Files
firecracker-orchestrator/orchestrator/serve.go
Honza Novak 82c11dd2f8 feat: add web terminal UI with WebSocket console and clone management API
Introduces a browser-based terminal interface backed by xterm.js, served
directly from the binary via an embedded HTML asset.

New HTTP server (`serve [addr]`, default :8080):
  GET  /              — xterm.js terminal UI; ?id=N selects a clone
  GET  /clones        — JSON list of running clone IDs
  POST /clones        — spawn a new clone; returns {"id": N}
  DELETE /clones/{id} — destroy a clone by ID
  GET  /ws/{id}       — WebSocket console for clone {id}
                        binary frames = raw PTY I/O
                        text frames   = JSON resize {"rows":N,"cols":M}

Supporting changes:
- orchestrator: add SpawnSingle() and KillClone(id) for per-clone lifecycle
  management from the HTTP layer
- console: add a resize sideband Unix socket (console-resize.sock) that
  accepts newline-delimited JSON {"rows","cols"} messages and applies them
  to the PTY master via pty.Setsize; the WebSocket handler writes to this
  socket on text frames so browser window resizes propagate into the VM
- deps: add gorilla/websocket v1.5.3

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-13 10:53:41 +00:00

219 lines
5.9 KiB
Go

package orchestrator
import (
"encoding/json"
"fmt"
_ "embed"
"net"
"net/http"
"os"
"path/filepath"
"strconv"
"strings"
"github.com/gorilla/websocket"
log "github.com/sirupsen/logrus"
)
//go:embed web/terminal.html
var terminalHTML []byte
var upgrader = websocket.Upgrader{
// Allow all origins for local/dev use. Add an origin check for production.
CheckOrigin: func(r *http.Request) bool { return true },
}
// Serve starts an HTTP server that exposes:
//
// GET / — terminal UI (xterm.js); ?id=N selects a clone
// GET /clones — JSON list of running clone IDs
// POST /clones — spawn a new clone; returns {"id": N}
// DELETE /clones/{id} — destroy clone {id}
// GET /ws/{id} — WebSocket console for clone {id}
//
// Binary WebSocket frames carry raw terminal bytes (stdin/stdout).
// Text WebSocket frames carry JSON resize commands: {"rows":N,"cols":M}.
func Serve(orch *Orchestrator, addr string) error {
mux := http.NewServeMux()
mux.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
if r.URL.Path != "/" {
http.NotFound(w, r)
return
}
w.Header().Set("Content-Type", "text/html; charset=utf-8")
w.Write(terminalHTML) //nolint:errcheck
})
// /clones — list (GET) or spawn (POST)
mux.HandleFunc("/clones", func(w http.ResponseWriter, r *http.Request) {
switch r.Method {
case http.MethodGet, "":
ids := runningCloneIDs(orch.cfg)
w.Header().Set("Content-Type", "application/json")
json.NewEncoder(w).Encode(ids) //nolint:errcheck
case http.MethodPost:
id, err := orch.SpawnSingle()
if err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusCreated)
json.NewEncoder(w).Encode(map[string]int{"id": id}) //nolint:errcheck
default:
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
}
})
// /clones/{id} — destroy (DELETE)
mux.HandleFunc("/clones/", func(w http.ResponseWriter, r *http.Request) {
idStr := strings.TrimPrefix(r.URL.Path, "/clones/")
if idStr == "" {
// redirect bare /clones/ to /clones
http.Redirect(w, r, "/clones", http.StatusMovedPermanently)
return
}
if r.Method != http.MethodDelete {
http.Error(w, "method not allowed", http.StatusMethodNotAllowed)
return
}
id, err := strconv.Atoi(idStr)
if err != nil {
http.Error(w, "invalid clone id", http.StatusBadRequest)
return
}
if err := orch.KillClone(id); err != nil {
http.Error(w, err.Error(), http.StatusInternalServerError)
return
}
w.WriteHeader(http.StatusNoContent)
})
mux.HandleFunc("/ws/", func(w http.ResponseWriter, r *http.Request) {
idStr := strings.TrimPrefix(r.URL.Path, "/ws/")
id, err := strconv.Atoi(idStr)
if err != nil {
http.Error(w, "invalid clone id", http.StatusBadRequest)
return
}
handleConsoleWS(orch.cfg, id, w, r)
})
log.Infof("terminal UI: http://%s", addr)
return http.ListenAndServe(addr, mux)
}
// handleConsoleWS upgrades the request to a WebSocket and bridges it to the
// clone's console.sock (I/O) and console-resize.sock (terminal resize).
func handleConsoleWS(cfg Config, id int, w http.ResponseWriter, r *http.Request) {
cloneDir := filepath.Join(cfg.BaseDir, "clones", strconv.Itoa(id))
consoleSock := filepath.Join(cloneDir, "console.sock")
resizeSock := filepath.Join(cloneDir, "console-resize.sock")
if _, err := os.Stat(consoleSock); err != nil {
http.Error(w, fmt.Sprintf("clone %d is not running", id), http.StatusNotFound)
return
}
ws, err := upgrader.Upgrade(w, r, nil)
if err != nil {
return
}
defer ws.Close()
consoleConn, err := net.Dial("unix", consoleSock)
if err != nil {
writeWSError(ws, fmt.Sprintf("console unavailable: %v", err))
return
}
defer consoleConn.Close()
resizeConn, err := net.Dial("unix", resizeSock)
if err != nil {
log.Warnf("clone %d: could not connect to resize socket, resize disabled: %v", id, err)
resizeConn = nil
}
if resizeConn != nil {
defer resizeConn.Close()
}
log.Infof("ws: clone %d: client connected from %s", id, r.RemoteAddr)
bridgeWS(ws, consoleConn, resizeConn)
log.Infof("ws: clone %d: client disconnected", id)
}
// bridgeWS proxies between a WebSocket connection and a console Unix socket.
//
// - Binary WS frames → consoleConn (terminal input)
// - Text WS frames → resizeConn as a JSON line (resize command)
// - consoleConn reads → binary WS frames (terminal output)
func bridgeWS(ws *websocket.Conn, consoleConn net.Conn, resizeConn net.Conn) {
// console → WebSocket
sockDone := make(chan struct{})
go func() {
defer close(sockDone)
buf := make([]byte, 4096)
for {
n, err := consoleConn.Read(buf)
if n > 0 {
if werr := ws.WriteMessage(websocket.BinaryMessage, buf[:n]); werr != nil {
return
}
}
if err != nil {
return
}
}
}()
// WebSocket → console / resize
for {
msgType, data, err := ws.ReadMessage()
if err != nil {
break
}
switch msgType {
case websocket.BinaryMessage:
consoleConn.Write(data) //nolint:errcheck
case websocket.TextMessage:
if resizeConn != nil {
// Append newline so the scanner in handleResize sees a complete line.
resizeConn.Write(append(data, '\n')) //nolint:errcheck
}
}
}
consoleConn.Close()
<-sockDone
}
// runningCloneIDs returns clone IDs that have a live console socket.
func runningCloneIDs(cfg Config) []int {
clonesDir := filepath.Join(cfg.BaseDir, "clones")
entries, err := os.ReadDir(clonesDir)
if err != nil {
return nil
}
var ids []int
for _, e := range entries {
if !e.IsDir() {
continue
}
id, err := strconv.Atoi(e.Name())
if err != nil {
continue
}
sock := filepath.Join(clonesDir, e.Name(), "console.sock")
if _, err := os.Stat(sock); err == nil {
ids = append(ids, id)
}
}
return ids
}
func writeWSError(ws *websocket.Conn, msg string) {
ws.WriteMessage(websocket.TextMessage, //nolint:errcheck
[]byte("\r\n\x1b[31m["+msg+"]\x1b[0m\r\n"))
}