if !base_compressed.exists()
|| std::fs::metadata(base_compressed).map(|m| m.len())? < DEBIAN_COMPRESSED_SIZE_BYTES
|| fs::metadata(base_compressed).map(|m| m.len())? < DEBIAN_COMPRESSED_SIZE_BYTES
{
if let Some(status) = status {
status.update("downloading base image...");
}
emit_status(status, "downloading base image...");
tracing::info!("downloading base image");
let status = Command::new("curl")
.args([
@@ -530,15 +508,14 @@ fn ensure_base_image(
])
.status()?;
if !status.success() {
return Err("Failed to download base image".into());
bail!("failed to download base image");
}
}
// Check SHA
{
if let Some(status) = status {
status.update("verifying base image...");
}
emit_status(status, "verifying base image...");
tracing::info!("verifying base image...");
let input = format!("{} {}\n", DEBIAN_COMPRESSED_SHA, base_compressed.display());
let mut child = Command::new("/usr/bin/shasum")
@@ -556,25 +533,25 @@ fn ensure_base_image(
let status = child.wait().expect("failed to wait on child");
if !status.success() {
return Err(format!("SHA validation failed for {DEBIAN_COMPRESSED_DISK_URL}").into());
bail!(format!(
"SHA validation failed for {DEBIAN_COMPRESSED_DISK_URL}"
));
}
}
if let Some(status) = status {
status.update("decompressing base image...");
}
tracing::info!("decompressing base image");
emit_status(status, "decompressing base image...");
tracing::info!("decompressing base image...");
let status = Command::new("tar")
.args([
"-xOf",
&base_compressed.to_string_lossy(),
BASE_DISK_RAW_NAME,
])
.stdout(std::fs::File::create(base_raw)?)
.stdout(fs::File::create(base_raw)?)
.status()?;
if !status.success() {
return Err("Failed to decompress base image".into());
bail!("Failed to decompress base image");
}
Ok(())
@@ -585,22 +562,20 @@ fn ensure_default_image(
base_compressed: &Path,
default_raw: &Path,
directory_shares: &[DirectoryShare],
status: Option<&StatusFile>,
provision_log: Option<&Path>,
) -> Result<(), Box<dyn std::error::Error>> {
status: Option<&StatusEmitter<'_>>,
) -> Result<()> {
if default_raw.exists() {
return Ok(());
}
ensure_base_image(base_raw, base_compressed, status)?;
if let Some(status) = status {
status.update("configuring base image...");
}
tracing::info!("configuring base image");
emit_status(status, "configuring base image...");
tracing::info!("configuring base image...");
fs::copy(base_raw, default_raw)?;
let provision_command = script_command_from_content(PROVISION_SCRIPT_NAME, PROVISION_SCRIPT)?;
let provision_command = script_command_from_content("provision.sh", PROVISION_SCRIPT)?;
let provision_actions = [
Send(provision_command),
ExpectEither {
@@ -615,9 +590,9 @@ fn ensure_default_image(
default_raw,
&provision_actions,
directory_shares,
DEFAULT_CPU_COUNT,
DEFAULT_RAM_BYTES,
None,
BoxConfig::default().cpu_count,
BoxConfig::default().ram_size.as_u64(),
status,
move |output_monitor, vm_output_fd, vm_input_fd| {
spawn_vm_io_with_log(output_monitor, vm_output_fd, vm_input_fd, log_path)
},
@@ -627,9 +602,9 @@ fn ensure_default_image(
default_raw,
&provision_actions,
directory_shares,
DEFAULT_CPU_COUNT,
DEFAULT_RAM_BYTES,
None,
BoxConfig::default().cpu_count,
BoxConfig::default().ram_size.as_u64(),
status,
)
};
@@ -644,18 +619,16 @@ fn ensure_default_image(
fn ensure_instance_disk(
instance_raw: &Path,
template_raw: &Path,
target_bytes: u64,
status: Option<&StatusFile>,
) -> Result<bool, Box<dyn std::error::Error>> {
target_bytes: ByteSize,
status: Option<&StatusEmitter<'_>>,
) -> Result<bool> {
if instance_raw.exists() {
let current_size = fs::metadata(instance_raw)?.len();
let current_size = ByteSize(fs::metadata(instance_raw)?.len());
if current_size != target_bytes {
let current_gb = current_size as f64 / (1024.0 * 1024.0 * 1024.0);
let target_gb = target_bytes as f64 / (1024.0 * 1024.0 * 1024.0);
let current_gb = current_size;
let target_gb = target_bytes;
tracing::warn!(
current_bytes = current_size,
target_bytes,
"instance disk size does not match config (current {:.2} GB, config {:.2} GB); disk_gb applies only on init. Run `vibebox reset` to recreate or set disk_gb to match; using existing disk.",
"instance disk size does not match config (current {}, config {}); disk_gb applies only on init. Run `vibebox reset` to recreate or set disk_gb to match; using existing disk.",
current_gb,
target_gb
);
@@ -663,30 +636,28 @@ fn ensure_instance_disk(
return Ok(false);
}
let template_size = fs::metadata(template_raw)?.len();
let template_size = ByteSize(fs::metadata(template_raw)?.len());
if target_bytes < template_size {
return Err(format!(
"Requested disk size {} bytes is smaller than base image size {} bytes",
bail!(format!(
"Requested disk size {} is smaller than base image size {}",
target_bytes, template_size
)
.into());
));
}
let target_size = target_bytes;
let needs_resize = target_size > template_size;
if let Some(status) = status {
status.update("creating instance disk...");
}
emit_status(status, "creating instance disk...");
tracing::info!("creating instance disk...");
tracing::info!(path = %template_raw.display(), "creating instance disk");
std::fs::create_dir_all(instance_raw.parent().unwrap())?;
fs::create_dir_all(instance_raw.parent().unwrap())?;
if target_size == template_size {
fs::copy(template_raw, instance_raw)?;
return Ok(needs_resize);
}
let mut dst = std::fs::File::create(instance_raw)?;
dst.set_len(target_size)?;
let mut src = std::fs::File::open(template_raw)?;
let mut dst = fs::File::create(instance_raw)?;
dst.set_len(target_size.as_u64())?;
let mut src = fs::File::open(template_raw)?;
std::io::copy(&mut src, &mut dst)?;
Ok(needs_resize)
}
@@ -704,18 +675,17 @@ pub fn create_pipe() -> (OwnedFd, OwnedFd) {
(read_stream.into(), write_stream.into())
}
pub fn spawn_vm_io_with_hooks<F, G>(
pub fn spawn_vm_io_with_hooks<
F: FnMut(&str) -> bool + std::marker::Send + 'static,
G: FnMut(&[u8]) + std::marker::Send + 'static,
>(
output_monitor: Arc<OutputMonitor>,
vm_output_fd: OwnedFd,
vm_input_fd: OwnedFd,
io_control: Arc<IoControl>,
mut on_line: F,
mut on_output: G,
) -> IoContext
where
F: FnMut(&str) -> bool + ::std::marker::Send + 'static,
G: FnMut(&[u8]) + ::std::marker::Send + 'static,
{
) -> IoContext {
let (input_tx, input_rx): (Sender<VmInput>, Receiver<VmInput>) = mpsc::channel();
// raw_guard is set when we've put the user's terminal into raw mode because we've attached stdin/stdout to the VM.
@@ -863,14 +833,14 @@ where
PollResult::Spurious => continue,
PollResult::Ready(bytes) => {
if io_control.forward_output() {
// enable raw mode, if we haven't already
// enable raw mode if we haven't already
if raw_guard.lock().unwrap().is_none()
&& let Ok(guard) = enable_raw_mode(libc::STDIN_FILENO)
{
*raw_guard.lock().unwrap() = Some(guard);
}
let mut stdout = std::io::stdout().lock();
let mut stdout = io::stdout().lock();
if stdout.write_all(bytes).is_err() {
break;
}
@@ -886,7 +856,7 @@ where
// Copies data from mpsc channel into VM, so vibe can "type" stuff and run scripts.
let mux_thread = thread::spawn(move || {
let mut vm_writer = std::fs::File::from(vm_input_fd);
let mut vm_writer = fs::File::from(vm_input_fd);
loop {
match input_rx.recv() {
Ok(VmInput::Bytes(data)) => {
@@ -916,7 +886,7 @@ pub fn spawn_vm_io_with_line_handler<F>(
on_line: F,
) -> IoContext
where
F: FnMut(&str) -> bool + ::std::marker::Send + 'static,
F: FnMut(&str) -> bool + std::marker::Send + 'static,
{
spawn_vm_io_with_hooks(
output_monitor,
@@ -983,7 +953,7 @@ fn create_vm_configuration(
vm_writes_to_fd: OwnedFd,
cpu_count: usize,
ram_bytes: u64,
) -> Result<Retained<VZVirtualMachineConfiguration>, Box<dyn std::error::Error>> {
) -> Result<Retained<VZVirtualMachineConfiguration>> {
unsafe {
let platform =
VZGenericPlatformConfiguration::init(VZGenericPlatformConfiguration::alloc());
@@ -1017,7 +987,7 @@ fn create_vm_configuration(
false,
VZDiskImageCachingMode::Automatic,
VZDiskImageSynchronizationMode::Full,
).unwrap();
)?;
let disk_device = VZVirtioBlockDeviceConfiguration::initWithAttachment(
VZVirtioBlockDeviceConfiguration::alloc(),
@@ -1104,7 +1074,7 @@ fn create_vm_configuration(
// Validate
config.validateWithError().map_err(|e| {
io::Error::other(format!(
"Invalid VM configuration: {:?}",
"invalid VM configuration: {:?}",
e.localizedDescription()
))
})?;
@@ -1113,9 +1083,9 @@ fn create_vm_configuration(
}
}
fn load_efi_variable_store() -> Result<Retained<VZEFIVariableStore>, Box<dyn std::error::Error>> {
fn load_efi_variable_store() -> Result<Retained<VZEFIVariableStore>> {
unsafe {
let temp_dir = std::env::temp_dir();
let temp_dir = env::temp_dir();
let temp_path = temp_dir.join(format!("efi_variable_store_{}.efivars", std::process::id()));
let url = nsurl_from_path(&temp_path)?;
let options = VZEFIVariableStoreInitializationOptions::AllowOverwrite;
@@ -1131,8 +1101,8 @@ fn load_efi_variable_store() -> Result<Retained<VZEFIVariableStore>, Box<dyn std
fn spawn_login_actions_thread(
login_actions: Vec<LoginAction>,
output_monitor: Arc<OutputMonitor>,
input_tx: mpsc::Sender<VmInput>,
vm_output_tx: mpsc::Sender<VmOutput>,
input_tx: Sender<VmInput>,
vm_output_tx: Sender<VmOutput>,
) -> thread::JoinHandle<()> {
thread::spawn(move || {
for a in login_actions {
@@ -1182,9 +1152,9 @@ fn run_vm_with_io<F>(
directory_shares: &[DirectoryShare],
cpu_count: usize,
ram_bytes: u64,
status: Option<&StatusFile>,
status: Option<&StatusEmitter<'_>>,
io_handler: F,
) -> Result<(), Box<dyn std::error::Error>>
) -> Result<()>
where
F: FnOnce(Arc<OutputMonitor>, OwnedFd, OwnedFd) -> IoContext,
{
@@ -1231,23 +1201,22 @@ where
match rx.try_recv() {
Ok(result) => {
result.map_err(|e| format!("Failed to start VM: {}", e))?;
result.map_err(|e| Error::msg(format!("Failed to start VM: {}", e)))?;
break;
}
Err(mpsc::TryRecvError::Empty) => continue,
Err(mpsc::TryRecvError::Disconnected) => {
return Err("VM start channel disconnected".into());
bail!("VM start channel disconnected");
}
}
}
if Instant::now() >= start_deadline {
return Err("Timed out waiting for VM to start".into());
bail!("Timed out waiting for VM to start");
}
if let Some(status) = status {
status.update("vm booting... go vibecoder!");
}
emit_status(status, "vm booting... go vibecoder!");
tracing::info!("vm booting... go vibecoder!");
tracing::info!("vm booting");
let output_monitor = Arc::new(OutputMonitor::default());
@@ -1293,7 +1262,7 @@ where
);
let mut last_state = None;
let mut exit_result = Ok(());
let mut exit_result: Result<(), String> = Ok(());
loop {
unsafe {
NSRunLoop::mainRunLoop().runMode_beforeDate(
@@ -1312,8 +1281,7 @@ where
exit_result = Err(format!(
"Login action ({}) timed out after {:?}; shutting down.",
action, timeout
)
.into());
));
unsafe {
if vm.canRequestStop() {
if let Err(err) = vm.requestStopWithError() {
@@ -1330,8 +1298,7 @@ where
exit_result = Err(format!(
"Login action ({}) failed: {}; shutting down.",
action, reason
)
.into());
));
unsafe {
if vm.canRequestStop() {
if let Err(err) = vm.requestStopWithError() {
@@ -1347,7 +1314,7 @@ where
Err(mpsc::TryRecvError::Empty) => {}
Err(mpsc::TryRecvError::Disconnected) => {}
}
if state != objc2_virtualization::VZVirtualMachineState::Running {
if state != VZVirtualMachineState::Running {
//eprintln!("VM stopped with state: {:?}", state);
break;
}
@@ -1357,7 +1324,7 @@ where
io_ctx.shutdown();
exit_result
exit_result.map_err(Error::msg)
}
fn run_vm(
@@ -1366,8 +1333,8 @@ fn run_vm(
directory_shares: &[DirectoryShare],
cpu_count: usize,
ram_bytes: u64,
status: Option<&StatusFile>,
) -> Result<(), Box<dyn std::error::Error>> {
status: Option<&StatusEmitter<'_>>,
) -> Result<()> {
run_vm_with_io(
disk_path,
login_actions,
@@ -1379,7 +1346,7 @@ fn run_vm(
)
}
fn nsurl_from_path(path: &Path) -> Result<Retained<NSURL>, Box<dyn std::error::Error>> {
fn nsurl_from_path(path: &Path) -> Result<Retained<NSURL>> {
let abs_path = if path.is_absolute() {
path.to_path_buf()
} else {
@@ -1388,7 +1355,7 @@ fn nsurl_from_path(path: &Path) -> Result<Retained<NSURL>, Box<dyn std::error::E
let ns_path = NSString::from_str(
abs_path
.to_str()
.ok_or("Non-UTF8 path encountered while building NSURL")?,
.with_context(|| "non-UTF8 path encountered while building NSURL")?,
);
Ok(NSURL::fileURLWithPath(&ns_path))
}
@@ -1403,7 +1370,7 @@ fn enable_raw_mode(fd: i32) -> io::Result<RawModeGuard> {
let original = attributes;
// Disable translation of carriage return to newline on input
attributes.c_iflag &= !(libc::ICRNL);
attributes.c_iflag &= !libc::ICRNL;
// Disable canonical mode (line buffering), echo, and signal generation
attributes.c_lflag &= !(libc::ICANON | libc::ECHO | libc::ISIG);
attributes.c_cc[libc::VMIN] = 0;
@@ -1431,10 +1398,10 @@ impl Drop for RawModeGuard {
// Ensure the running binary has com.apple.security.virtualization entitlements by checking and, if not, signing and relaunching.
pub fn ensure_signed() {
if std::env::var("VIBEBOX_SKIP_CODESIGN").as_deref() == Ok("1") {
if env::var("VIBEBOX_SKIP_CODESIGN").as_deref() == Ok("1") {
return;
}
let exe = std::env::current_exe().expect("failed to get current exe path");
let exe = env::current_exe().expect("failed to get current exe path");
let exe_str = exe.to_str().expect("exe path not valid utf-8");
let has_required_entitlements = {
@@ -1456,8 +1423,8 @@ pub fn ensure_signed() {
}
const ENTITLEMENTS: &str = include_str!("entitlements.plist");
let entitlements_path = std::env::temp_dir().join("entitlements.plist");
std::fs::write(&entitlements_path, ENTITLEMENTS).expect("failed to write entitlements");
let entitlements_path = env::temp_dir().join("entitlements.plist");
fs::write(&entitlements_path, ENTITLEMENTS).expect("failed to write entitlements");
let output = Command::new("codesign")
.args([
@@ -1470,7 +1437,7 @@ pub fn ensure_signed() {
])
.output();
let _ = std::fs::remove_file(&entitlements_path);
let _ = fs::remove_file(&entitlements_path);
match output {
Ok(o) if o.status.success() => {
@@ -1478,7 +1445,7 @@ pub fn ensure_signed() {
if !stderr.trim().is_empty() {
tracing::debug!(codesign_stderr = %stderr.trim(), "codesign output");
}
let err = Command::new(&exe).args(std::env::args_os().skip(1)).exec();
let err = Command::new(&exe).args(env::args_os().skip(1)).exec();
tracing::error!(error = %err, "failed to re-exec after signing");
std::process::exit(1);
}
+204 -114
View File
@@ -1,12 +1,22 @@
use crate::instance::{VmLiveness, vm_liveness};
use crate::session_manager::INSTANCE_DIR_NAME;
use crate::{
config::CONFIG_PATH_ENV,
instance::{
InstanceConfig, STATUS_VM_ERROR_PREFIX, build_ssh_login_actions, ensure_instance_dir,
ensure_ssh_keypair, extract_ipv4, load_or_create_instance_config, write_instance_config,
},
session_manager::{GLOBAL_DIR_NAME, VM_MANAGER_PID_NAME, VM_MANAGER_SOCKET_NAME},
vm::{self, DirectoryShare, LoginAction, PROJECT_GUEST_BASE, VmInput},
};
use anyhow::{Error, Result, anyhow, bail};
use std::{
env, fs,
io::{Read, Write},
os::unix::{
fs::FileTypeExt,
fs::PermissionsExt,
io::AsRawFd,
net::{UnixListener, UnixStream},
process::CommandExt,
},
path::{Path, PathBuf},
process::{Command, Stdio},
@@ -15,20 +25,8 @@ use std::{
time::{Duration, Instant},
};
use crate::{
config::CONFIG_PATH_ENV,
instance::STATUS_FILE_NAME,
instance::VM_ROOT_LOG_NAME,
instance::{
DEFAULT_SSH_USER, InstanceConfig, build_ssh_login_actions, ensure_instance_dir,
ensure_ssh_keypair, extract_ipv4, load_or_create_instance_config, write_instance_config,
},
session_manager::{
GLOBAL_DIR_NAME, INSTANCE_FILENAME, VM_MANAGER_PID_NAME, VM_MANAGER_SOCKET_NAME,
},
vm::{self, DirectoryShare, LoginAction, PROJECT_GUEST_BASE, VmInput},
};
#[cfg_attr(feature = "mock-vm", allow(dead_code))]
const VM_ROOT_LOG_NAME: &str = "vm_root.log";
const VM_MANAGER_LOCK_NAME: &str = "vm.lock";
const VM_MANAGER_LOG_NAME: &str = "vm_manager.log";
const SHUTDOWN_RETRY_MS: u64 = 500;
@@ -36,6 +34,10 @@ const SHUTDOWN_RETRY_MS: u64 = 500;
const HARD_SHUTDOWN_TIMEOUT_MS: u64 = 1_000;
#[cfg(not(test))]
const HARD_SHUTDOWN_TIMEOUT_MS: u64 = 12_000;
const STATUS_PREFIX: &str = "status:";
type ClientStreams = Arc<Mutex<Vec<UnixStream>>>;
type SharedStatus = Arc<Mutex<String>>;
#[cfg(not(test))]
fn force_exit(_reason: &str) -> ! {
@@ -51,16 +53,16 @@ pub fn ensure_manager(
raw_args: &[std::ffi::OsString],
auto_shutdown_ms: u64,
config_path: Option<&Path>,
) -> Result<UnixStream, Box<dyn std::error::Error>> {
) -> Result<UnixStream> {
let project_root = env::current_dir()?;
tracing::debug!(root = %project_root.display(), "ensure vm manager");
let instance_dir = ensure_instance_dir(&project_root)?;
cleanup_stale_manager(&instance_dir);
cleanup_stale_manager(&project_root)?;
let socket_path = instance_dir.join(VM_MANAGER_SOCKET_NAME);
if let Ok(stream) = UnixStream::connect(&socket_path) {
send_client_pid(&stream);
tracing::info!(path = %socket_path.display(), "connected to existing vm manager");
tracing::info!(path = %socket_path.display(), "connected to an existing vm manager");
return Ok(stream);
}
@@ -98,12 +100,11 @@ pub fn ensure_manager(
drop(lock_file.take());
let _ = fs::remove_file(&lock_path);
}
return Err(format!(
"Timed out waiting for vm manager socket: {} ({})",
bail!(format!(
"timed out waiting for vm manager socket: {} ({})",
socket_path.display(),
err
)
.into());
));
}
thread::sleep(Duration::from_millis(100));
}
@@ -111,12 +112,19 @@ pub fn ensure_manager(
}
}
pub fn run_manager(
args: vm::VmArg,
auto_shutdown_ms: u64,
) -> Result<(), Box<dyn std::error::Error>> {
pub fn run_manager(args: vm::VmArg, auto_shutdown_ms: u64) -> Result<()> {
let project_root = env::current_dir()?;
tracing::info!(root = %project_root.display(), "vm manager starting");
#[cfg(not(feature = "mock-vm"))]
{
unsafe {
env::remove_var("VIBEBOX_SKIP_CODESIGN");
}
vm::ensure_signed();
unsafe {
env::set_var("VIBEBOX_SKIP_CODESIGN", "1");
}
}
let _pid_guard = ensure_pid_file(&project_root)?;
#[cfg(feature = "mock-vm")]
tracing::info!("vm manager using mock executor");
@@ -134,7 +142,6 @@ pub fn run_manager(
#[cfg(feature = "mock-vm")]
{
ManagerOptions {
ensure_signed: false,
detach: true,
prepare_vm: false,
}
@@ -142,7 +149,6 @@ pub fn run_manager(
#[cfg(not(feature = "mock-vm"))]
{
ManagerOptions {
ensure_signed: true,
detach: true,
prepare_vm: true,
}
@@ -156,25 +162,22 @@ fn spawn_manager_process(
auto_shutdown_ms: u64,
instance_dir: &Path,
config_path: Option<&Path>,
) -> Result<(), Box<dyn std::error::Error>> {
) -> Result<()> {
let exe = env::current_exe()?;
let mut supervisor_exe = exe.clone();
supervisor_exe.set_file_name("vibebox-supervisor");
let use_supervisor = supervisor_exe.exists();
let mut cmd = if use_supervisor {
Command::new(supervisor_exe)
} else {
let mut cmd = Command::new(exe);
cmd.arg0("vibebox-supervisor");
cmd
};
// intentional
if !supervisor_exe.exists() {
bail!(format!(
"vibebox-supervisor not found at {}",
supervisor_exe.display()
));
}
let mut cmd = Command::new(supervisor_exe);
if raw_args.len() > 1 {
cmd.args(&raw_args[1..]);
}
cmd.env("VIBEBOX_INTERNAL", "1");
if !use_supervisor {
cmd.env("VIBEBOX_VM_MANAGER", "1");
}
cmd.env("VIBEBOX_LOG_NO_COLOR", "1");
cmd.env("VIBEBOX_AUTO_SHUTDOWN_MS", auto_shutdown_ms.to_string());
if let Some(path) = config_path {
@@ -202,22 +205,22 @@ fn spawn_manager_process(
Ok(())
}
fn ensure_pid_file(project_root: &Path) -> Result<PidFileGuard, Box<dyn std::error::Error>> {
fn ensure_pid_file(project_root: &Path) -> Result<PidFileGuard> {
let instance_dir = ensure_instance_dir(project_root)?;
let pid_path = instance_dir.join(VM_MANAGER_PID_NAME);
let socket_path = instance_dir.join(VM_MANAGER_SOCKET_NAME);
if let Ok(content) = fs::read_to_string(&pid_path)
&& let Ok(pid) = content.trim().parse::<u32>()
&& pid_is_alive(pid)
{
if is_socket_path(&socket_path) {
return Err(format!("vm manager already running (pid {pid})").into());
match vm_liveness(project_root)? {
VmLiveness::RunningWithSocket { pid } => {
bail!("vm manager already running (pid {pid})");
}
tracing::warn!(
pid,
path = %socket_path.display(),
"stale pid file detected with missing socket"
);
VmLiveness::RunningWithoutSocket { pid } => {
tracing::warn!(
pid,
path = %socket_path.display(),
"stale pid file detected with missing socket"
);
}
VmLiveness::NotRunningOrMissing => {}
}
let _ = fs::remove_file(&pid_path);
fs::write(&pid_path, format!("{}\n", std::process::id()))?;
@@ -225,15 +228,18 @@ fn ensure_pid_file(project_root: &Path) -> Result<PidFileGuard, Box<dyn std::err
Ok(PidFileGuard { path: pid_path })
}
fn cleanup_stale_manager(instance_dir: &Path) {
let pid_path = instance_dir.join(VM_MANAGER_PID_NAME);
if let Ok(content) = fs::read_to_string(&pid_path)
&& let Ok(pid) = content.trim().parse::<u32>()
&& pid_is_alive(pid)
{
return;
fn cleanup_stale_manager(project_root: &Path) -> Result<()> {
let pid_path = project_root
.join(INSTANCE_DIR_NAME)
.join(VM_MANAGER_PID_NAME);
if matches!(
vm_liveness(project_root)?,
VmLiveness::RunningWithSocket { .. } | VmLiveness::RunningWithoutSocket { .. }
) {
return Ok(());
}
let _ = fs::remove_file(&pid_path);
Ok(())
}
fn inject_project_mount(
@@ -260,12 +266,6 @@ fn inject_project_mount(
mounts.insert(0, format!("{host}:{guest_tilde}:read-write"));
}
fn is_socket_path(path: &Path) -> bool {
fs::metadata(path)
.map(|meta| meta.file_type().is_socket())
.unwrap_or(false)
}
fn prepare_mounts_and_links(mut args: vm::VmArg, ssh_user: &str) -> (vm::VmArg, String) {
let mut links = Vec::new();
let mut mounts = Vec::with_capacity(args.mounts.len());
@@ -409,6 +409,30 @@ fn wait_for_disconnect(mut stream: UnixStream) {
}
}
fn remove_client(streams: &ClientStreams, fd: std::os::fd::RawFd) {
if let Ok(mut clients) = streams.lock() {
clients.retain(|stream| stream.as_raw_fd() != fd);
}
}
fn send_status_line(stream: &mut UnixStream, status: &str) -> bool {
let mut payload = String::with_capacity(STATUS_PREFIX.len() + status.len() + 1);
payload.push_str(STATUS_PREFIX);
payload.push_str(status);
payload.push('\n');
stream.write_all(payload.as_bytes()).is_ok()
}
#[cfg_attr(feature = "mock-vm", allow(dead_code))]
fn broadcast_status(streams: &ClientStreams, latest_status: &SharedStatus, status: &str) {
if let Ok(mut current) = latest_status.lock() {
*current = status.to_string();
}
if let Ok(mut clients) = streams.lock() {
clients.retain_mut(|stream| send_status_line(stream, status));
}
}
fn send_client_pid(stream: &UnixStream) {
let pid = std::process::id();
let payload = format!("pid={pid}\n");
@@ -418,7 +442,7 @@ fn send_client_pid(stream: &UnixStream) {
}
}
fn acquire_spawn_lock(lock_path: &Path) -> Result<Option<fs::File>, Box<dyn std::error::Error>> {
fn acquire_spawn_lock(lock_path: &Path) -> Result<Option<fs::File>> {
match fs::OpenOptions::new()
.write(true)
.create_new(true)
@@ -452,6 +476,12 @@ fn is_lock_stale(lock_path: &Path) -> bool {
}
}
fn read_lock_pid(lock_path: &Path) -> Option<u32> {
let content = fs::read_to_string(lock_path).ok()?;
let line = content.lines().next()?;
line.strip_prefix("pid=")?.trim().parse::<u32>().ok()
}
fn pid_is_alive(pid: u32) -> bool {
let pid = pid as libc::pid_t;
let result = unsafe { libc::kill(pid, 0) };
@@ -465,12 +495,6 @@ fn pid_is_alive(pid: u32) -> bool {
}
}
fn read_lock_pid(lock_path: &Path) -> Option<u32> {
let content = fs::read_to_string(lock_path).ok()?;
let line = content.lines().next()?;
line.strip_prefix("pid=")?.trim().parse::<u32>().ok()
}
fn read_client_pid(stream: &UnixStream) -> Option<u32> {
let mut stream = stream.try_clone().ok()?;
let _ = stream.set_read_timeout(Some(Duration::from_millis(200)));
@@ -506,12 +530,14 @@ fn read_client_pid(stream: &UnixStream) -> Option<u32> {
#[cfg_attr(feature = "mock-vm", allow(dead_code))]
fn spawn_manager_io(
config: Arc<Mutex<InstanceConfig>>,
instance_dir: PathBuf,
project_dir: PathBuf,
clients: ClientStreams,
latest_status: SharedStatus,
output_monitor: Arc<vm::OutputMonitor>,
vm_output_fd: std::os::unix::io::OwnedFd,
vm_input_fd: std::os::unix::io::OwnedFd,
) -> vm::IoContext {
let log_path = instance_dir.join(VM_ROOT_LOG_NAME);
let log_path = project_dir.join(INSTANCE_DIR_NAME).join(VM_ROOT_LOG_NAME);
let log_file = fs::OpenOptions::new()
.create(true)
.write(true)
@@ -520,7 +546,6 @@ fn spawn_manager_io(
.ok()
.map(|file| Arc::new(Mutex::new(file)));
let instance_path = instance_dir.join(INSTANCE_FILENAME);
let config_for_output = config.clone();
let log_for_output = log_file.clone();
let mut line_buf = String::new();
@@ -543,6 +568,17 @@ fn spawn_manager_io(
line_buf.drain(..=pos);
let cleaned = line.trim_start_matches(['\r', ' ']);
if let Some(script_failure) = cleaned.strip_prefix("VIBEBOX_SCRIPT_ERROR:") {
let failure = script_failure.trim();
if !failure.is_empty() {
tracing::error!(script_failure = %failure, "[vm] script reported failure");
broadcast_status(
&clients,
&latest_status,
&format!("{STATUS_VM_ERROR_PREFIX} {failure}"),
);
}
}
if let Some(pos) = cleaned.find("VIBEBOX_IPV4=") {
let ip_raw = &cleaned[(pos + "VIBEBOX_IPV4=".len())..];
let ip = extract_ipv4(ip_raw).unwrap_or_default();
@@ -551,7 +587,7 @@ fn spawn_manager_io(
&& cfg.vm_ipv4.as_deref() != Some(ip.as_str())
{
cfg.vm_ipv4 = Some(ip.clone());
let _ = write_instance_config(&instance_path, &cfg);
let _ = write_instance_config(&project_dir, &cfg);
}
}
}
@@ -574,12 +610,12 @@ enum ManagerEvent {
}
struct ManagerOptions {
ensure_signed: bool,
detach: bool,
prepare_vm: bool,
}
trait VmExecutor {
#[allow(clippy::too_many_arguments)]
fn run_vm(
&self,
args: vm::VmArg,
@@ -587,8 +623,10 @@ trait VmExecutor {
extra_shares: Vec<DirectoryShare>,
config: Arc<Mutex<InstanceConfig>>,
instance_dir: PathBuf,
clients: ClientStreams,
latest_status: SharedStatus,
vm_input_tx: Arc<Mutex<Option<mpsc::Sender<VmInput>>>>,
) -> Result<(), Box<dyn std::error::Error>>;
) -> Result<()>;
}
#[cfg_attr(feature = "mock-vm", allow(dead_code))]
@@ -601,15 +639,22 @@ impl VmExecutor for RealVmExecutor {
extra_login_actions: Vec<LoginAction>,
extra_shares: Vec<DirectoryShare>,
config: Arc<Mutex<InstanceConfig>>,
instance_dir: PathBuf,
project_dir: PathBuf,
clients: ClientStreams,
latest_status: SharedStatus,
vm_input_tx: Arc<Mutex<Option<mpsc::Sender<VmInput>>>>,
) -> Result<(), Box<dyn std::error::Error>> {
) -> Result<()> {
let status_callback = |status: &str| {
broadcast_status(&clients, &latest_status, status);
};
vm::run_with_args_and_extras(
args,
|output_monitor, vm_output_fd, vm_input_fd| {
let io_ctx = spawn_manager_io(
config.clone(),
instance_dir.clone(),
project_dir.clone(),
clients.clone(),
latest_status.clone(),
output_monitor,
vm_output_fd,
vm_input_fd,
@@ -619,6 +664,7 @@ impl VmExecutor for RealVmExecutor {
},
extra_login_actions,
extra_shares,
Some(&status_callback),
)
}
}
@@ -635,8 +681,10 @@ impl VmExecutor for MockVmExecutor {
_extra_shares: Vec<DirectoryShare>,
_config: Arc<Mutex<InstanceConfig>>,
_instance_dir: PathBuf,
_clients: ClientStreams,
_latest_status: SharedStatus,
vm_input_tx: Arc<Mutex<Option<mpsc::Sender<VmInput>>>>,
) -> Result<(), Box<dyn std::error::Error>> {
) -> Result<()> {
let (tx, rx) = mpsc::channel::<VmInput>();
*vm_input_tx.lock().unwrap() = Some(tx);
tracing::info!("mock vm executor running");
@@ -662,24 +710,14 @@ fn run_manager_with(
auto_shutdown_ms: u64,
executor: &dyn VmExecutor,
options: ManagerOptions,
) -> Result<(), Box<dyn std::error::Error>> {
if options.ensure_signed {
let _had_skip = env::var("VIBEBOX_SKIP_CODESIGN").ok();
unsafe {
env::remove_var("VIBEBOX_SKIP_CODESIGN");
}
vm::ensure_signed();
unsafe {
env::set_var("VIBEBOX_SKIP_CODESIGN", "1");
}
}
) -> Result<()> {
if options.detach {
detach_from_terminal();
}
let project_name = project_root
.file_name()
.ok_or("Project directory has no name")?
.ok_or_else(|| anyhow!("Project directory has no name"))?
.to_string_lossy()
.into_owned();
let instance_dir = ensure_instance_dir(project_root)?;
@@ -687,16 +725,16 @@ fn run_manager_with(
let _ = ensure_ssh_keypair(&instance_dir)?;
}
let mut config = load_or_create_instance_config(&instance_dir)?;
let mut config = load_or_create_instance_config(project_root)?;
if config.vm_ipv4.is_some() {
config.vm_ipv4 = None;
write_instance_config(&instance_dir.join(INSTANCE_FILENAME), &config)?;
write_instance_config(project_root, &config)?;
}
let config = Arc::new(Mutex::new(config));
let ssh_user = config
.lock()
.map(|cfg| cfg.ssh_user_display())
.unwrap_or_else(|_| DEFAULT_SSH_USER.to_string());
.map(|cfg| cfg.ssh_user.clone())
.map_err(|_| anyhow!("failed to acquire ssh user display"))?;
if !args.no_default_mounts {
inject_project_mount(&mut args.mounts, project_root, &ssh_user, &project_name);
}
@@ -704,11 +742,10 @@ fn run_manager_with(
let project_guest_dir = format!("{PROJECT_GUEST_BASE}/{project_name}");
let ssh_guest_dir = format!("/root/{}", GLOBAL_DIR_NAME);
let extra_shares = vec![DirectoryShare::new(
instance_dir.clone(),
ssh_guest_dir.clone().into(),
true,
)?];
let extra_shares = vec![
DirectoryShare::new(instance_dir.clone(), ssh_guest_dir.clone().into(), true)
.map_err(|err| anyhow!(err.to_string()))?,
];
let extra_login_actions = build_ssh_login_actions(
&config,
&project_name,
@@ -731,17 +768,43 @@ fn run_manager_with(
let _ = fs::set_permissions(&socket_path, fs::Permissions::from_mode(0o600));
tracing::info!(path = %socket_path.display(), "vm manager socket bound");
let clients: ClientStreams = Arc::new(Mutex::new(Vec::new()));
let latest_status: SharedStatus = Arc::new(Mutex::new(String::new()));
let (event_tx, event_rx) = mpsc::channel::<ManagerEvent>();
let event_tx_accept = event_tx.clone();
let clients_accept = clients.clone();
let latest_status_accept = latest_status.clone();
thread::spawn(move || {
for stream in listener.incoming() {
match stream {
Ok(stream) => {
let mut client_fd: Option<std::os::fd::RawFd> = None;
let latest_status_snapshot = latest_status_accept
.lock()
.ok()
.map(|status| status.clone());
if let Ok(writer) = stream.try_clone() {
let writer_fd = writer.as_raw_fd();
if let Ok(mut connected) = clients_accept.lock() {
connected.push(writer);
client_fd = Some(writer_fd);
if let Some(last) = connected.last_mut()
&& let Some(status) = latest_status_snapshot.as_deref()
&& !status.is_empty()
{
let _ = send_status_line(last, status);
}
}
}
let event_tx_conn = event_tx_accept.clone();
let clients_conn = clients_accept.clone();
thread::spawn(move || {
let pid = read_client_pid(&stream);
let _ = event_tx_conn.send(ManagerEvent::Inc(pid));
wait_for_disconnect(stream);
if let Some(fd) = client_fd {
remove_client(&clients_conn, fd);
}
let _ = event_tx_conn.send(ManagerEvent::Dec(pid));
});
}
@@ -761,38 +824,43 @@ fn run_manager_with(
extra_login_actions,
extra_shares,
config.clone(),
instance_dir.clone(),
project_root.to_path_buf(),
clients.clone(),
latest_status.clone(),
vm_input_tx.clone(),
);
tracing::info!("vm manager vm run completed");
let vm_err = vm_result.err().map(|e| e.to_string());
if let Some(err) = &vm_err {
let status_path = instance_dir.join(STATUS_FILE_NAME);
let _ = fs::write(&status_path, format!("error: {err}"));
broadcast_status(
&clients,
&latest_status,
&format!("{STATUS_VM_ERROR_PREFIX} {err}"),
);
}
let _ = event_tx.send(ManagerEvent::VmExited(vm_err.clone()));
let event_loop_result: Result<(), String> = event_loop_handle
let event_loop_result = event_loop_handle
.join()
.unwrap_or_else(|_| Err("vm manager event loop panicked".into()))
.unwrap_or_else(|_| Err(Error::msg("vm manager event loop panicked")))
.map_err(|err| err.to_string());
let _ = fs::remove_file(&socket_path);
if let Err(err) = &event_loop_result {
tracing::error!(error = %err, "vm manager exiting due to event loop error");
return Err(err.to_string().into());
bail!(err.to_string());
}
if let Some(err) = vm_err {
tracing::error!(error = %err, "vm manager exiting due to vm error");
return Err(err.into());
bail!(err);
}
tracing::info!("vm manager exiting");
Ok(event_loop_result?)
event_loop_result.map_err(Error::msg)
}
fn manager_event_loop(
event_rx: mpsc::Receiver<ManagerEvent>,
vm_input_tx: Arc<Mutex<Option<mpsc::Sender<VmInput>>>>,
auto_shutdown_ms: u64,
) -> Result<(), String> {
) -> Result<()> {
let mut ref_count: usize = 0;
let mut shutdown_deadline: Option<Instant> = None;
let mut shutdown_sent = false;
@@ -902,7 +970,7 @@ fn manager_event_loop(
#[cfg(test)]
mod tests {
use super::*;
use std::{sync::mpsc, thread, time::Duration};
use std::{fs, sync::mpsc, thread, time::Duration};
#[test]
fn manager_powers_off_after_grace_when_no_refs() {
@@ -984,4 +1052,26 @@ mod tests {
let _ = event_tx.send(ManagerEvent::VmExited(None));
let _ = manager_thread.join();
}
#[test]
fn lock_is_not_stale_when_owner_pid_is_alive() {
let temp = tempfile::Builder::new()
.prefix("vb")
.tempdir_in("/tmp")
.expect("tempdir");
let lock_path = temp.path().join("vm.lock");
fs::write(&lock_path, format!("pid={}\n", std::process::id())).expect("write lock");
assert!(!is_lock_stale(&lock_path));
}
#[test]
fn lock_is_stale_when_owner_pid_is_missing() {
let temp = tempfile::Builder::new()
.prefix("vb")
.tempdir_in("/tmp")
.expect("tempdir");
let lock_path = temp.path().join("vm.lock");
fs::write(&lock_path, "pid=999999\n").expect("write lock");
assert!(is_lock_stale(&lock_path));
}
}