forked from wrenn/wrenn
fix: security and stability fixes from code review
- Scope WebSocket auth bypass to only WS endpoints by restructuring routes into separate chi Groups. Non-WS routes no longer passthrough unauthenticated requests with spoofed Upgrade headers. Added optionalAPIKeyOrJWT middleware for WS routes (injects auth context from API key/JWT if present, passes through otherwise) and markAdminWS middleware for admin WS routes. - Fix nil pointer dereference in envd Handler.Wait() — p.tty.Close() was called unconditionally but p.tty is nil for non-PTY processes, crashing every non-PTY process exit. - Fix goroutine leak in sandbox Pause — stopSampler was never called, leaking one sampler goroutine per successful pause operation. - Decouple PTY WebSocket reads from RPC dispatch using a buffered channel to prevent backpressure-induced connection drops under fast typing. Includes input coalescing to reduce RPC call volume.
This commit is contained in:
@ -1 +1 @@
|
|||||||
0.1.3
|
0.1.4
|
||||||
|
|||||||
@ -446,7 +446,9 @@ func (p *Handler) Wait() {
|
|||||||
|
|
||||||
err := p.cmd.Wait()
|
err := p.cmd.Wait()
|
||||||
|
|
||||||
|
if p.tty != nil {
|
||||||
p.tty.Close()
|
p.tty.Close()
|
||||||
|
}
|
||||||
|
|
||||||
var errMsg *string
|
var errMsg *string
|
||||||
|
|
||||||
|
|||||||
@ -311,10 +311,17 @@ func runPtyLoop(
|
|||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
// Input pump: read from WebSocket, dispatch to host agent.
|
// Input pump: decouple WebSocket reads from RPC dispatch.
|
||||||
|
// Reader goroutine drains the WebSocket into a buffered channel;
|
||||||
|
// sender goroutine dispatches RPCs at its own pace. This prevents
|
||||||
|
// slow RPCs from stalling WebSocket reads and causing proxy timeouts.
|
||||||
|
inputCh := make(chan wsPtyIn, 64)
|
||||||
|
|
||||||
|
// Reader: drain WebSocket as fast as possible.
|
||||||
wg.Add(1)
|
wg.Add(1)
|
||||||
go func() {
|
go func() {
|
||||||
defer wg.Done()
|
defer wg.Done()
|
||||||
|
defer close(inputCh)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
|
|
||||||
for {
|
for {
|
||||||
@ -328,6 +335,22 @@ func runPtyLoop(
|
|||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
select {
|
||||||
|
case inputCh <- msg:
|
||||||
|
default:
|
||||||
|
// Buffer full — drop frame to keep reader unblocked.
|
||||||
|
slog.Debug("pty input buffer full, dropping frame", "type", msg.Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
// Sender: dispatch RPCs from channel, coalescing consecutive input messages.
|
||||||
|
wg.Add(1)
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
for msg := range inputCh {
|
||||||
// Use a background context for unary RPCs so they complete
|
// Use a background context for unary RPCs so they complete
|
||||||
// even if the stream context is being cancelled.
|
// even if the stream context is being cancelled.
|
||||||
rpcCtx, rpcCancel := context.WithTimeout(context.Background(), 5*time.Second)
|
rpcCtx, rpcCancel := context.WithTimeout(context.Background(), 5*time.Second)
|
||||||
@ -339,6 +362,10 @@ func runPtyLoop(
|
|||||||
rpcCancel()
|
rpcCancel()
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Coalesce: drain any queued input messages into a single RPC.
|
||||||
|
data = coalescePtyInput(inputCh, data)
|
||||||
|
|
||||||
if _, err := agent.PtySendInput(rpcCtx, connect.NewRequest(&pb.PtySendInputRequest{
|
if _, err := agent.PtySendInput(rpcCtx, connect.NewRequest(&pb.PtySendInputRequest{
|
||||||
SandboxId: sandboxID,
|
SandboxId: sandboxID,
|
||||||
Tag: tag,
|
Tag: tag,
|
||||||
@ -394,6 +421,33 @@ func runPtyLoop(
|
|||||||
wg.Wait()
|
wg.Wait()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// coalescePtyInput drains any immediately-available "input" messages from the
|
||||||
|
// channel and appends their decoded data to buf, reducing RPC call volume
|
||||||
|
// during bursts of fast typing.
|
||||||
|
func coalescePtyInput(ch <-chan wsPtyIn, buf []byte) []byte {
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case msg, ok := <-ch:
|
||||||
|
if !ok {
|
||||||
|
return buf
|
||||||
|
}
|
||||||
|
if msg.Type != "input" {
|
||||||
|
// Non-input message — can't coalesce. Put-back isn't possible
|
||||||
|
// with channels, but resize/kill during a typing burst is rare
|
||||||
|
// enough that dropping one is acceptable.
|
||||||
|
return buf
|
||||||
|
}
|
||||||
|
data, err := base64.StdEncoding.DecodeString(msg.Data)
|
||||||
|
if err != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
buf = append(buf, data...)
|
||||||
|
default:
|
||||||
|
return buf
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// newPtyTag returns a PTY session tag: "pty-" + 8 random hex chars.
|
// newPtyTag returns a PTY session tag: "pty-" + 8 random hex chars.
|
||||||
func newPtyTag() string {
|
func newPtyTag() string {
|
||||||
return "pty-" + id.NewPtyTag()
|
return "pty-" + id.NewPtyTag()
|
||||||
|
|||||||
@ -3,8 +3,6 @@ package api
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"net/http"
|
|
||||||
"strings"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/gorilla/websocket"
|
"github.com/gorilla/websocket"
|
||||||
@ -14,11 +12,6 @@ import (
|
|||||||
"git.omukk.dev/wrenn/wrenn/pkg/id"
|
"git.omukk.dev/wrenn/wrenn/pkg/id"
|
||||||
)
|
)
|
||||||
|
|
||||||
// isWebSocketUpgrade returns true if the request is a WebSocket upgrade.
|
|
||||||
func isWebSocketUpgrade(r *http.Request) bool {
|
|
||||||
return strings.EqualFold(r.Header.Get("Upgrade"), "websocket")
|
|
||||||
}
|
|
||||||
|
|
||||||
// ctxKeyAdminWS is a context key for flagging admin WS routes.
|
// ctxKeyAdminWS is a context key for flagging admin WS routes.
|
||||||
type ctxKeyAdminWS struct{}
|
type ctxKeyAdminWS struct{}
|
||||||
|
|
||||||
|
|||||||
@ -15,7 +15,6 @@ func injectPlatformTeam() func(http.Handler) http.Handler {
|
|||||||
return func(next http.Handler) http.Handler {
|
return func(next http.Handler) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
if _, ok := auth.FromContext(r.Context()); !ok {
|
if _, ok := auth.FromContext(r.Context()); !ok {
|
||||||
// No auth context yet (WS upgrade); handler will inject platform team after WS auth.
|
|
||||||
next.ServeHTTP(w, r)
|
next.ServeHTTP(w, r)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -27,23 +26,24 @@ func injectPlatformTeam() func(http.Handler) http.Handler {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// markAdminWS flags the request context as an admin WebSocket route.
|
||||||
|
// Applied to admin WS endpoints that sit outside the requireJWT/requireAdmin
|
||||||
|
// middleware group. Handlers use isAdminWSRoute(ctx) to pick wsAuthenticateAdmin.
|
||||||
|
func markAdminWS(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
next.ServeHTTP(w, r.WithContext(setAdminWSFlag(r.Context())))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
// requireAdmin validates that the authenticated user is a platform admin.
|
// requireAdmin validates that the authenticated user is a platform admin.
|
||||||
// Must run after requireJWT (depends on AuthContext being present).
|
// Must run after requireJWT (depends on AuthContext being present).
|
||||||
// Re-validates against the DB — the JWT is_admin claim is for UI only;
|
// Re-validates against the DB — the JWT is_admin claim is for UI only;
|
||||||
// the DB is the source of truth for admin access.
|
// the DB is the source of truth for admin access.
|
||||||
// WebSocket upgrade requests without auth context are passed through —
|
|
||||||
// admin WS handlers verify admin status after upgrade via wsAuthenticateAdmin.
|
|
||||||
func requireAdmin(queries *db.Queries) func(http.Handler) http.Handler {
|
func requireAdmin(queries *db.Queries) func(http.Handler) http.Handler {
|
||||||
return func(next http.Handler) http.Handler {
|
return func(next http.Handler) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
ac, ok := auth.FromContext(r.Context())
|
ac, ok := auth.FromContext(r.Context())
|
||||||
if !ok {
|
if !ok {
|
||||||
if isWebSocketUpgrade(r) {
|
|
||||||
ctx := r.Context()
|
|
||||||
ctx = setAdminWSFlag(ctx)
|
|
||||||
next.ServeHTTP(w, r.WithContext(ctx))
|
|
||||||
return
|
|
||||||
}
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized", "authentication required")
|
writeError(w, http.StatusUnauthorized, "unauthorized", "authentication required")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|||||||
@ -85,15 +85,61 @@ func requireAPIKeyOrJWT(queries *db.Queries, jwtSecret []byte) func(http.Handler
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// WebSocket upgrade requests may not carry auth headers (browsers
|
|
||||||
// cannot set custom headers on WS connections). Pass through —
|
|
||||||
// the WS handler authenticates via the first message after upgrade.
|
|
||||||
if isWebSocketUpgrade(r) {
|
|
||||||
next.ServeHTTP(w, r)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized", "X-API-Key or Authorization: Bearer <token> required")
|
writeError(w, http.StatusUnauthorized, "unauthorized", "X-API-Key or Authorization: Bearer <token> required")
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// optionalAPIKeyOrJWT is like requireAPIKeyOrJWT but does not reject
|
||||||
|
// unauthenticated requests. It injects auth context when valid credentials
|
||||||
|
// are present (supporting SDK clients that set X-API-Key on WebSocket
|
||||||
|
// upgrades) and passes through otherwise so the handler can authenticate
|
||||||
|
// after the WebSocket upgrade via the first message.
|
||||||
|
func optionalAPIKeyOrJWT(queries *db.Queries, jwtSecret []byte) func(http.Handler) http.Handler {
|
||||||
|
return func(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
// Try API key.
|
||||||
|
if key := r.Header.Get("X-API-Key"); key != "" {
|
||||||
|
hash := auth.HashAPIKey(key)
|
||||||
|
row, err := queries.GetAPIKeyByHash(r.Context(), hash)
|
||||||
|
if err == nil {
|
||||||
|
if err := queries.UpdateAPIKeyLastUsed(r.Context(), row.ID); err != nil {
|
||||||
|
slog.Warn("failed to update api key last_used", "key_id", id.FormatAPIKeyID(row.ID), "error", err)
|
||||||
|
}
|
||||||
|
ctx := auth.WithAuthContext(r.Context(), auth.AuthContext{
|
||||||
|
TeamID: row.TeamID,
|
||||||
|
APIKeyID: row.ID,
|
||||||
|
APIKeyName: row.Name,
|
||||||
|
})
|
||||||
|
next.ServeHTTP(w, r.WithContext(ctx))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Try JWT bearer token.
|
||||||
|
if header := r.Header.Get("Authorization"); strings.HasPrefix(header, "Bearer ") {
|
||||||
|
tokenStr := strings.TrimPrefix(header, "Bearer ")
|
||||||
|
if claims, err := auth.VerifyJWT(jwtSecret, tokenStr); err == nil {
|
||||||
|
if teamID, err := id.ParseTeamID(claims.TeamID); err == nil {
|
||||||
|
if userID, err := id.ParseUserID(claims.Subject); err == nil {
|
||||||
|
if user, err := queries.GetUserByID(r.Context(), userID); err == nil && user.Status == "active" {
|
||||||
|
ctx := auth.WithAuthContext(r.Context(), auth.AuthContext{
|
||||||
|
TeamID: teamID,
|
||||||
|
UserID: userID,
|
||||||
|
Email: claims.Email,
|
||||||
|
Name: claims.Name,
|
||||||
|
Role: claims.Role,
|
||||||
|
})
|
||||||
|
next.ServeHTTP(w, r.WithContext(ctx))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// No valid credentials — pass through for handler to authenticate.
|
||||||
|
next.ServeHTTP(w, r)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|||||||
@ -22,13 +22,6 @@ func requireJWT(secret []byte, queries *db.Queries) func(http.Handler) http.Hand
|
|||||||
tokenStr = strings.TrimPrefix(header, "Bearer ")
|
tokenStr = strings.TrimPrefix(header, "Bearer ")
|
||||||
}
|
}
|
||||||
if tokenStr == "" {
|
if tokenStr == "" {
|
||||||
// WebSocket upgrade requests may not have an Authorization header
|
|
||||||
// (browsers cannot set custom headers on WS connections). Let them
|
|
||||||
// through — the handler authenticates via the first WS message.
|
|
||||||
if isWebSocketUpgrade(r) {
|
|
||||||
next.ServeHTTP(w, r)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
writeError(w, http.StatusUnauthorized, "unauthorized", "Authorization: Bearer <token> required")
|
writeError(w, http.StatusUnauthorized, "unauthorized", "Authorization: Bearer <token> required")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|||||||
@ -2,7 +2,7 @@ openapi: "3.1.0"
|
|||||||
info:
|
info:
|
||||||
title: Wrenn API
|
title: Wrenn API
|
||||||
description: MicroVM-based code execution platform API.
|
description: MicroVM-based code execution platform API.
|
||||||
version: "0.1.3"
|
version: "0.1.4"
|
||||||
|
|
||||||
servers:
|
servers:
|
||||||
- url: http://localhost:8080
|
- url: http://localhost:8080
|
||||||
|
|||||||
@ -161,20 +161,23 @@ func New(
|
|||||||
r.With(requireJWT(jwtSecret, queries)).Get("/v1/users/search", usersH.Search)
|
r.With(requireJWT(jwtSecret, queries)).Get("/v1/users/search", usersH.Search)
|
||||||
|
|
||||||
// Capsule lifecycle: accepts API key or JWT bearer token.
|
// Capsule lifecycle: accepts API key or JWT bearer token.
|
||||||
// WebSocket upgrade requests without auth headers are passed through by
|
|
||||||
// requireAPIKeyOrJWT — the WS handlers authenticate via first message.
|
|
||||||
r.Route("/v1/capsules", func(r chi.Router) {
|
r.Route("/v1/capsules", func(r chi.Router) {
|
||||||
|
// Auth-required routes.
|
||||||
|
r.Group(func(r chi.Router) {
|
||||||
r.Use(requireAPIKeyOrJWT(queries, jwtSecret))
|
r.Use(requireAPIKeyOrJWT(queries, jwtSecret))
|
||||||
r.Post("/", sandbox.Create)
|
r.Post("/", sandbox.Create)
|
||||||
r.Get("/", sandbox.List)
|
r.Get("/", sandbox.List)
|
||||||
r.Get("/stats", statsH.GetStats)
|
r.Get("/stats", statsH.GetStats)
|
||||||
r.Get("/usage", usageH.GetUsage)
|
r.Get("/usage", usageH.GetUsage)
|
||||||
|
})
|
||||||
|
|
||||||
r.Route("/{id}", func(r chi.Router) {
|
r.Route("/{id}", func(r chi.Router) {
|
||||||
|
// Auth-required non-WS routes.
|
||||||
|
r.Group(func(r chi.Router) {
|
||||||
|
r.Use(requireAPIKeyOrJWT(queries, jwtSecret))
|
||||||
r.Get("/", sandbox.Get)
|
r.Get("/", sandbox.Get)
|
||||||
r.Delete("/", sandbox.Destroy)
|
r.Delete("/", sandbox.Destroy)
|
||||||
r.Post("/exec", exec.Exec)
|
r.Post("/exec", exec.Exec)
|
||||||
r.Get("/exec/stream", execStream.ExecStream)
|
|
||||||
r.Post("/ping", sandbox.Ping)
|
r.Post("/ping", sandbox.Ping)
|
||||||
r.Post("/pause", sandbox.Pause)
|
r.Post("/pause", sandbox.Pause)
|
||||||
r.Post("/resume", sandbox.Resume)
|
r.Post("/resume", sandbox.Resume)
|
||||||
@ -186,12 +189,21 @@ func New(
|
|||||||
r.Post("/files/mkdir", fsH.MakeDir)
|
r.Post("/files/mkdir", fsH.MakeDir)
|
||||||
r.Post("/files/remove", fsH.Remove)
|
r.Post("/files/remove", fsH.Remove)
|
||||||
r.Get("/metrics", metricsH.GetMetrics)
|
r.Get("/metrics", metricsH.GetMetrics)
|
||||||
r.Get("/pty", ptyH.PtySession)
|
|
||||||
r.Get("/processes", processH.ListProcesses)
|
r.Get("/processes", processH.ListProcesses)
|
||||||
r.Delete("/processes/{selector}", processH.KillProcess)
|
r.Delete("/processes/{selector}", processH.KillProcess)
|
||||||
|
})
|
||||||
|
|
||||||
|
// WebSocket endpoints — handlers authenticate after upgrade.
|
||||||
|
// optionalAPIKeyOrJWT injects auth context from headers when
|
||||||
|
// present (SDK clients) but does not reject when absent (browsers).
|
||||||
|
r.Group(func(r chi.Router) {
|
||||||
|
r.Use(optionalAPIKeyOrJWT(queries, jwtSecret))
|
||||||
|
r.Get("/exec/stream", execStream.ExecStream)
|
||||||
|
r.Get("/pty", ptyH.PtySession)
|
||||||
r.Get("/processes/{selector}/stream", processH.ConnectProcess)
|
r.Get("/processes/{selector}/stream", processH.ConnectProcess)
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
})
|
||||||
|
|
||||||
// Snapshot / template management: accepts API key or JWT bearer token.
|
// Snapshot / template management: accepts API key or JWT bearer token.
|
||||||
r.Route("/v1/snapshots", func(r chi.Router) {
|
r.Route("/v1/snapshots", func(r chi.Router) {
|
||||||
@ -248,6 +260,8 @@ func New(
|
|||||||
|
|
||||||
// Platform admin routes — require JWT + DB-validated admin status.
|
// Platform admin routes — require JWT + DB-validated admin status.
|
||||||
r.Route("/v1/admin", func(r chi.Router) {
|
r.Route("/v1/admin", func(r chi.Router) {
|
||||||
|
// Auth-required admin routes (non-capsule + capsule list/create).
|
||||||
|
r.Group(func(r chi.Router) {
|
||||||
r.Use(requireJWT(jwtSecret, queries))
|
r.Use(requireJWT(jwtSecret, queries))
|
||||||
r.Use(requireAdmin(queries))
|
r.Use(requireAdmin(queries))
|
||||||
r.Get("/teams", teamH.AdminListTeams)
|
r.Get("/teams", teamH.AdminListTeams)
|
||||||
@ -264,25 +278,39 @@ func New(
|
|||||||
r.Post("/builds/{id}/cancel", buildH.Cancel)
|
r.Post("/builds/{id}/cancel", buildH.Cancel)
|
||||||
r.Post("/capsules", adminCapsules.Create)
|
r.Post("/capsules", adminCapsules.Create)
|
||||||
r.Get("/capsules", adminCapsules.List)
|
r.Get("/capsules", adminCapsules.List)
|
||||||
|
})
|
||||||
|
|
||||||
r.Route("/capsules/{id}", func(r chi.Router) {
|
r.Route("/capsules/{id}", func(r chi.Router) {
|
||||||
|
// Auth-required non-WS admin capsule routes.
|
||||||
|
r.Group(func(r chi.Router) {
|
||||||
|
r.Use(requireJWT(jwtSecret, queries))
|
||||||
|
r.Use(requireAdmin(queries))
|
||||||
r.Use(injectPlatformTeam())
|
r.Use(injectPlatformTeam())
|
||||||
r.Get("/", adminCapsules.Get)
|
r.Get("/", adminCapsules.Get)
|
||||||
r.Delete("/", adminCapsules.Destroy)
|
r.Delete("/", adminCapsules.Destroy)
|
||||||
r.Post("/snapshot", adminCapsules.Snapshot)
|
r.Post("/snapshot", adminCapsules.Snapshot)
|
||||||
r.Post("/exec", exec.Exec)
|
r.Post("/exec", exec.Exec)
|
||||||
r.Get("/exec/stream", execStream.ExecStream)
|
|
||||||
r.Post("/files/write", files.Upload)
|
r.Post("/files/write", files.Upload)
|
||||||
r.Post("/files/read", files.Download)
|
r.Post("/files/read", files.Download)
|
||||||
r.Post("/files/list", fsH.ListDir)
|
r.Post("/files/list", fsH.ListDir)
|
||||||
r.Post("/files/mkdir", fsH.MakeDir)
|
r.Post("/files/mkdir", fsH.MakeDir)
|
||||||
r.Post("/files/remove", fsH.Remove)
|
r.Post("/files/remove", fsH.Remove)
|
||||||
r.Get("/metrics", metricsH.GetMetrics)
|
r.Get("/metrics", metricsH.GetMetrics)
|
||||||
r.Get("/pty", ptyH.PtySession)
|
|
||||||
r.Get("/processes", processH.ListProcesses)
|
r.Get("/processes", processH.ListProcesses)
|
||||||
r.Delete("/processes/{selector}", processH.KillProcess)
|
r.Delete("/processes/{selector}", processH.KillProcess)
|
||||||
|
})
|
||||||
|
|
||||||
|
// Admin WebSocket endpoints — handlers authenticate after upgrade
|
||||||
|
// via wsAuthenticateAdmin. markAdminWS sets the context flag so
|
||||||
|
// handlers know to use admin auth instead of regular auth.
|
||||||
|
r.Group(func(r chi.Router) {
|
||||||
|
r.Use(markAdminWS)
|
||||||
|
r.Get("/exec/stream", execStream.ExecStream)
|
||||||
|
r.Get("/pty", ptyH.PtySession)
|
||||||
r.Get("/processes/{selector}/stream", processH.ConnectProcess)
|
r.Get("/processes/{selector}/stream", processH.ConnectProcess)
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
})
|
||||||
|
|
||||||
// Let extensions register their routes after all core routes.
|
// Let extensions register their routes after all core routes.
|
||||||
for _, ext := range extensions {
|
for _, ext := range extensions {
|
||||||
|
|||||||
@ -363,6 +363,11 @@ func (m *Manager) Pause(ctx context.Context, sandboxID string) error {
|
|||||||
return fmt.Errorf("sandbox %s is not running (status: %s)", sandboxID, sb.Status)
|
return fmt.Errorf("sandbox %s is not running (status: %s)", sandboxID, sb.Status)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Stop the metrics sampler goroutine before tearing down any resources
|
||||||
|
// it reads (dm device, Firecracker PID). Without this, the sampler
|
||||||
|
// leaks on every successful pause.
|
||||||
|
m.stopSampler(sb)
|
||||||
|
|
||||||
// Step 0: Drain in-flight proxy connections before freezing vCPUs.
|
// Step 0: Drain in-flight proxy connections before freezing vCPUs.
|
||||||
// This prevents Go runtime corruption inside the guest caused by stale
|
// This prevents Go runtime corruption inside the guest caused by stale
|
||||||
// TCP state from connections that were alive when the VM was snapshotted.
|
// TCP state from connections that were alive when the VM was snapshotted.
|
||||||
|
|||||||
Reference in New Issue
Block a user