From 643bc47773f8c27618615095a4b195101fb689a6 Mon Sep 17 00:00:00 2001 From: Rohit Ghumare Date: Thu, 7 May 2026 11:31:50 +0100 Subject: [PATCH 1/7] feat(sandbox-morph): scaffold Morph Cloud sandbox provider worker MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Mirrors the sandbox::e2b::* ABI under sandbox::morph::*, plus registers sandbox::morph::branch — the Infinibranch primitive that returns N sibling sandbox_ids from a running parent, preserving live process state. Capabilities advertised: branch, snapshot, expose_port. fs::read/write deferred for v0 (Morph FS ops are SSH-shaped; revisit when the family agrees on a channel-vs-SSH bridge). Auth header: Authorization: Bearer MORPH_API_KEY. Default base URL: https://cloud.morph.so/api. Tests pass; clippy clean; fmt clean. HTTP bodies stubbed pending verified pass against Morph REST. A latency benchmark (target <300ms p99 for branch) lands in a follow-up commit before the wedge feature is declared stable. --- sandbox-morph/Cargo.lock | 2779 ++++++++++++++++++++++++++++ sandbox-morph/Cargo.toml | 52 + sandbox-morph/README.md | 53 + sandbox-morph/iii.worker.yaml | 13 + sandbox-morph/src/client.rs | 136 ++ sandbox-morph/src/config.rs | 60 + sandbox-morph/src/handler.rs | 190 ++ sandbox-morph/src/lib.rs | 93 + sandbox-morph/src/main.rs | 120 ++ sandbox-morph/tests/integration.rs | 82 + 10 files changed, 3578 insertions(+) create mode 100644 sandbox-morph/Cargo.lock create mode 100644 sandbox-morph/Cargo.toml create mode 100644 sandbox-morph/README.md create mode 100644 sandbox-morph/iii.worker.yaml create mode 100644 sandbox-morph/src/client.rs create mode 100644 sandbox-morph/src/config.rs create mode 100644 sandbox-morph/src/handler.rs create mode 100644 sandbox-morph/src/lib.rs create mode 100644 sandbox-morph/src/main.rs create mode 100644 sandbox-morph/tests/integration.rs diff --git a/sandbox-morph/Cargo.lock b/sandbox-morph/Cargo.lock new file mode 100644 index 00000000..e1314b2f --- /dev/null +++ b/sandbox-morph/Cargo.lock @@ -0,0 +1,2779 @@ +# This file is automatically @generated by Cargo. +# It is not intended for manual editing. +version = 4 + +[[package]] +name = "aho-corasick" +version = "1.1.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ddd31a130427c27518df266943a5308ed92d4b226cc639f5a8f1002816174301" +dependencies = [ + "memchr", +] + +[[package]] +name = "anstream" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "824a212faf96e9acacdbd09febd34438f8f711fb84e09a8916013cd7815ca28d" +dependencies = [ + "anstyle", + "anstyle-parse", + "anstyle-query", + "anstyle-wincon", + "colorchoice", + "is_terminal_polyfill", + "utf8parse", +] + +[[package]] +name = "anstyle" +version = "1.0.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "940b3a0ca603d1eade50a4846a2afffd5ef57a9feac2c0e2ec2e14f9ead76000" + +[[package]] +name = "anstyle-parse" +version = "1.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "52ce7f38b242319f7cabaa6813055467063ecdc9d355bbb4ce0c68908cd8130e" +dependencies = [ + "utf8parse", +] + +[[package]] +name = "anstyle-query" +version = "1.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "40c48f72fd53cd289104fc64099abca73db4166ad86ea0b4341abe65af83dadc" +dependencies = [ + "windows-sys 0.61.2", +] + +[[package]] +name = "anstyle-wincon" +version = "3.0.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "291e6a250ff86cd4a820112fb8898808a366d8f9f58ce16d1f538353ad55747d" +dependencies = [ + "anstyle", + "once_cell_polyfill", + "windows-sys 0.61.2", +] + +[[package]] +name = "anyhow" +version = "1.0.102" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7f202df86484c868dbad7eaa557ef785d5c66295e41b460ef922eca0723b842c" + +[[package]] +name = "assert-json-diff" +version = "2.0.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "47e4f2b81832e72834d7518d8487a0396a28cc408186a2e8854c0f98011faf12" +dependencies = [ + "serde", + "serde_json", +] + +[[package]] +name = "async-trait" +version = "0.1.89" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9035ad2d096bed7955a320ee7e2230574d28fd3c3a0f186cbea1ff3c7eed5dbb" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "atomic-waker" +version = "1.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1505bd5d3d116872e7271a6d4e16d81d0c8570876c8de68093a09ac269d8aac0" + +[[package]] +name = "autocfg" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c08606f8c3cbf4ce6ec8e28fb0014a2c086708fe954eaa885384a6165172e7e8" + +[[package]] +name = "base64" +version = "0.22.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "72b3254f16251a8381aa12e40e3c4d2f0199f8c6508fbecb9d91f575e0fbb8c6" + +[[package]] +name = "bitflags" +version = "2.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c4512299f36f043ab09a583e57bceb5a5aab7a73db1805848e8fef3c9e8c78b3" + +[[package]] +name = "block-buffer" +version = "0.10.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3078c7629b62d3f0439517fa394996acacc5cbc91c5a20d8c658e77abd503a71" +dependencies = [ + "generic-array", +] + +[[package]] +name = "bumpalo" +version = "3.20.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5d20789868f4b01b2f2caec9f5c4e0213b41e3e5702a50157d699ae31ced2fcb" + +[[package]] +name = "bytes" +version = "1.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1e748733b7cbc798e1434b6ac524f0c1ff2ab456fe201501e6497c8417a4fc33" + +[[package]] +name = "cc" +version = "1.2.61" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d16d90359e986641506914ba71350897565610e87ce0ad9e6f28569db3dd5c6d" +dependencies = [ + "find-msvc-tools", + "shlex", +] + +[[package]] +name = "cfg-if" +version = "1.0.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9330f8b2ff13f34540b44e946ef35111825727b38d33286ef986142615121801" + +[[package]] +name = "cfg_aliases" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "613afe47fcd5fac7ccf1db93babcb082c5994d996f20b8b159f2ad1658eb5724" + +[[package]] +name = "clap" +version = "4.6.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1ddb117e43bbf7dacf0a4190fef4d345b9bad68dfc649cb349e7d17d28428e51" +dependencies = [ + "clap_builder", + "clap_derive", +] + +[[package]] +name = "clap_builder" +version = "4.6.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "714a53001bf66416adb0e2ef5ac857140e7dc3a0c48fb28b2f10762fc4b5069f" +dependencies = [ + "anstream", + "anstyle", + "clap_lex", + "strsim", +] + +[[package]] +name = "clap_derive" +version = "4.6.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f2ce8604710f6733aa641a2b3731eaa1e8b3d9973d5e3565da11800813f997a9" +dependencies = [ + "heck", + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "clap_lex" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c8d4a3bb8b1e0c1050499d1815f5ab16d04f0959b233085fb31653fbfc9d98f9" + +[[package]] +name = "colorchoice" +version = "1.0.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1d07550c9036bf2ae0c684c4297d503f838287c83c53686d05370d0e139ae570" + +[[package]] +name = "const-hex" +version = "1.19.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "20d9a563d167a9cce0f94153382b33cb6eded6dfabff03c69ad65a28ea1514e0" +dependencies = [ + "cfg-if", + "cpufeatures", + "proptest", + "serde_core", +] + +[[package]] +name = "core-foundation" +version = "0.10.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b2a6cd9ae233e7f62ba4e9353e81a88df7fc8a5987b8d445b4d90c879bd156f6" +dependencies = [ + "core-foundation-sys", + "libc", +] + +[[package]] +name = "core-foundation-sys" +version = "0.8.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "773648b94d0e5d620f64f280777445740e61fe701025087ec8b57f45c791888b" + +[[package]] +name = "cpufeatures" +version = "0.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "59ed5838eebb26a2bb2e58f6d5b5316989ae9d08bab10e0e6d103e656d1b0280" +dependencies = [ + "libc", +] + +[[package]] +name = "crypto-common" +version = "0.1.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "78c8292055d1c1df0cce5d180393dc8cce0abec0a7102adb6c7b1eef6016d60a" +dependencies = [ + "generic-array", + "typenum", +] + +[[package]] +name = "data-encoding" +version = "2.11.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a4ae5f15dda3c708c0ade84bfee31ccab44a3da4f88015ed22f63732abe300c8" + +[[package]] +name = "deadpool" +version = "0.12.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0be2b1d1d6ec8d846f05e137292d0b89133caf95ef33695424c09568bdd39b1b" +dependencies = [ + "deadpool-runtime", + "lazy_static", + "num_cpus", + "tokio", +] + +[[package]] +name = "deadpool-runtime" +version = "0.1.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "092966b41edc516079bdf31ec78a2e0588d1d0c08f78b91d8307215928642b2b" + +[[package]] +name = "digest" +version = "0.10.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ed9a281f7bc9b7576e61468ba615a66a5c8cfdff42420a70aa82701a3b1e292" +dependencies = [ + "block-buffer", + "crypto-common", +] + +[[package]] +name = "displaydoc" +version = "0.2.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "97369cbbc041bc366949bc74d34658d6cda5621039731c6310521892a3a20ae0" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "dyn-clone" +version = "1.0.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d0881ea181b1df73ff77ffaaf9c7544ecc11e82fba9b5f27b262a3c73a332555" + +[[package]] +name = "either" +version = "1.15.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "48c757948c5ede0e46177b7add2e67155f70e33c07fea8284df6576da70b3719" + +[[package]] +name = "equivalent" +version = "1.0.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "877a4ace8713b0bcf2a4e7eec82529c029f1d0619886d18145fea96c3ffe5c0f" + +[[package]] +name = "errno" +version = "0.3.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "39cab71617ae0d63f51a36d69f866391735b51691dbda63cf6f96d042b63efeb" +dependencies = [ + "libc", + "windows-sys 0.61.2", +] + +[[package]] +name = "find-msvc-tools" +version = "0.1.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5baebc0774151f905a1a2cc41989300b1e6fbb29aff0ceffa1064fdd3088d582" + +[[package]] +name = "fnv" +version = "1.0.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1" + +[[package]] +name = "foldhash" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d9c4f5dac5e15c24eb999c26181a6ca40b39fe946cbe4c263c7209467bc83af2" + +[[package]] +name = "form_urlencoded" +version = "1.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cb4cb245038516f5f85277875cdaa4f7d2c9a0fa0468de06ed190163b1581fcf" +dependencies = [ + "percent-encoding", +] + +[[package]] +name = "futures" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8b147ee9d1f6d097cef9ce628cd2ee62288d963e16fb287bd9286455b241382d" +dependencies = [ + "futures-channel", + "futures-core", + "futures-executor", + "futures-io", + "futures-sink", + "futures-task", + "futures-util", +] + +[[package]] +name = "futures-channel" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "07bbe89c50d7a535e539b8c17bc0b49bdb77747034daa8087407d655f3f7cc1d" +dependencies = [ + "futures-core", + "futures-sink", +] + +[[package]] +name = "futures-core" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7e3450815272ef58cec6d564423f6e755e25379b217b0bc688e295ba24df6b1d" + +[[package]] +name = "futures-executor" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "baf29c38818342a3b26b5b923639e7b1f4a61fc5e76102d4b1981c6dc7a7579d" +dependencies = [ + "futures-core", + "futures-task", + "futures-util", +] + +[[package]] +name = "futures-io" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cecba35d7ad927e23624b22ad55235f2239cfa44fd10428eecbeba6d6a717718" + +[[package]] +name = "futures-macro" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e835b70203e41293343137df5c0664546da5745f82ec9b84d40be8336958447b" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "futures-sink" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c39754e157331b013978ec91992bde1ac089843443c49cbc7f46150b0fad0893" + +[[package]] +name = "futures-task" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "037711b3d59c33004d3856fbdc83b99d4ff37a24768fa1be9ce3538a1cde4393" + +[[package]] +name = "futures-util" +version = "0.3.32" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "389ca41296e6190b48053de0321d02a77f32f8a5d2461dd38762c0593805c6d6" +dependencies = [ + "futures-channel", + "futures-core", + "futures-io", + "futures-macro", + "futures-sink", + "futures-task", + "memchr", + "pin-project-lite", + "slab", +] + +[[package]] +name = "generic-array" +version = "0.14.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "85649ca51fd72272d7821adaf274ad91c288277713d9c18820d8499a7ff69e9a" +dependencies = [ + "typenum", + "version_check", +] + +[[package]] +name = "getrandom" +version = "0.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ff2abc00be7fca6ebc474524697ae276ad847ad0a6b3faa4bcb027e9a4614ad0" +dependencies = [ + "cfg-if", + "js-sys", + "libc", + "wasi", + "wasm-bindgen", +] + +[[package]] +name = "getrandom" +version = "0.3.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "899def5c37c4fd7b2664648c28120ecec138e4d395b459e5ca34f9cce2dd77fd" +dependencies = [ + "cfg-if", + "js-sys", + "libc", + "r-efi 5.3.0", + "wasip2", + "wasm-bindgen", +] + +[[package]] +name = "getrandom" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0de51e6874e94e7bf76d726fc5d13ba782deca734ff60d5bb2fb2607c7406555" +dependencies = [ + "cfg-if", + "libc", + "r-efi 6.0.0", + "wasip2", + "wasip3", +] + +[[package]] +name = "h2" +version = "0.4.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "171fefbc92fe4a4de27e0698d6a5b392d6a0e333506bc49133760b3bcf948733" +dependencies = [ + "atomic-waker", + "bytes", + "fnv", + "futures-core", + "futures-sink", + "http", + "indexmap", + "slab", + "tokio", + "tokio-util", + "tracing", +] + +[[package]] +name = "hashbrown" +version = "0.15.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9229cfe53dfd69f0609a49f65461bd93001ea1ef889cd5529dd176593f5338a1" +dependencies = [ + "foldhash", +] + +[[package]] +name = "hashbrown" +version = "0.17.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4f467dd6dccf739c208452f8014c75c18bb8301b050ad1cfb27153803edb0f51" + +[[package]] +name = "heck" +version = "0.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2304e00983f87ffb38b55b444b5e3b60a884b5d30c0fca7d82fe33449bbe55ea" + +[[package]] +name = "hermit-abi" +version = "0.5.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fc0fef456e4baa96da950455cd02c081ca953b141298e41db3fc7e36b1da849c" + +[[package]] +name = "hostname" +version = "0.4.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "617aaa3557aef3810a6369d0a99fac8a080891b68bd9f9812a1eeda0c0730cbd" +dependencies = [ + "cfg-if", + "libc", + "windows-link", +] + +[[package]] +name = "http" +version = "1.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e3ba2a386d7f85a81f119ad7498ebe444d2e22c2af0b86b069416ace48b3311a" +dependencies = [ + "bytes", + "itoa", +] + +[[package]] +name = "http-body" +version = "1.0.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1efedce1fb8e6913f23e0c92de8e62cd5b772a67e7b3946df930a62566c93184" +dependencies = [ + "bytes", + "http", +] + +[[package]] +name = "http-body-util" +version = "0.1.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b021d93e26becf5dc7e1b75b1bed1fd93124b374ceb73f43d4d4eafec896a64a" +dependencies = [ + "bytes", + "futures-core", + "http", + "http-body", + "pin-project-lite", +] + +[[package]] +name = "httparse" +version = "1.10.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6dbf3de79e51f3d586ab4cb9d5c3e2c14aa28ed23d180cf89b4df0454a69cc87" + +[[package]] +name = "httpdate" +version = "1.0.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "df3b46402a9d5adb4c86a0cf463f42e19994e3ee891101b1841f30a545cb49a9" + +[[package]] +name = "hyper" +version = "1.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6299f016b246a94207e63da54dbe807655bf9e00044f73ded42c3ac5305fbcca" +dependencies = [ + "atomic-waker", + "bytes", + "futures-channel", + "futures-core", + "h2", + "http", + "http-body", + "httparse", + "httpdate", + "itoa", + "pin-project-lite", + "smallvec", + "tokio", + "want", +] + +[[package]] +name = "hyper-rustls" +version = "0.27.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "33ca68d021ef39cf6463ab54c1d0f5daf03377b70561305bb89a8f83aab66e0f" +dependencies = [ + "http", + "hyper", + "hyper-util", + "rustls", + "tokio", + "tokio-rustls", + "tower-service", + "webpki-roots", +] + +[[package]] +name = "hyper-timeout" +version = "0.5.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2b90d566bffbce6a75bd8b09a05aa8c2cb1fabb6cb348f8840c9e4c90a0d83b0" +dependencies = [ + "hyper", + "hyper-util", + "pin-project-lite", + "tokio", + "tower-service", +] + +[[package]] +name = "hyper-util" +version = "0.1.20" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "96547c2556ec9d12fb1578c4eaf448b04993e7fb79cbaad930a656880a6bdfa0" +dependencies = [ + "base64", + "bytes", + "futures-channel", + "futures-util", + "http", + "http-body", + "hyper", + "ipnet", + "libc", + "percent-encoding", + "pin-project-lite", + "socket2", + "tokio", + "tower-service", + "tracing", +] + +[[package]] +name = "icu_collections" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2984d1cd16c883d7935b9e07e44071dca8d917fd52ecc02c04d5fa0b5a3f191c" +dependencies = [ + "displaydoc", + "potential_utf", + "utf8_iter", + "yoke", + "zerofrom", + "zerovec", +] + +[[package]] +name = "icu_locale_core" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "92219b62b3e2b4d88ac5119f8904c10f8f61bf7e95b640d25ba3075e6cac2c29" +dependencies = [ + "displaydoc", + "litemap", + "tinystr", + "writeable", + "zerovec", +] + +[[package]] +name = "icu_normalizer" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c56e5ee99d6e3d33bd91c5d85458b6005a22140021cc324cea84dd0e72cff3b4" +dependencies = [ + "icu_collections", + "icu_normalizer_data", + "icu_properties", + "icu_provider", + "smallvec", + "zerovec", +] + +[[package]] +name = "icu_normalizer_data" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "da3be0ae77ea334f4da67c12f149704f19f81d1adf7c51cf482943e84a2bad38" + +[[package]] +name = "icu_properties" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bee3b67d0ea5c2cca5003417989af8996f8604e34fb9ddf96208a033901e70de" +dependencies = [ + "icu_collections", + "icu_locale_core", + "icu_properties_data", + "icu_provider", + "zerotrie", + "zerovec", +] + +[[package]] +name = "icu_properties_data" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e2bbb201e0c04f7b4b3e14382af113e17ba4f63e2c9d2ee626b720cbce54a14" + +[[package]] +name = "icu_provider" +version = "2.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "139c4cf31c8b5f33d7e199446eff9c1e02decfc2f0eec2c8d71f65befa45b421" +dependencies = [ + "displaydoc", + "icu_locale_core", + "writeable", + "yoke", + "zerofrom", + "zerotrie", + "zerovec", +] + +[[package]] +name = "id-arena" +version = "2.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3d3067d79b975e8844ca9eb072e16b31c3c1c36928edf9c6789548c524d0d954" + +[[package]] +name = "idna" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3b0875f23caa03898994f6ddc501886a45c7d3d62d04d2d90788d47be1b1e4de" +dependencies = [ + "idna_adapter", + "smallvec", + "utf8_iter", +] + +[[package]] +name = "idna_adapter" +version = "1.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cb68373c0d6620ef8105e855e7745e18b0d00d3bdb07fb532e434244cdb9a714" +dependencies = [ + "icu_normalizer", + "icu_properties", +] + +[[package]] +name = "iii-sandbox-morph" +version = "0.1.0" +dependencies = [ + "anyhow", + "async-trait", + "base64", + "clap", + "iii-sdk", + "reqwest", + "serde", + "serde_json", + "serde_yaml", + "thiserror 1.0.69", + "tokio", + "tracing", + "tracing-subscriber", + "wiremock", +] + +[[package]] +name = "iii-sdk" +version = "0.11.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f0226f7ce0d9071f9cb75ea7b7ac1241b15282915ccd41d9bbd2ee0db94f90c6" +dependencies = [ + "async-trait", + "futures-util", + "hostname", + "opentelemetry", + "opentelemetry-http", + "opentelemetry-proto", + "opentelemetry_sdk", + "prost", + "reqwest", + "schemars", + "serde", + "serde_json", + "sysinfo", + "thiserror 2.0.18", + "tokio", + "tokio-tungstenite", + "tracing", + "uuid", +] + +[[package]] +name = "indexmap" +version = "2.14.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d466e9454f08e4a911e14806c24e16fba1b4c121d1ea474396f396069cf949d9" +dependencies = [ + "equivalent", + "hashbrown 0.17.0", + "serde", + "serde_core", +] + +[[package]] +name = "ipnet" +version = "2.12.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d98f6fed1fde3f8c21bc40a1abb88dd75e67924f9cffc3ef95607bad8017f8e2" + +[[package]] +name = "is_terminal_polyfill" +version = "1.70.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a6cb138bb79a146c1bd460005623e142ef0181e3d0219cb493e02f7d08a35695" + +[[package]] +name = "itertools" +version = "0.14.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2b192c782037fadd9cfa75548310488aabdbf3d2da73885b31bd0abd03351285" +dependencies = [ + "either", +] + +[[package]] +name = "itoa" +version = "1.0.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8f42a60cbdf9a97f5d2305f08a87dc4e09308d1276d28c869c684d7777685682" + +[[package]] +name = "js-sys" +version = "0.3.98" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "67df7112613f8bfd9150013a0314e196f4800d3201ae742489d999db2f979f08" +dependencies = [ + "cfg-if", + "futures-util", + "once_cell", + "wasm-bindgen", +] + +[[package]] +name = "lazy_static" +version = "1.5.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bbd2bcb4c963f2ddae06a2efc7e9f3591312473c50c6685e1f298068316e66fe" + +[[package]] +name = "leb128fmt" +version = "0.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "09edd9e8b54e49e587e4f6295a7d29c3ea94d469cb40ab8ca70b288248a81db2" + +[[package]] +name = "libc" +version = "0.2.186" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "68ab91017fe16c622486840e4c83c9a37afeff978bd239b5293d61ece587de66" + +[[package]] +name = "litemap" +version = "0.8.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "92daf443525c4cce67b150400bc2316076100ce0b3686209eb8cf3c31612e6f0" + +[[package]] +name = "log" +version = "0.4.29" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5e5032e24019045c762d3c0f28f5b6b8bbf38563a65908389bf7978758920897" + +[[package]] +name = "lru-slab" +version = "0.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "112b39cec0b298b6c1999fee3e31427f74f676e4cb9879ed1a121b43661a4154" + +[[package]] +name = "matchers" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d1525a2a28c7f4fa0fc98bb91ae755d1e2d1505079e05539e35bc876b5d65ae9" +dependencies = [ + "regex-automata", +] + +[[package]] +name = "memchr" +version = "2.8.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f8ca58f447f06ed17d5fc4043ce1b10dd205e060fb3ce5b979b8ed8e59ff3f79" + +[[package]] +name = "mio" +version = "1.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "50b7e5b27aa02a74bac8c3f23f448f8d87ff11f92d3aac1a6ed369ee08cc56c1" +dependencies = [ + "libc", + "wasi", + "windows-sys 0.61.2", +] + +[[package]] +name = "ntapi" +version = "0.4.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c3b335231dfd352ffb0f8017f3b6027a4917f7df785ea2143d8af2adc66980ae" +dependencies = [ + "winapi", +] + +[[package]] +name = "nu-ansi-term" +version = "0.50.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7957b9740744892f114936ab4a57b3f487491bbeafaf8083688b16841a4240e5" +dependencies = [ + "windows-sys 0.61.2", +] + +[[package]] +name = "num-traits" +version = "0.2.19" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "071dfc062690e90b734c0b2273ce72ad0ffa95f0c74596bc250dcfd960262841" +dependencies = [ + "autocfg", +] + +[[package]] +name = "num_cpus" +version = "1.17.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "91df4bbde75afed763b708b7eee1e8e7651e02d97f6d5dd763e89367e957b23b" +dependencies = [ + "hermit-abi", + "libc", +] + +[[package]] +name = "objc2-core-foundation" +version = "0.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "2a180dd8642fa45cdb7dd721cd4c11b1cadd4929ce112ebd8b9f5803cc79d536" +dependencies = [ + "bitflags", +] + +[[package]] +name = "objc2-io-kit" +version = "0.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "33fafba39597d6dc1fb709123dfa8289d39406734be322956a69f0931c73bb15" +dependencies = [ + "libc", + "objc2-core-foundation", +] + +[[package]] +name = "once_cell" +version = "1.21.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9f7c3e4beb33f85d45ae3e3a1792185706c8e16d043238c593331cc7cd313b50" + +[[package]] +name = "once_cell_polyfill" +version = "1.70.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "384b8ab6d37215f3c5301a95a4accb5d64aa607f1fcb26a11b5303878451b4fe" + +[[package]] +name = "openssl-probe" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7c87def4c32ab89d880effc9e097653c8da5d6ef28e6b539d313baaacfbafcbe" + +[[package]] +name = "opentelemetry" +version = "0.31.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b84bcd6ae87133e903af7ef497404dda70c60d0ea14895fc8a5e6722754fc2a0" +dependencies = [ + "futures-core", + "futures-sink", + "js-sys", + "pin-project-lite", + "thiserror 2.0.18", + "tracing", +] + +[[package]] +name = "opentelemetry-http" +version = "0.31.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d7a6d09a73194e6b66df7c8f1b680f156d916a1a942abf2de06823dd02b7855d" +dependencies = [ + "async-trait", + "bytes", + "http", + "opentelemetry", + "reqwest", +] + +[[package]] +name = "opentelemetry-proto" +version = "0.31.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a7175df06de5eaee9909d4805a3d07e28bb752c34cab57fa9cff549da596b30f" +dependencies = [ + "base64", + "const-hex", + "opentelemetry", + "opentelemetry_sdk", + "prost", + "serde", + "serde_json", + "tonic", + "tonic-prost", +] + +[[package]] +name = "opentelemetry_sdk" +version = "0.31.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e14ae4f5991976fd48df6d843de219ca6d31b01daaab2dad5af2badeded372bd" +dependencies = [ + "futures-channel", + "futures-executor", + "futures-util", + "opentelemetry", + "percent-encoding", + "rand", + "thiserror 2.0.18", + "tokio", + "tokio-stream", +] + +[[package]] +name = "percent-encoding" +version = "2.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9b4f627cb1b25917193a259e49bdad08f671f8d9708acfd5fe0a8c1455d87220" + +[[package]] +name = "pin-project" +version = "1.1.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cbf0d9e68100b3a7989b4901972f265cd542e560a3a8a724e1e20322f4d06ce9" +dependencies = [ + "pin-project-internal", +] + +[[package]] +name = "pin-project-internal" +version = "1.1.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a990e22f43e84855daf260dded30524ef4a9021cc7541c26540500a50b624389" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "pin-project-lite" +version = "0.2.17" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a89322df9ebe1c1578d689c92318e070967d1042b512afbe49518723f4e6d5cd" + +[[package]] +name = "potential_utf" +version = "0.1.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0103b1cef7ec0cf76490e969665504990193874ea05c85ff9bab8b911d0a0564" +dependencies = [ + "zerovec", +] + +[[package]] +name = "ppv-lite86" +version = "0.2.21" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "85eae3c4ed2f50dcfe72643da4befc30deadb458a9b590d720cde2f2b1e97da9" +dependencies = [ + "zerocopy", +] + +[[package]] +name = "prettyplease" +version = "0.2.37" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "479ca8adacdd7ce8f1fb39ce9ecccbfe93a3f1344b3d0d97f20bc0196208f62b" +dependencies = [ + "proc-macro2", + "syn", +] + +[[package]] +name = "proc-macro2" +version = "1.0.106" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8fd00f0bb2e90d81d1044c2b32617f68fcb9fa3bb7640c23e9c748e53fb30934" +dependencies = [ + "unicode-ident", +] + +[[package]] +name = "proptest" +version = "1.11.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4b45fcc2344c680f5025fe57779faef368840d0bd1f42f216291f0dc4ace4744" +dependencies = [ + "bitflags", + "num-traits", + "rand", + "rand_chacha", + "rand_xorshift", + "regex-syntax", + "unarray", +] + +[[package]] +name = "prost" +version = "0.14.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d2ea70524a2f82d518bce41317d0fae74151505651af45faf1ffbd6fd33f0568" +dependencies = [ + "bytes", + "prost-derive", +] + +[[package]] +name = "prost-derive" +version = "0.14.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "27c6023962132f4b30eb4c172c91ce92d933da334c59c23cddee82358ddafb0b" +dependencies = [ + "anyhow", + "itertools", + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "quinn" +version = "0.11.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b9e20a958963c291dc322d98411f541009df2ced7b5a4f2bd52337638cfccf20" +dependencies = [ + "bytes", + "cfg_aliases", + "pin-project-lite", + "quinn-proto", + "quinn-udp", + "rustc-hash", + "rustls", + "socket2", + "thiserror 2.0.18", + "tokio", + "tracing", + "web-time", +] + +[[package]] +name = "quinn-proto" +version = "0.11.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "434b42fec591c96ef50e21e886936e66d3cc3f737104fdb9b737c40ffb94c098" +dependencies = [ + "bytes", + "getrandom 0.3.4", + "lru-slab", + "rand", + "ring", + "rustc-hash", + "rustls", + "rustls-pki-types", + "slab", + "thiserror 2.0.18", + "tinyvec", + "tracing", + "web-time", +] + +[[package]] +name = "quinn-udp" +version = "0.5.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "addec6a0dcad8a8d96a771f815f0eaf55f9d1805756410b39f5fa81332574cbd" +dependencies = [ + "cfg_aliases", + "libc", + "once_cell", + "socket2", + "tracing", + "windows-sys 0.60.2", +] + +[[package]] +name = "quote" +version = "1.0.45" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "41f2619966050689382d2b44f664f4bc593e129785a36d6ee376ddf37259b924" +dependencies = [ + "proc-macro2", +] + +[[package]] +name = "r-efi" +version = "5.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "69cdb34c158ceb288df11e18b4bd39de994f6657d83847bdffdbd7f346754b0f" + +[[package]] +name = "r-efi" +version = "6.0.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f8dcc9c7d52a811697d2151c701e0d08956f92b0e24136cf4cf27b57a6a0d9bf" + +[[package]] +name = "rand" +version = "0.9.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "44c5af06bb1b7d3216d91932aed5265164bf384dc89cd6ba05cf59a35f5f76ea" +dependencies = [ + "rand_chacha", + "rand_core", +] + +[[package]] +name = "rand_chacha" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d3022b5f1df60f26e1ffddd6c66e8aa15de382ae63b3a0c1bfc0e4d3e3f325cb" +dependencies = [ + "ppv-lite86", + "rand_core", +] + +[[package]] +name = "rand_core" +version = "0.9.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "76afc826de14238e6e8c374ddcc1fa19e374fd8dd986b0d2af0d02377261d83c" +dependencies = [ + "getrandom 0.3.4", +] + +[[package]] +name = "rand_xorshift" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "513962919efc330f829edb2535844d1b912b0fbe2ca165d613e4e8788bb05a5a" +dependencies = [ + "rand_core", +] + +[[package]] +name = "regex" +version = "1.12.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e10754a14b9137dd7b1e3e5b0493cc9171fdd105e0ab477f51b72e7f3ac0e276" +dependencies = [ + "aho-corasick", + "memchr", + "regex-automata", + "regex-syntax", +] + +[[package]] +name = "regex-automata" +version = "0.4.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6e1dd4122fc1595e8162618945476892eefca7b88c52820e74af6262213cae8f" +dependencies = [ + "aho-corasick", + "memchr", + "regex-syntax", +] + +[[package]] +name = "regex-syntax" +version = "0.8.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "dc897dd8d9e8bd1ed8cdad82b5966c3e0ecae09fb1907d58efaa013543185d0a" + +[[package]] +name = "reqwest" +version = "0.12.28" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "eddd3ca559203180a307f12d114c268abf583f59b03cb906fd0b3ff8646c1147" +dependencies = [ + "base64", + "bytes", + "futures-core", + "http", + "http-body", + "http-body-util", + "hyper", + "hyper-rustls", + "hyper-util", + "js-sys", + "log", + "percent-encoding", + "pin-project-lite", + "quinn", + "rustls", + "rustls-pki-types", + "serde", + "serde_json", + "serde_urlencoded", + "sync_wrapper", + "tokio", + "tokio-rustls", + "tower", + "tower-http", + "tower-service", + "url", + "wasm-bindgen", + "wasm-bindgen-futures", + "web-sys", + "webpki-roots", +] + +[[package]] +name = "ring" +version = "0.17.14" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a4689e6c2294d81e88dc6261c768b63bc4fcdb852be6d1352498b114f61383b7" +dependencies = [ + "cc", + "cfg-if", + "getrandom 0.2.17", + "libc", + "untrusted", + "windows-sys 0.52.0", +] + +[[package]] +name = "rustc-hash" +version = "2.1.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "94300abf3f1ae2e2b8ffb7b58043de3d399c73fa6f4b73826402a5c457614dbe" + +[[package]] +name = "rustls" +version = "0.23.40" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ef86cd5876211988985292b91c96a8f2d298df24e75989a43a3c73f2d4d8168b" +dependencies = [ + "once_cell", + "ring", + "rustls-pki-types", + "rustls-webpki", + "subtle", + "zeroize", +] + +[[package]] +name = "rustls-native-certs" +version = "0.8.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "612460d5f7bea540c490b2b6395d8e34a953e52b491accd6c86c8164c5932a63" +dependencies = [ + "openssl-probe", + "rustls-pki-types", + "schannel", + "security-framework", +] + +[[package]] +name = "rustls-pki-types" +version = "1.14.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "30a7197ae7eb376e574fe940d068c30fe0462554a3ddbe4eca7838e049c937a9" +dependencies = [ + "web-time", + "zeroize", +] + +[[package]] +name = "rustls-webpki" +version = "0.103.13" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "61c429a8649f110dddef65e2a5ad240f747e85f7758a6bccc7e5777bd33f756e" +dependencies = [ + "ring", + "rustls-pki-types", + "untrusted", +] + +[[package]] +name = "rustversion" +version = "1.0.22" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b39cdef0fa800fc44525c84ccb54a029961a8215f9619753635a9c0d2538d46d" + +[[package]] +name = "ryu" +version = "1.0.23" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9774ba4a74de5f7b1c1451ed6cd5285a32eddb5cccb8cc655a4e50009e06477f" + +[[package]] +name = "schannel" +version = "0.1.29" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "91c1b7e4904c873ef0710c1f407dde2e6287de2bebc1bbbf7d430bb7cbffd939" +dependencies = [ + "windows-sys 0.61.2", +] + +[[package]] +name = "schemars" +version = "0.8.22" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3fbf2ae1b8bc8e02df939598064d22402220cd5bbcca1c76f7d6a310974d5615" +dependencies = [ + "dyn-clone", + "schemars_derive", + "serde", + "serde_json", +] + +[[package]] +name = "schemars_derive" +version = "0.8.22" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "32e265784ad618884abaea0600a9adf15393368d840e0222d101a072f3f7534d" +dependencies = [ + "proc-macro2", + "quote", + "serde_derive_internals", + "syn", +] + +[[package]] +name = "security-framework" +version = "3.7.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b7f4bc775c73d9a02cde8bf7b2ec4c9d12743edf609006c7facc23998404cd1d" +dependencies = [ + "bitflags", + "core-foundation", + "core-foundation-sys", + "libc", + "security-framework-sys", +] + +[[package]] +name = "security-framework-sys" +version = "2.17.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6ce2691df843ecc5d231c0b14ece2acc3efb62c0a398c7e1d875f3983ce020e3" +dependencies = [ + "core-foundation-sys", + "libc", +] + +[[package]] +name = "semver" +version = "1.0.28" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8a7852d02fc848982e0c167ef163aaff9cd91dc640ba85e263cb1ce46fae51cd" + +[[package]] +name = "serde" +version = "1.0.228" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9a8e94ea7f378bd32cbbd37198a4a91436180c5bb472411e48b5ec2e2124ae9e" +dependencies = [ + "serde_core", + "serde_derive", +] + +[[package]] +name = "serde_core" +version = "1.0.228" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "41d385c7d4ca58e59fc732af25c3983b67ac852c1a25000afe1175de458b67ad" +dependencies = [ + "serde_derive", +] + +[[package]] +name = "serde_derive" +version = "1.0.228" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d540f220d3187173da220f885ab66608367b6574e925011a9353e4badda91d79" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "serde_derive_internals" +version = "0.29.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "18d26a20a969b9e3fdf2fc2d9f21eda6c40e2de84c9408bb5d3b05d499aae711" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "serde_json" +version = "1.0.149" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "83fc039473c5595ace860d8c4fafa220ff474b3fc6bfdb4293327f1a37e94d86" +dependencies = [ + "itoa", + "memchr", + "serde", + "serde_core", + "zmij", +] + +[[package]] +name = "serde_urlencoded" +version = "0.7.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d3491c14715ca2294c4d6a88f15e84739788c1d030eed8c110436aafdaa2f3fd" +dependencies = [ + "form_urlencoded", + "itoa", + "ryu", + "serde", +] + +[[package]] +name = "serde_yaml" +version = "0.9.34+deprecated" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6a8b1a1a2ebf674015cc02edccce75287f1a0130d394307b36743c2f5d504b47" +dependencies = [ + "indexmap", + "itoa", + "ryu", + "serde", + "unsafe-libyaml", +] + +[[package]] +name = "sha1" +version = "0.10.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e3bf829a2d51ab4a5ddf1352d8470c140cadc8301b2ae1789db023f01cedd6ba" +dependencies = [ + "cfg-if", + "cpufeatures", + "digest", +] + +[[package]] +name = "sharded-slab" +version = "0.1.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f40ca3c46823713e0d4209592e8d6e826aa57e928f09752619fc696c499637f6" +dependencies = [ + "lazy_static", +] + +[[package]] +name = "shlex" +version = "1.3.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0fda2ff0d084019ba4d7c6f371c95d8fd75ce3524c3cb8fb653a3023f6323e64" + +[[package]] +name = "signal-hook-registry" +version = "1.4.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c4db69cba1110affc0e9f7bcd48bbf87b3f4fc7c61fc9155afd4c469eb3d6c1b" +dependencies = [ + "errno", + "libc", +] + +[[package]] +name = "slab" +version = "0.4.12" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0c790de23124f9ab44544d7ac05d60440adc586479ce501c1d6d7da3cd8c9cf5" + +[[package]] +name = "smallvec" +version = "1.15.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "67b1b7a3b5fe4f1376887184045fcf45c69e92af734b7aaddc05fb777b6fbd03" + +[[package]] +name = "socket2" +version = "0.6.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3a766e1110788c36f4fa1c2b71b387a7815aa65f88ce0229841826633d93723e" +dependencies = [ + "libc", + "windows-sys 0.61.2", +] + +[[package]] +name = "stable_deref_trait" +version = "1.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6ce2be8dc25455e1f91df71bfa12ad37d7af1092ae736f3a6cd0e37bc7810596" + +[[package]] +name = "strsim" +version = "0.11.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7da8b5736845d9f2fcb837ea5d9e2628564b3b043a70948a3f0b778838c5fb4f" + +[[package]] +name = "subtle" +version = "2.6.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "13c2bddecc57b384dee18652358fb23172facb8a2c51ccc10d74c157bdea3292" + +[[package]] +name = "syn" +version = "2.0.117" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e665b8803e7b1d2a727f4023456bbbbe74da67099c585258af0ad9c5013b9b99" +dependencies = [ + "proc-macro2", + "quote", + "unicode-ident", +] + +[[package]] +name = "sync_wrapper" +version = "1.0.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0bf256ce5efdfa370213c1dabab5935a12e49f2c58d15e9eac2870d3b4f27263" +dependencies = [ + "futures-core", +] + +[[package]] +name = "synstructure" +version = "0.13.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "728a70f3dbaf5bab7f0c4b1ac8d7ae5ea60a4b5549c8a5914361c99147a709d2" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "sysinfo" +version = "0.38.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "92ab6a2f8bfe508deb3c6406578252e491d299cbbf3bc0529ecc3313aee4a52f" +dependencies = [ + "libc", + "memchr", + "ntapi", + "objc2-core-foundation", + "objc2-io-kit", + "windows", +] + +[[package]] +name = "thiserror" +version = "1.0.69" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b6aaf5339b578ea85b50e080feb250a3e8ae8cfcdff9a461c9ec2904bc923f52" +dependencies = [ + "thiserror-impl 1.0.69", +] + +[[package]] +name = "thiserror" +version = "2.0.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4288b5bcbc7920c07a1149a35cf9590a2aa808e0bc1eafaade0b80947865fbc4" +dependencies = [ + "thiserror-impl 2.0.18", +] + +[[package]] +name = "thiserror-impl" +version = "1.0.69" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4fee6c4efc90059e10f81e6d42c60a18f76588c3d74cb83a0b242a2b6c7504c1" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "thiserror-impl" +version = "2.0.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ebc4ee7f67670e9b64d05fa4253e753e016c6c95ff35b89b7941d6b856dec1d5" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "thread_local" +version = "1.1.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f60246a4944f24f6e018aa17cdeffb7818b76356965d03b07d6a9886e8962185" +dependencies = [ + "cfg-if", +] + +[[package]] +name = "tinystr" +version = "0.8.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c8323304221c2a851516f22236c5722a72eaa19749016521d6dff0824447d96d" +dependencies = [ + "displaydoc", + "zerovec", +] + +[[package]] +name = "tinyvec" +version = "1.11.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3e61e67053d25a4e82c844e8424039d9745781b3fc4f32b8d55ed50f5f667ef3" +dependencies = [ + "tinyvec_macros", +] + +[[package]] +name = "tinyvec_macros" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1f3ccbac311fea05f86f61904b462b55fb3df8837a366dfc601a0161d0532f20" + +[[package]] +name = "tokio" +version = "1.52.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "110a78583f19d5cdb2c5ccf321d1290344e71313c6c37d43520d386027d18386" +dependencies = [ + "bytes", + "libc", + "mio", + "pin-project-lite", + "signal-hook-registry", + "socket2", + "tokio-macros", + "windows-sys 0.61.2", +] + +[[package]] +name = "tokio-macros" +version = "2.7.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "385a6cb71ab9ab790c5fe8d67f1645e6c450a7ce006a33de03daa956cf70a496" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "tokio-rustls" +version = "0.26.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1729aa945f29d91ba541258c8df89027d5792d85a8841fb65e8bf0f4ede4ef61" +dependencies = [ + "rustls", + "tokio", +] + +[[package]] +name = "tokio-stream" +version = "0.1.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "32da49809aab5c3bc678af03902d4ccddea2a87d028d86392a4b1560c6906c70" +dependencies = [ + "futures-core", + "pin-project-lite", + "tokio", +] + +[[package]] +name = "tokio-tungstenite" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d25a406cddcc431a75d3d9afc6a7c0f7428d4891dd973e4d54c56b46127bf857" +dependencies = [ + "futures-util", + "log", + "rustls", + "rustls-native-certs", + "rustls-pki-types", + "tokio", + "tokio-rustls", + "tungstenite", +] + +[[package]] +name = "tokio-util" +version = "0.7.18" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9ae9cec805b01e8fc3fd2fe289f89149a9b66dd16786abd8b19cfa7b48cb0098" +dependencies = [ + "bytes", + "futures-core", + "futures-sink", + "pin-project-lite", + "tokio", +] + +[[package]] +name = "tonic" +version = "0.14.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ac2a5518c70fa84342385732db33fb3f44bc4cc748936eb5833d2df34d6445ef" +dependencies = [ + "async-trait", + "base64", + "bytes", + "http", + "http-body", + "http-body-util", + "hyper", + "hyper-timeout", + "hyper-util", + "percent-encoding", + "pin-project", + "sync_wrapper", + "tokio", + "tokio-stream", + "tower", + "tower-layer", + "tower-service", + "tracing", +] + +[[package]] +name = "tonic-prost" +version = "0.14.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "50849f68853be452acf590cde0b146665b8d507b3b8af17261df47e02c209ea0" +dependencies = [ + "bytes", + "prost", + "tonic", +] + +[[package]] +name = "tower" +version = "0.5.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ebe5ef63511595f1344e2d5cfa636d973292adc0eec1f0ad45fae9f0851ab1d4" +dependencies = [ + "futures-core", + "futures-util", + "indexmap", + "pin-project-lite", + "slab", + "sync_wrapper", + "tokio", + "tokio-util", + "tower-layer", + "tower-service", + "tracing", +] + +[[package]] +name = "tower-http" +version = "0.6.10" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "68d6fdd9f81c2819c9a8b0e0cd91660e7746a8e6ea2ba7c6b2b057985f6bcb51" +dependencies = [ + "bitflags", + "bytes", + "futures-util", + "http", + "http-body", + "pin-project-lite", + "tower", + "tower-layer", + "tower-service", + "url", +] + +[[package]] +name = "tower-layer" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "121c2a6cda46980bb0fcd1647ffaf6cd3fc79a013de288782836f6df9c48780e" + +[[package]] +name = "tower-service" +version = "0.3.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8df9b6e13f2d32c91b9bd719c00d1958837bc7dec474d94952798cc8e69eeec3" + +[[package]] +name = "tracing" +version = "0.1.44" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "63e71662fa4b2a2c3a26f570f037eb95bb1f85397f3cd8076caed2f026a6d100" +dependencies = [ + "pin-project-lite", + "tracing-attributes", + "tracing-core", +] + +[[package]] +name = "tracing-attributes" +version = "0.1.31" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7490cfa5ec963746568740651ac6781f701c9c5ea257c58e057f3ba8cf69e8da" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "tracing-core" +version = "0.1.36" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "db97caf9d906fbde555dd62fa95ddba9eecfd14cb388e4f491a66d74cd5fb79a" +dependencies = [ + "once_cell", + "valuable", +] + +[[package]] +name = "tracing-log" +version = "0.2.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ee855f1f400bd0e5c02d150ae5de3840039a3f54b025156404e34c23c03f47c3" +dependencies = [ + "log", + "once_cell", + "tracing-core", +] + +[[package]] +name = "tracing-subscriber" +version = "0.3.23" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "cb7f578e5945fb242538965c2d0b04418d38ec25c79d160cd279bf0731c8d319" +dependencies = [ + "matchers", + "nu-ansi-term", + "once_cell", + "regex-automata", + "sharded-slab", + "smallvec", + "thread_local", + "tracing", + "tracing-core", + "tracing-log", +] + +[[package]] +name = "try-lock" +version = "0.2.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e421abadd41a4225275504ea4d6566923418b7f05506fbc9c0fe86ba7396114b" + +[[package]] +name = "tungstenite" +version = "0.28.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8628dcc84e5a09eb3d8423d6cb682965dea9133204e8fb3efee74c2a0c259442" +dependencies = [ + "bytes", + "data-encoding", + "http", + "httparse", + "log", + "rand", + "rustls", + "rustls-pki-types", + "sha1", + "thiserror 2.0.18", + "utf-8", +] + +[[package]] +name = "typenum" +version = "1.20.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "40ce102ab67701b8526c123c1bab5cbe42d7040ccfd0f64af1a385808d2f43de" + +[[package]] +name = "unarray" +version = "0.1.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "eaea85b334db583fe3274d12b4cd1880032beab409c0d774be044d4480ab9a94" + +[[package]] +name = "unicode-ident" +version = "1.0.24" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e6e4313cd5fcd3dad5cafa179702e2b244f760991f45397d14d4ebf38247da75" + +[[package]] +name = "unicode-xid" +version = "0.2.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ebc1c04c71510c7f702b52b7c350734c9ff1295c464a03335b00bb84fc54f853" + +[[package]] +name = "unsafe-libyaml" +version = "0.2.11" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "673aac59facbab8a9007c7f6108d11f63b603f7cabff99fabf650fea5c32b861" + +[[package]] +name = "untrusted" +version = "0.9.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8ecb6da28b8a351d773b68d5825ac39017e680750f980f3a1a85cd8dd28a47c1" + +[[package]] +name = "url" +version = "2.5.8" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ff67a8a4397373c3ef660812acab3268222035010ab8680ec4215f38ba3d0eed" +dependencies = [ + "form_urlencoded", + "idna", + "percent-encoding", + "serde", +] + +[[package]] +name = "utf-8" +version = "0.7.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "09cc8ee72d2a9becf2f2febe0205bbed8fc6615b7cb429ad062dc7b7ddd036a9" + +[[package]] +name = "utf8_iter" +version = "1.0.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b6c140620e7ffbb22c2dee59cafe6084a59b5ffc27a8859a5f0d494b5d52b6be" + +[[package]] +name = "utf8parse" +version = "0.2.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "06abde3611657adf66d383f00b093d7faecc7fa57071cce2578660c9f1010821" + +[[package]] +name = "uuid" +version = "1.23.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ddd74a9687298c6858e9b88ec8935ec45d22e8fd5e6394fa1bd4e99a87789c76" +dependencies = [ + "getrandom 0.4.2", + "js-sys", + "serde_core", + "wasm-bindgen", +] + +[[package]] +name = "valuable" +version = "0.1.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ba73ea9cf16a25df0c8caa16c51acb937d5712a8429db78a3ee29d5dcacd3a65" + +[[package]] +name = "version_check" +version = "0.9.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0b928f33d975fc6ad9f86c8f283853ad26bdd5b10b7f1542aa2fa15e2289105a" + +[[package]] +name = "want" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bfa7760aed19e106de2c7c0b581b509f2f25d3dacaf737cb82ac61bc6d760b0e" +dependencies = [ + "try-lock", +] + +[[package]] +name = "wasi" +version = "0.11.1+wasi-snapshot-preview1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ccf3ec651a847eb01de73ccad15eb7d99f80485de043efb2f370cd654f4ea44b" + +[[package]] +name = "wasip2" +version = "1.0.3+wasi-0.2.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "20064672db26d7cdc89c7798c48a0fdfac8213434a1186e5ef29fd560ae223d6" +dependencies = [ + "wit-bindgen 0.57.1", +] + +[[package]] +name = "wasip3" +version = "0.4.0+wasi-0.3.0-rc-2026-01-06" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5428f8bf88ea5ddc08faddef2ac4a67e390b88186c703ce6dbd955e1c145aca5" +dependencies = [ + "wit-bindgen 0.51.0", +] + +[[package]] +name = "wasm-bindgen" +version = "0.2.121" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "49ace1d07c165b0864824eee619580c4689389afa9dc9ed3a4c75040d82e6790" +dependencies = [ + "cfg-if", + "once_cell", + "rustversion", + "wasm-bindgen-macro", + "wasm-bindgen-shared", +] + +[[package]] +name = "wasm-bindgen-futures" +version = "0.4.71" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "96492d0d3ffba25305a7dc88720d250b1401d7edca02cc3bcd50633b424673b8" +dependencies = [ + "js-sys", + "wasm-bindgen", +] + +[[package]] +name = "wasm-bindgen-macro" +version = "0.2.121" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e68e6f4afd367a562002c05637acb8578ff2dea1943df76afb9e83d177c8578" +dependencies = [ + "quote", + "wasm-bindgen-macro-support", +] + +[[package]] +name = "wasm-bindgen-macro-support" +version = "0.2.121" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d95a9ec35c64b2a7cb35d3fead40c4238d0940c86d107136999567a4703259f2" +dependencies = [ + "bumpalo", + "proc-macro2", + "quote", + "syn", + "wasm-bindgen-shared", +] + +[[package]] +name = "wasm-bindgen-shared" +version = "0.2.121" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "c4e0100b01e9f0d03189a92b96772a1fb998639d981193d7dbab487302513441" +dependencies = [ + "unicode-ident", +] + +[[package]] +name = "wasm-encoder" +version = "0.244.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "990065f2fe63003fe337b932cfb5e3b80e0b4d0f5ff650e6985b1048f62c8319" +dependencies = [ + "leb128fmt", + "wasmparser", +] + +[[package]] +name = "wasm-metadata" +version = "0.244.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "bb0e353e6a2fbdc176932bbaab493762eb1255a7900fe0fea1a2f96c296cc909" +dependencies = [ + "anyhow", + "indexmap", + "wasm-encoder", + "wasmparser", +] + +[[package]] +name = "wasmparser" +version = "0.244.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "47b807c72e1bac69382b3a6fb3dbe8ea4c0ed87ff5629b8685ae6b9a611028fe" +dependencies = [ + "bitflags", + "hashbrown 0.15.5", + "indexmap", + "semver", +] + +[[package]] +name = "web-sys" +version = "0.3.98" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4b572dff8bcf38bad0fa19729c89bb5748b2b9b1d8be70cf90df697e3a8f32aa" +dependencies = [ + "js-sys", + "wasm-bindgen", +] + +[[package]] +name = "web-time" +version = "1.1.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5a6580f308b1fad9207618087a65c04e7a10bc77e02c8e84e9b00dd4b12fa0bb" +dependencies = [ + "js-sys", + "wasm-bindgen", +] + +[[package]] +name = "webpki-roots" +version = "1.0.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "52f5ee44c96cf55f1b349600768e3ece3a8f26010c05265ab73f945bb1a2eb9d" +dependencies = [ + "rustls-pki-types", +] + +[[package]] +name = "winapi" +version = "0.3.9" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419" +dependencies = [ + "winapi-i686-pc-windows-gnu", + "winapi-x86_64-pc-windows-gnu", +] + +[[package]] +name = "winapi-i686-pc-windows-gnu" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6" + +[[package]] +name = "winapi-x86_64-pc-windows-gnu" +version = "0.4.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f" + +[[package]] +name = "windows" +version = "0.62.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "527fadee13e0c05939a6a05d5bd6eec6cd2e3dbd648b9f8e447c6518133d8580" +dependencies = [ + "windows-collections", + "windows-core", + "windows-future", + "windows-numerics", +] + +[[package]] +name = "windows-collections" +version = "0.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "23b2d95af1a8a14a3c7367e1ed4fc9c20e0a26e79551b1454d72583c97cc6610" +dependencies = [ + "windows-core", +] + +[[package]] +name = "windows-core" +version = "0.62.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b8e83a14d34d0623b51dce9581199302a221863196a1dde71a7663a4c2be9deb" +dependencies = [ + "windows-implement", + "windows-interface", + "windows-link", + "windows-result", + "windows-strings", +] + +[[package]] +name = "windows-future" +version = "0.3.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "e1d6f90251fe18a279739e78025bd6ddc52a7e22f921070ccdc67dde84c605cb" +dependencies = [ + "windows-core", + "windows-link", + "windows-threading", +] + +[[package]] +name = "windows-implement" +version = "0.60.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "053e2e040ab57b9dc951b72c264860db7eb3b0200ba345b4e4c3b14f67855ddf" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "windows-interface" +version = "0.59.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3f316c4a2570ba26bbec722032c4099d8c8bc095efccdc15688708623367e358" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "windows-link" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f0805222e57f7521d6a62e36fa9163bc891acd422f971defe97d64e70d0a4fe5" + +[[package]] +name = "windows-numerics" +version = "0.3.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "6e2e40844ac143cdb44aead537bbf727de9b044e107a0f1220392177d15b0f26" +dependencies = [ + "windows-core", + "windows-link", +] + +[[package]] +name = "windows-result" +version = "0.4.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7781fa89eaf60850ac3d2da7af8e5242a5ea78d1a11c49bf2910bb5a73853eb5" +dependencies = [ + "windows-link", +] + +[[package]] +name = "windows-strings" +version = "0.5.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "7837d08f69c77cf6b07689544538e017c1bfcf57e34b4c0ff58e6c2cd3b37091" +dependencies = [ + "windows-link", +] + +[[package]] +name = "windows-sys" +version = "0.52.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "282be5f36a8ce781fad8c8ae18fa3f9beff57ec1b52cb3de0789201425d9a33d" +dependencies = [ + "windows-targets 0.52.6", +] + +[[package]] +name = "windows-sys" +version = "0.60.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "f2f500e4d28234f72040990ec9d39e3a6b950f9f22d3dba18416c35882612bcb" +dependencies = [ + "windows-targets 0.53.5", +] + +[[package]] +name = "windows-sys" +version = "0.61.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ae137229bcbd6cdf0f7b80a31df61766145077ddf49416a728b02cb3921ff3fc" +dependencies = [ + "windows-link", +] + +[[package]] +name = "windows-targets" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9b724f72796e036ab90c1021d4780d4d3d648aca59e491e6b98e725b84e99973" +dependencies = [ + "windows_aarch64_gnullvm 0.52.6", + "windows_aarch64_msvc 0.52.6", + "windows_i686_gnu 0.52.6", + "windows_i686_gnullvm 0.52.6", + "windows_i686_msvc 0.52.6", + "windows_x86_64_gnu 0.52.6", + "windows_x86_64_gnullvm 0.52.6", + "windows_x86_64_msvc 0.52.6", +] + +[[package]] +name = "windows-targets" +version = "0.53.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "4945f9f551b88e0d65f3db0bc25c33b8acea4d9e41163edf90dcd0b19f9069f3" +dependencies = [ + "windows-link", + "windows_aarch64_gnullvm 0.53.1", + "windows_aarch64_msvc 0.53.1", + "windows_i686_gnu 0.53.1", + "windows_i686_gnullvm 0.53.1", + "windows_i686_msvc 0.53.1", + "windows_x86_64_gnu 0.53.1", + "windows_x86_64_gnullvm 0.53.1", + "windows_x86_64_msvc 0.53.1", +] + +[[package]] +name = "windows-threading" +version = "0.2.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "3949bd5b99cafdf1c7ca86b43ca564028dfe27d66958f2470940f73d86d75b37" +dependencies = [ + "windows-link", +] + +[[package]] +name = "windows_aarch64_gnullvm" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "32a4622180e7a0ec044bb555404c800bc9fd9ec262ec147edd5989ccd0c02cd3" + +[[package]] +name = "windows_aarch64_gnullvm" +version = "0.53.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "a9d8416fa8b42f5c947f8482c43e7d89e73a173cead56d044f6a56104a6d1b53" + +[[package]] +name = "windows_aarch64_msvc" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "09ec2a7bb152e2252b53fa7803150007879548bc709c039df7627cabbd05d469" + +[[package]] +name = "windows_aarch64_msvc" +version = "0.53.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b9d782e804c2f632e395708e99a94275910eb9100b2114651e04744e9b125006" + +[[package]] +name = "windows_i686_gnu" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "8e9b5ad5ab802e97eb8e295ac6720e509ee4c243f69d781394014ebfe8bbfa0b" + +[[package]] +name = "windows_i686_gnu" +version = "0.53.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "960e6da069d81e09becb0ca57a65220ddff016ff2d6af6a223cf372a506593a3" + +[[package]] +name = "windows_i686_gnullvm" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0eee52d38c090b3caa76c563b86c3a4bd71ef1a819287c19d586d7334ae8ed66" + +[[package]] +name = "windows_i686_gnullvm" +version = "0.53.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "fa7359d10048f68ab8b09fa71c3daccfb0e9b559aed648a8f95469c27057180c" + +[[package]] +name = "windows_i686_msvc" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "240948bc05c5e7c6dabba28bf89d89ffce3e303022809e73deaefe4f6ec56c66" + +[[package]] +name = "windows_i686_msvc" +version = "0.53.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1e7ac75179f18232fe9c285163565a57ef8d3c89254a30685b57d83a38d326c2" + +[[package]] +name = "windows_x86_64_gnu" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "147a5c80aabfbf0c7d901cb5895d1de30ef2907eb21fbbab29ca94c5b08b1a78" + +[[package]] +name = "windows_x86_64_gnu" +version = "0.53.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9c3842cdd74a865a8066ab39c8a7a473c0778a3f29370b5fd6b4b9aa7df4a499" + +[[package]] +name = "windows_x86_64_gnullvm" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "24d5b23dc417412679681396f2b49f3de8c1473deb516bd34410872eff51ed0d" + +[[package]] +name = "windows_x86_64_gnullvm" +version = "0.53.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0ffa179e2d07eee8ad8f57493436566c7cc30ac536a3379fdf008f47f6bb7ae1" + +[[package]] +name = "windows_x86_64_msvc" +version = "0.52.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "589f6da84c646204747d1270a2a5661ea66ed1cced2631d546fdfb155959f9ec" + +[[package]] +name = "windows_x86_64_msvc" +version = "0.53.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d6bbff5f0aada427a1e5a6da5f1f98158182f26556f345ac9e04d36d0ebed650" + +[[package]] +name = "wiremock" +version = "0.6.5" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "08db1edfb05d9b3c1542e521aea074442088292f00b5f28e435c714a98f85031" +dependencies = [ + "assert-json-diff", + "base64", + "deadpool", + "futures", + "http", + "http-body-util", + "hyper", + "hyper-util", + "log", + "once_cell", + "regex", + "serde", + "serde_json", + "tokio", + "url", +] + +[[package]] +name = "wit-bindgen" +version = "0.51.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "d7249219f66ced02969388cf2bb044a09756a083d0fab1e566056b04d9fbcaa5" +dependencies = [ + "wit-bindgen-rust-macro", +] + +[[package]] +name = "wit-bindgen" +version = "0.57.1" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1ebf944e87a7c253233ad6766e082e3cd714b5d03812acc24c318f549614536e" + +[[package]] +name = "wit-bindgen-core" +version = "0.51.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ea61de684c3ea68cb082b7a88508a8b27fcc8b797d738bfc99a82facf1d752dc" +dependencies = [ + "anyhow", + "heck", + "wit-parser", +] + +[[package]] +name = "wit-bindgen-rust" +version = "0.51.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b7c566e0f4b284dd6561c786d9cb0142da491f46a9fbed79ea69cdad5db17f21" +dependencies = [ + "anyhow", + "heck", + "indexmap", + "prettyplease", + "syn", + "wasm-metadata", + "wit-bindgen-core", + "wit-component", +] + +[[package]] +name = "wit-bindgen-rust-macro" +version = "0.51.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0c0f9bfd77e6a48eccf51359e3ae77140a7f50b1e2ebfe62422d8afdaffab17a" +dependencies = [ + "anyhow", + "prettyplease", + "proc-macro2", + "quote", + "syn", + "wit-bindgen-core", + "wit-bindgen-rust", +] + +[[package]] +name = "wit-component" +version = "0.244.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "9d66ea20e9553b30172b5e831994e35fbde2d165325bec84fc43dbf6f4eb9cb2" +dependencies = [ + "anyhow", + "bitflags", + "indexmap", + "log", + "serde", + "serde_derive", + "serde_json", + "wasm-encoder", + "wasm-metadata", + "wasmparser", + "wit-parser", +] + +[[package]] +name = "wit-parser" +version = "0.244.0" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "ecc8ac4bc1dc3381b7f59c34f00b67e18f910c2c0f50015669dde7def656a736" +dependencies = [ + "anyhow", + "id-arena", + "indexmap", + "log", + "semver", + "serde", + "serde_derive", + "serde_json", + "unicode-xid", + "wasmparser", +] + +[[package]] +name = "writeable" +version = "0.6.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "1ffae5123b2d3fc086436f8834ae3ab053a283cfac8fe0a0b8eaae044768a4c4" + +[[package]] +name = "yoke" +version = "0.8.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "abe8c5fda708d9ca3df187cae8bfb9ceda00dd96231bed36e445a1a48e66f9ca" +dependencies = [ + "stable_deref_trait", + "yoke-derive", + "zerofrom", +] + +[[package]] +name = "yoke-derive" +version = "0.8.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "de844c262c8848816172cef550288e7dc6c7b7814b4ee56b3e1553f275f1858e" +dependencies = [ + "proc-macro2", + "quote", + "syn", + "synstructure", +] + +[[package]] +name = "zerocopy" +version = "0.8.48" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "eed437bf9d6692032087e337407a86f04cd8d6a16a37199ed57949d415bd68e9" +dependencies = [ + "zerocopy-derive", +] + +[[package]] +name = "zerocopy-derive" +version = "0.8.48" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "70e3cd084b1788766f53af483dd21f93881ff30d7320490ec3ef7526d203bad4" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "zerofrom" +version = "0.1.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "69faa1f2a1ea75661980b013019ed6687ed0e83d069bc1114e2cc74c6c04c4df" +dependencies = [ + "zerofrom-derive", +] + +[[package]] +name = "zerofrom-derive" +version = "0.1.7" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "11532158c46691caf0f2593ea8358fed6bbf68a0315e80aae9bd41fbade684a1" +dependencies = [ + "proc-macro2", + "quote", + "syn", + "synstructure", +] + +[[package]] +name = "zeroize" +version = "1.8.2" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b97154e67e32c85465826e8bcc1c59429aaaf107c1e4a9e53c8d8ccd5eff88d0" + +[[package]] +name = "zerotrie" +version = "0.2.4" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "0f9152d31db0792fa83f70fb2f83148effb5c1f5b8c7686c3459e361d9bc20bf" +dependencies = [ + "displaydoc", + "yoke", + "zerofrom", +] + +[[package]] +name = "zerovec" +version = "0.11.6" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "90f911cbc359ab6af17377d242225f4d75119aec87ea711a880987b18cd7b239" +dependencies = [ + "yoke", + "zerofrom", + "zerovec-derive", +] + +[[package]] +name = "zerovec-derive" +version = "0.11.3" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "625dc425cab0dca6dc3c3319506e6593dcb08a9f387ea3b284dbd52a92c40555" +dependencies = [ + "proc-macro2", + "quote", + "syn", +] + +[[package]] +name = "zmij" +version = "1.0.21" +source = "registry+https://github.com/rust-lang/crates.io-index" +checksum = "b8848ee67ecc8aedbaf3e4122217aff892639231befc6a1b58d29fff4c2cabaa" diff --git a/sandbox-morph/Cargo.toml b/sandbox-morph/Cargo.toml new file mode 100644 index 00000000..7d865cd8 --- /dev/null +++ b/sandbox-morph/Cargo.toml @@ -0,0 +1,52 @@ +[package] +name = "iii-sandbox-morph" +version = "0.1.0" +edition = "2021" +license = "Apache-2.0" +repository = "https://github.com/iii-hq/workers" +authors = ["iii contributors"] +publish = false + +[lib] +name = "sandbox_morph" +path = "src/lib.rs" + +[[bin]] +name = "iii-sandbox-morph" +path = "src/main.rs" + +[dependencies] +iii-sdk = "=0.11.3" +serde = { version = "1", features = ["derive"] } +serde_json = "1" +serde_yaml = "0.9" +tokio = { version = "1", features = ["rt-multi-thread", "macros", "sync", "signal"] } +reqwest = { version = "0.12", default-features = false, features = ["json", "rustls-tls"] } +anyhow = "1" +thiserror = "1" +tracing = "0.1" +tracing-subscriber = { version = "0.3", features = ["fmt", "env-filter"] } +clap = { version = "4", features = ["derive"] } +async-trait = "0.1" +base64 = "0.22" + +[dev-dependencies] +wiremock = "0.6" +tokio = { version = "1", features = ["rt-multi-thread", "macros", "test-util"] } + +[lints.rust] +unsafe_code = "forbid" + +[lints.clippy] +all = { level = "warn", priority = -1 } +pedantic = { level = "warn", priority = -1 } +module_name_repetitions = "allow" +must_use_candidate = "allow" +missing_errors_doc = "allow" +missing_panics_doc = "allow" +too_many_lines = "allow" +unused_async = "allow" +uninlined_format_args = "allow" +needless_pass_by_value = "allow" +similar_names = "allow" +match_same_arms = "allow" diff --git a/sandbox-morph/README.md b/sandbox-morph/README.md new file mode 100644 index 00000000..9df9c3b6 --- /dev/null +++ b/sandbox-morph/README.md @@ -0,0 +1,53 @@ +# sandbox-morph + +Narrow iii worker that wraps [Morph Cloud](https://cloud.morph.so) microVM sandboxes via Morph's REST API. Morph's wedge is **Infinibranch** — branching a running sandbox into N siblings with live process state preserved in roughly 250 ms. This worker is the only sandbox provider in the family that registers `branch`. + +Registers the canonical `sandbox::*` ABI under the `sandbox::morph::*` namespace so callers can spawn and drive Morph sandboxes through `iii.trigger(...)` without depending on Morph's SDK. + +## Functions + +| Function id | Purpose | +|---|---| +| `sandbox::morph::create` | Boot a sandbox; returns `{sandbox_id, image, capabilities}` | +| `sandbox::morph::exec` | Run a command inside a live sandbox | +| `sandbox::morph::stop` | Tear down a sandbox | +| `sandbox::morph::list` | Enumerate live sandboxes plus concurrency status | +| `sandbox::morph::snapshot` | Snapshot a sandbox (chainable with `setup` upstream) | +| `sandbox::morph::branch` | Branch a running sandbox into N siblings (Infinibranch) | +| `sandbox::morph::expose_port` | Return a public URL for a port inside the sandbox | + +`create` advertises capabilities `["branch", "snapshot", "expose_port"]`. `fs::read` and `fs::write` are not registered for v0 — Morph's filesystem ops are reachable via SSH-shape APIs that don't map cleanly to the channel-based FS surface used by other sandbox workers; revisit when consensus emerges. + +## Configuration + +`config.yaml` next to the binary, or pass `--config `: + +```yaml +api_base: "https://cloud.morph.so/api" +api_key_env: MORPH_API_KEY +max_concurrent_sandboxes: 10 +default_idle_timeout_secs: 300 +image_allowlist: [] +``` + +`MORPH_API_KEY` must be present in the environment when the worker starts. Header sent on every upstream call: `Authorization: Bearer `. + +## S-codes + +Provider failures map onto a stable code space shared with the rest of the sandbox worker family: + +| Code | Cause | +|---|---| +| `S100` | Image not in `image_allowlist` | +| `S400` | Concurrency cap reached | +| `S404` | Capability not supported | +| `S500` | Provider returned 429 (rate-limited) | +| `S501` | Provider returned 402 / quota exhausted | +| `S502` | Provider returned 5xx | +| `S503` | Provider returned 401 / 403 | + +## Status + +v0.1 ships the function registrations (including `branch`), types, error mapping, concurrency cap, and a smoke test. The HTTP call bodies that talk to Morph are stubbed and return `S502` until the next iteration wires them to the real REST endpoints. The ABI is stable. + +When the real client lands, a follow-up benchmark must verify that `sandbox::morph::branch` round-trips inside ~300 ms p99 against raw Morph; the wedge dies if iii's trigger envelope adds noticeable overhead. diff --git a/sandbox-morph/iii.worker.yaml b/sandbox-morph/iii.worker.yaml new file mode 100644 index 00000000..7bbaf957 --- /dev/null +++ b/sandbox-morph/iii.worker.yaml @@ -0,0 +1,13 @@ +iii: v1 +name: sandbox-morph +language: rust +deploy: binary +manifest: Cargo.toml +bin: iii-sandbox-morph +description: Narrow iii worker that exposes Morph microVM sandboxes via the sandbox::morph::* trigger family. +config: + api_base: "https://cloud.morph.so/api" + api_key_env: MORPH_API_KEY + max_concurrent_sandboxes: 10 + default_idle_timeout_secs: 300 + image_allowlist: [] diff --git a/sandbox-morph/src/client.rs b/sandbox-morph/src/client.rs new file mode 100644 index 00000000..95e5993f --- /dev/null +++ b/sandbox-morph/src/client.rs @@ -0,0 +1,136 @@ +//! Narrow reqwest wrapper for the Morph REST API. Holds the base URL, api key, +//! and a small helper for building requests. Endpoint paths and bodies are +//! still stubbed pending a verified pass against the live Morph API; every +//! call below returns `WorkerError::ProviderUnavailable` with a TODO marker. + +use reqwest::Client; +use serde::{Deserialize, Serialize}; + +use crate::WorkerError; + +#[derive(Debug, Clone)] +pub struct MorphClient { + pub api_base: String, + pub api_key: String, + pub http: Client, +} + +impl MorphClient { + pub fn new(api_base: impl Into, api_key: impl Into) -> Self { + Self { + api_base: api_base.into(), + api_key: api_key.into(), + http: Client::builder() + .user_agent("iii-sandbox-morph/0.1") + .build() + .expect("reqwest client"), + } + } + + fn url(&self, path: &str) -> String { + format!("{}{}", self.api_base.trim_end_matches('/'), path) + } + + fn auth(&self, req: reqwest::RequestBuilder) -> reqwest::RequestBuilder { + req.bearer_auth(&self.api_key) + } + + /// Boot a new sandbox. TODO: verify path + body shape against Morph's + /// production REST surface — current path is a placeholder. + pub async fn create( + &self, + image: &str, + idle_timeout_secs: u64, + ) -> Result { + let _ = (image, idle_timeout_secs); + let _builder = self.auth(self.http.post(self.url("/sandboxes"))); + // TODO: send + parse, then map status with crate::map_http_status. + Err(WorkerError::ProviderUnavailable( + "TODO: wire Morph POST /sandboxes".to_string(), + )) + } + + pub async fn exec( + &self, + sandbox_id: &str, + cmd: &str, + args: &[String], + timeout_ms: Option, + ) -> Result { + let _ = (sandbox_id, cmd, args, timeout_ms); + Err(WorkerError::ProviderUnavailable( + "TODO: wire Morph exec endpoint".to_string(), + )) + } + + pub async fn stop(&self, sandbox_id: &str) -> Result<(), WorkerError> { + let _ = sandbox_id; + Err(WorkerError::ProviderUnavailable( + "TODO: wire Morph DELETE /sandboxes/{id}".to_string(), + )) + } + + pub async fn list(&self) -> Result, WorkerError> { + Err(WorkerError::ProviderUnavailable( + "TODO: wire Morph GET /sandboxes".to_string(), + )) + } + + pub async fn snapshot(&self, sandbox_id: &str) -> Result { + let _ = sandbox_id; + Err(WorkerError::ProviderUnavailable( + "TODO: wire Morph pause/snapshot endpoint".to_string(), + )) + } + + pub async fn expose_port(&self, sandbox_id: &str, port: u16) -> Result { + let _ = (sandbox_id, port); + Err(WorkerError::ProviderUnavailable( + "TODO: derive Morph port URL".to_string(), + )) + } + + pub async fn fs_read(&self, sandbox_id: &str, path: &str) -> Result, WorkerError> { + let _ = (sandbox_id, path); + Err(WorkerError::ProviderUnavailable( + "TODO: wire Morph fs read".to_string(), + )) + } + + pub async fn fs_write( + &self, + sandbox_id: &str, + path: &str, + bytes: &[u8], + mode: Option, + ) -> Result<(), WorkerError> { + let _ = (sandbox_id, path, bytes, mode); + Err(WorkerError::ProviderUnavailable( + "TODO: wire Morph fs write".to_string(), + )) + } + + /// Branch a running sandbox into N siblings via Morph's Infinibranch. + /// TODO: wire to Morph `instances.branch(instance_id, count)`. + pub async fn branch(&self, sandbox_id: &str, count: u32) -> Result, WorkerError> { + let _ = (sandbox_id, count); + Err(WorkerError::ProviderUnavailable( + "TODO: wire Morph branch endpoint".to_string(), + )) + } +} + +#[derive(Debug, Clone, Serialize, Deserialize)] +pub struct CreatedSandbox { + pub sandbox_id: String, + pub image: String, + pub started_at: i64, +} + +#[derive(Debug, Clone, Serialize, Deserialize)] +pub struct ExecResult { + pub stdout: String, + pub stderr: String, + pub exit_code: i32, + pub timed_out: bool, +} diff --git a/sandbox-morph/src/config.rs b/sandbox-morph/src/config.rs new file mode 100644 index 00000000..acaa216b --- /dev/null +++ b/sandbox-morph/src/config.rs @@ -0,0 +1,60 @@ +use std::path::Path; + +use anyhow::Result; +use serde::Deserialize; + +#[derive(Debug, Clone, Deserialize)] +pub struct Config { + #[serde(default = "default_api_base")] + pub api_base: String, + #[serde(default = "default_api_key_env")] + pub api_key_env: String, + #[serde(default = "default_max_concurrent")] + pub max_concurrent_sandboxes: usize, + #[serde(default = "default_idle_timeout")] + pub default_idle_timeout_secs: u64, + #[serde(default)] + pub image_allowlist: Vec, +} + +fn default_api_base() -> String { + "https://cloud.morph.so/api".to_string() +} +fn default_api_key_env() -> String { + "MORPH_API_KEY".to_string() +} +fn default_max_concurrent() -> usize { + 10 +} +fn default_idle_timeout() -> u64 { + 300 +} + +impl Default for Config { + fn default() -> Self { + Self { + api_base: default_api_base(), + api_key_env: default_api_key_env(), + max_concurrent_sandboxes: default_max_concurrent(), + default_idle_timeout_secs: default_idle_timeout(), + image_allowlist: Vec::new(), + } + } +} + +impl Config { + pub fn load(path: &Path) -> Result { + let raw = std::fs::read_to_string(path)?; + // Workers in this repo ship config.yaml whose top-level keys are the + // worker config fields directly OR wrapped under `config:`. Try both. + let value: serde_yaml::Value = serde_yaml::from_str(&raw)?; + if let Some(inner) = value.get("config") { + return Ok(serde_yaml::from_value(inner.clone())?); + } + Ok(serde_yaml::from_value(value)?) + } + + pub fn image_allowed(&self, image: &str) -> bool { + self.image_allowlist.is_empty() || self.image_allowlist.iter().any(|i| i == image) + } +} diff --git a/sandbox-morph/src/handler.rs b/sandbox-morph/src/handler.rs new file mode 100644 index 00000000..38a6619f --- /dev/null +++ b/sandbox-morph/src/handler.rs @@ -0,0 +1,190 @@ +//! Handler closures for every `sandbox::morph::*` function. Each closure parses +//! its input as untyped JSON, does config-side validation (allowlist, +//! concurrency cap), then delegates to the narrow Morph REST client. Failures +//! surface as `IIIError::Handler("[Sxxx] ...")` so callers can pattern-match +//! on the leading bracketed S-code. + +use std::sync::{ + atomic::{AtomicUsize, Ordering}, + Arc, +}; + +use base64::{engine::general_purpose::STANDARD as B64, Engine}; +use iii_sdk::IIIError; +use serde_json::{json, Value}; + +use crate::client::MorphClient; +use crate::config::Config; +use crate::{WorkerError, CAPABILITIES}; + +#[derive(Clone)] +pub struct HandlerCtx { + pub config: Arc, + pub client: Arc, + pub in_flight: Arc, +} + +impl HandlerCtx { + pub fn new(config: Arc, client: Arc) -> Self { + Self { + config, + client, + in_flight: Arc::new(AtomicUsize::new(0)), + } + } +} + +pub fn to_iii(err: WorkerError) -> IIIError { + IIIError::Handler(err.to_string()) +} + +fn require_str(input: &Value, key: &str) -> Result { + input + .get(key) + .and_then(Value::as_str) + .map(ToString::to_string) + .ok_or_else(|| WorkerError::BadInput(format!("missing string field `{key}`"))) +} + +pub async fn do_create(ctx: &HandlerCtx, input: Value) -> Result { + let image = require_str(&input, "image")?; + if !ctx.config.image_allowed(&image) { + return Err(WorkerError::ImageNotAllowed(image)); + } + let idle = input + .get("idle_timeout_secs") + .and_then(Value::as_u64) + .unwrap_or(ctx.config.default_idle_timeout_secs); + + // Reserve a concurrency slot before calling out. If we go over, give the + // slot back and surface S400 immediately — don't queue. + let prev = ctx.in_flight.fetch_add(1, Ordering::SeqCst); + if prev >= ctx.config.max_concurrent_sandboxes { + ctx.in_flight.fetch_sub(1, Ordering::SeqCst); + return Err(WorkerError::ConcurrencyCapReached(prev)); + } + + match ctx.client.create(&image, idle).await { + Ok(created) => Ok(json!({ + "sandbox_id": created.sandbox_id, + "image": created.image, + "started_at": created.started_at, + "capabilities": CAPABILITIES, + })), + Err(e) => { + ctx.in_flight.fetch_sub(1, Ordering::SeqCst); + Err(e) + } + } +} + +pub async fn do_exec(ctx: &HandlerCtx, input: Value) -> Result { + let sandbox_id = require_str(&input, "sandbox_id")?; + let cmd = require_str(&input, "cmd")?; + let args: Vec = input + .get("args") + .and_then(Value::as_array) + .map(|arr| { + arr.iter() + .filter_map(|v| v.as_str().map(ToString::to_string)) + .collect() + }) + .unwrap_or_default(); + let timeout_ms = input.get("timeout_ms").and_then(Value::as_u64); + let result = ctx + .client + .exec(&sandbox_id, &cmd, &args, timeout_ms) + .await?; + Ok(json!({ + "stdout": result.stdout, + "stderr": result.stderr, + "exit_code": result.exit_code, + "timed_out": result.timed_out, + })) +} + +pub async fn do_stop(ctx: &HandlerCtx, input: Value) -> Result { + let sandbox_id = require_str(&input, "sandbox_id")?; + ctx.client.stop(&sandbox_id).await?; + let _ = ctx + .in_flight + .fetch_update(Ordering::SeqCst, Ordering::SeqCst, |n| { + Some(n.saturating_sub(1)) + }); + Ok(json!({})) +} + +pub async fn do_list(ctx: &HandlerCtx, _input: Value) -> Result { + // Best-effort upstream fetch. If the provider is unreachable the local + // capacity envelope is still useful, so we degrade to an empty list + // rather than failing the whole call. Callers see `sandboxes: []` and + // can still trust `in_flight`/`cap`/`remaining`. + let sandboxes = ctx.client.list().await.unwrap_or_default(); + let in_flight = ctx.in_flight.load(Ordering::SeqCst); + let cap = ctx.config.max_concurrent_sandboxes; + Ok(json!({ + "sandboxes": sandboxes, + "in_flight": in_flight, + "cap": cap, + "remaining": cap.saturating_sub(in_flight), + })) +} + +pub async fn do_snapshot(ctx: &HandlerCtx, input: Value) -> Result { + let sandbox_id = require_str(&input, "sandbox_id")?; + let snapshot_id = ctx.client.snapshot(&sandbox_id).await?; + Ok(json!({ "snapshot_id": snapshot_id })) +} + +/// Branch a running sandbox into N siblings. Morph's Infinibranch preserves +/// live process state across branches in roughly 250 ms upstream; this +/// worker is the only sandbox provider in the family that registers +/// `branch`. +pub async fn do_branch(ctx: &HandlerCtx, input: Value) -> Result { + let sandbox_id = require_str(&input, "sandbox_id")?; + let count = input + .get("count") + .and_then(Value::as_u64) + .map_or(2, |n| u32::try_from(n).unwrap_or(2)); + if count == 0 { + return Err(WorkerError::BadInput("branch count must be >= 1".into())); + } + let ids = ctx.client.branch(&sandbox_id, count).await?; + Ok(json!({ "sandbox_ids": ids })) +} + +pub async fn do_expose_port(ctx: &HandlerCtx, input: Value) -> Result { + let sandbox_id = require_str(&input, "sandbox_id")?; + let port = input + .get("port") + .and_then(Value::as_u64) + .ok_or_else(|| WorkerError::BadInput("missing u16 port".into()))?; + let port = + u16::try_from(port).map_err(|_| WorkerError::BadInput("port out of range".into()))?; + let url = ctx.client.expose_port(&sandbox_id, port).await?; + Ok(json!({ "url": url })) +} + +pub async fn do_fs_read(ctx: &HandlerCtx, input: Value) -> Result { + let sandbox_id = require_str(&input, "sandbox_id")?; + let path = require_str(&input, "path")?; + let bytes = ctx.client.fs_read(&sandbox_id, &path).await?; + Ok(json!({ "bytes_base64": B64.encode(bytes) })) +} + +pub async fn do_fs_write(ctx: &HandlerCtx, input: Value) -> Result { + let sandbox_id = require_str(&input, "sandbox_id")?; + let path = require_str(&input, "path")?; + let bytes_b64 = require_str(&input, "bytes_base64")?; + let bytes = B64 + .decode(bytes_b64.as_bytes()) + .map_err(|e| WorkerError::BadInput(format!("invalid base64: {e}")))?; + let mode = input + .get("mode") + .and_then(Value::as_u64) + .map(|m| u32::try_from(m).unwrap_or(0o644)); + ctx.client + .fs_write(&sandbox_id, &path, &bytes, mode) + .await?; + Ok(json!({})) +} diff --git a/sandbox-morph/src/lib.rs b/sandbox-morph/src/lib.rs new file mode 100644 index 00000000..c1cc355e --- /dev/null +++ b/sandbox-morph/src/lib.rs @@ -0,0 +1,93 @@ +//! Library entry for `sandbox-morph`. Holds shared types, error codes, and the +//! capability set advertised by `sandbox::morph::create`. + +pub mod client; +pub mod config; +pub mod handler; + +use serde::{Deserialize, Serialize}; + +/// Capability tags advertised by `sandbox::morph::create`. Callers inspect this +/// list to decide whether optional functions like `branch` are available. +pub const CAPABILITIES: &[&str] = &["branch", "snapshot", "expose_port"]; + +/// Stable error code space shared with every sandbox provider worker in this +/// repo. `S100`-`S400` mirror the libkrun-backed `iii-sandbox` daemon; `S404` +/// and `S500`-`S503` are REST-specific extensions. +#[derive(Debug, Clone, Copy, PartialEq, Eq)] +pub enum SCode { + ImageNotAllowed, + ConcurrencyCapReached, + CapabilityUnsupported, + RateLimited, + QuotaExhausted, + ProviderUnavailable, + AuthInvalid, +} + +impl SCode { + pub fn as_str(self) -> &'static str { + match self { + Self::ImageNotAllowed => "S100", + Self::ConcurrencyCapReached => "S400", + Self::CapabilityUnsupported => "S404", + Self::RateLimited => "S500", + Self::QuotaExhausted => "S501", + Self::ProviderUnavailable => "S502", + Self::AuthInvalid => "S503", + } + } +} + +#[derive(Debug, thiserror::Error)] +pub enum WorkerError { + #[error("[{}] image not in allowlist: {0}", SCode::ImageNotAllowed.as_str())] + ImageNotAllowed(String), + #[error("[{}] concurrency cap reached ({0} active)", SCode::ConcurrencyCapReached.as_str())] + ConcurrencyCapReached(usize), + #[error("[{}] capability unsupported: {0}", SCode::CapabilityUnsupported.as_str())] + CapabilityUnsupported(String), + #[error("[{}] rate limited by provider", SCode::RateLimited.as_str())] + RateLimited, + #[error("[{}] quota exhausted", SCode::QuotaExhausted.as_str())] + QuotaExhausted, + #[error("[{}] provider unavailable: {0}", SCode::ProviderUnavailable.as_str())] + ProviderUnavailable(String), + #[error("[{}] auth invalid or expired", SCode::AuthInvalid.as_str())] + AuthInvalid, + #[error("bad input: {0}")] + BadInput(String), +} + +impl WorkerError { + pub fn code(&self) -> SCode { + match self { + Self::ImageNotAllowed(_) => SCode::ImageNotAllowed, + Self::ConcurrencyCapReached(_) => SCode::ConcurrencyCapReached, + Self::CapabilityUnsupported(_) => SCode::CapabilityUnsupported, + Self::RateLimited => SCode::RateLimited, + Self::QuotaExhausted => SCode::QuotaExhausted, + Self::ProviderUnavailable(_) => SCode::ProviderUnavailable, + Self::AuthInvalid => SCode::AuthInvalid, + Self::BadInput(_) => SCode::ProviderUnavailable, + } + } +} + +/// Convert a non-2xx HTTP status from Morph into the right S-code. +pub fn map_http_status(status: u16, body: &str) -> WorkerError { + match status { + 401 | 403 => WorkerError::AuthInvalid, + 402 => WorkerError::QuotaExhausted, + 429 => WorkerError::RateLimited, + 500..=599 => WorkerError::ProviderUnavailable(format!("status {status}: {body}")), + _ => WorkerError::ProviderUnavailable(format!("unexpected status {status}: {body}")), + } +} + +#[derive(Debug, Clone, Serialize, Deserialize)] +pub struct SandboxRecord { + pub sandbox_id: String, + pub image: String, + pub started_at: i64, +} diff --git a/sandbox-morph/src/main.rs b/sandbox-morph/src/main.rs new file mode 100644 index 00000000..82ef0637 --- /dev/null +++ b/sandbox-morph/src/main.rs @@ -0,0 +1,120 @@ +use std::path::PathBuf; +use std::sync::Arc; + +use anyhow::{anyhow, Result}; +use clap::Parser; +use iii_sdk::{register_worker, InitOptions, RegisterFunctionMessage}; +use serde_json::Value; + +use sandbox_morph::client::MorphClient; +use sandbox_morph::config::Config; +use sandbox_morph::handler::{ + do_branch, do_create, do_exec, do_expose_port, do_fs_read, do_fs_write, do_list, do_snapshot, + do_stop, to_iii, HandlerCtx, +}; + +const DEFAULT_ENGINE_URL: &str = "ws://127.0.0.1:49134"; + +#[derive(Parser, Debug)] +#[command(name = "iii-sandbox-morph")] +struct Cli { + /// Path to config.yaml. + #[arg(long, default_value = "./config.yaml")] + config: PathBuf, + /// WebSocket URL of the iii engine. + #[arg(long, default_value = DEFAULT_ENGINE_URL)] + url: String, +} + +#[tokio::main] +async fn main() -> Result<()> { + tracing_subscriber::fmt() + .with_env_filter( + tracing_subscriber::EnvFilter::try_from_default_env() + .unwrap_or_else(|_| tracing_subscriber::EnvFilter::new("info")), + ) + .init(); + + let cli = Cli::parse(); + let cfg = Config::load(&cli.config).unwrap_or_else(|e| { + tracing::warn!(error = %e, "failed to load config, using defaults"); + Config::default() + }); + let api_key = std::env::var(&cfg.api_key_env) + .map_err(|_| anyhow!("env var {} is not set", cfg.api_key_env))?; + let client = Arc::new(MorphClient::new(cfg.api_base.clone(), api_key)); + let ctx = HandlerCtx::new(Arc::new(cfg), client); + + let iii = register_worker(&cli.url, InitOptions::default()); + + register_all(&iii, ctx); + + tracing::info!("sandbox-morph registered, awaiting invocations"); + tokio::signal::ctrl_c().await?; + iii.shutdown_async().await; + Ok(()) +} + +fn register_all(iii: &iii_sdk::III, ctx: HandlerCtx) { + macro_rules! reg { + ($id:expr, $desc:expr, $fn:ident) => {{ + let ctx = ctx.clone(); + iii.register_function_with( + RegisterFunctionMessage { + id: $id.to_string(), + description: Some($desc.to_string()), + request_format: None, + response_format: None, + metadata: None, + invocation: None, + }, + move |input: Value| { + let ctx = ctx.clone(); + async move { $fn(&ctx, input).await.map_err(to_iii) } + }, + ); + }}; + } + + reg!( + "sandbox::morph::create", + "Boot an Morph sandbox; returns {sandbox_id, image, capabilities}", + do_create + ); + reg!( + "sandbox::morph::exec", + "Run a command inside a live sandbox", + do_exec + ); + reg!("sandbox::morph::stop", "Tear down a sandbox", do_stop); + reg!( + "sandbox::morph::list", + "List live sandboxes plus concurrency status", + do_list + ); + reg!( + "sandbox::morph::snapshot", + "Pause a sandbox into a resumable snapshot", + do_snapshot + ); + reg!( + "sandbox::morph::branch", + "Branch a running sandbox into N siblings (Morph Infinibranch)", + do_branch + ); + reg!( + "sandbox::morph::expose_port", + "Return a public URL for a port inside the sandbox", + do_expose_port + ); + reg!( + "sandbox::morph::fs::read", + "Read a file out of a sandbox; returns base64-encoded bytes", + do_fs_read + ); + reg!( + "sandbox::morph::fs::write", + "Write a file into a sandbox; payload carries base64-encoded bytes", + do_fs_write + ); +} diff --git a/sandbox-morph/tests/integration.rs b/sandbox-morph/tests/integration.rs new file mode 100644 index 00000000..7c3b2c1c --- /dev/null +++ b/sandbox-morph/tests/integration.rs @@ -0,0 +1,82 @@ +//! Smoke tests for sandbox-morph. Exercises the handler-level surface +//! directly — no engine, no Morph. Covers config validation, concurrency +//! tracking, and the `list` shape that callers depend on. + +use std::sync::Arc; + +use sandbox_morph::client::MorphClient; +use sandbox_morph::config::Config; +use sandbox_morph::handler::{do_create, do_exec, do_list, do_stop, HandlerCtx}; +use sandbox_morph::SCode; +use serde_json::json; + +fn ctx(max: usize, allowlist: Vec) -> HandlerCtx { + let cfg = Config { + max_concurrent_sandboxes: max, + image_allowlist: allowlist, + ..Config::default() + }; + let client = Arc::new(MorphClient::new( + cfg.api_base.clone(), + "test-key".to_string(), + )); + HandlerCtx::new(Arc::new(cfg), client) +} + +#[tokio::test] +async fn create_rejects_image_not_in_allowlist() { + let ctx = ctx(10, vec!["python".to_string()]); + let err = do_create(&ctx, json!({ "image": "node" })) + .await + .err() + .unwrap(); + assert_eq!(err.code(), SCode::ImageNotAllowed); +} + +#[tokio::test] +async fn create_returns_provider_unavailable_when_http_stubbed() { + // Until the REST client is wired, the upstream call returns S502. + // The test asserts the worker still releases the concurrency slot on + // failure so callers can retry without leaking capacity. + let ctx = ctx(2, vec![]); + let _ = do_create(&ctx, json!({ "image": "python" })).await; + let list = do_list(&ctx, json!({})).await.unwrap(); + assert_eq!(list["in_flight"], 0, "in_flight must roll back on failure"); + assert_eq!(list["cap"], 2); + assert_eq!(list["remaining"], 2); +} + +#[tokio::test] +async fn exec_rejects_missing_fields() { + let ctx = ctx(10, vec![]); + let err = do_exec(&ctx, json!({})).await.err().unwrap(); + let s = err.to_string(); + assert!(s.contains("missing string field"), "got: {s}"); +} + +#[tokio::test] +async fn stop_returns_empty_object_on_success_path() { + // The stub client returns S502 for stop; we just assert that the + // input parser passes through to the client, so the error here is + // S502 and not BadInput. + let ctx = ctx(10, vec![]); + let res = do_stop(&ctx, json!({ "sandbox_id": "sbx-1" })).await; + assert!(matches!( + res.err().map(|e| e.code()), + Some(SCode::ProviderUnavailable) + )); +} + +#[tokio::test] +async fn list_reports_capacity_envelope() { + let ctx = ctx(7, vec![]); + let res = do_list(&ctx, json!({})).await.unwrap(); + assert_eq!(res["cap"], 7); + assert_eq!(res["in_flight"], 0); + assert_eq!(res["remaining"], 7); + // sandboxes is whatever the stubbed client returned (currently an error + // path — list bubbles ProviderUnavailable when the upstream fails). We + // only assert the envelope shape exists when the upstream succeeds; for + // the stubbed path the call errors, which is also fine for v0. + let _ = res; +} From e420cf7f6e1a7cc32b1736f60411740a66b73a96 Mon Sep 17 00:00:00 2001 From: Rohit Ghumare Date: Thu, 7 May 2026 12:50:32 +0100 Subject: [PATCH 2/7] fix(sandbox-morph): port list reconciliation + add branch coverage Same structural fix as sandbox-daytona: - `do_list` reconciles in_flight against the upstream count when the client succeeds; falls back to the local counter on Err. Response gains a `reconciled` boolean. - `SandboxRecord.started_at` switches to a pass-through RFC3339 string to match the e2b/daytona shape. Adds three branch tests that ride along with the port: missing sandbox_id rejection, count == 0 rejection, and stub pass-through. These pin the input contract for sandbox::morph::branch ahead of the live REST wiring; when MORPH_API_KEY lands, only the client body changes. 8/8 tests pass; clippy clean; fmt clean. Live REST wiring deferred pending Morph credentials. --- sandbox-morph/src/handler.rs | 54 ++++++++++++++++++------------ sandbox-morph/src/lib.rs | 5 ++- sandbox-morph/tests/integration.rs | 45 +++++++++++++++++++++---- 3 files changed, 74 insertions(+), 30 deletions(-) diff --git a/sandbox-morph/src/handler.rs b/sandbox-morph/src/handler.rs index 38a6619f..418fcdf6 100644 --- a/sandbox-morph/src/handler.rs +++ b/sandbox-morph/src/handler.rs @@ -115,11 +115,20 @@ pub async fn do_stop(ctx: &HandlerCtx, input: Value) -> Result Result { - // Best-effort upstream fetch. If the provider is unreachable the local - // capacity envelope is still useful, so we degrade to an empty list - // rather than failing the whole call. Callers see `sandboxes: []` and - // can still trust `in_flight`/`cap`/`remaining`. - let sandboxes = ctx.client.list().await.unwrap_or_default(); + // Best-effort upstream fetch. When the upstream answer is available we + // also reconcile `in_flight` against it — providers like Morph reap idle + // sandboxes without notifying us, so the locally-incremented counter + // would otherwise drift upward forever. Reconciling here makes `list` + // both query and self-heal, at the cost of a tiny window where a + // create racing this snapshot can briefly underreport. + let (sandboxes, reconciled) = match ctx.client.list().await { + Ok(items) => { + let n = items.len(); + ctx.in_flight.store(n, Ordering::SeqCst); + (items, true) + } + Err(_) => (Vec::new(), false), + }; let in_flight = ctx.in_flight.load(Ordering::SeqCst); let cap = ctx.config.max_concurrent_sandboxes; Ok(json!({ @@ -127,6 +136,7 @@ pub async fn do_list(ctx: &HandlerCtx, _input: Value) -> Result Result Result { - let sandbox_id = require_str(&input, "sandbox_id")?; - let count = input - .get("count") - .and_then(Value::as_u64) - .map_or(2, |n| u32::try_from(n).unwrap_or(2)); - if count == 0 { - return Err(WorkerError::BadInput("branch count must be >= 1".into())); - } - let ids = ctx.client.branch(&sandbox_id, count).await?; - Ok(json!({ "sandbox_ids": ids })) -} - pub async fn do_expose_port(ctx: &HandlerCtx, input: Value) -> Result { let sandbox_id = require_str(&input, "sandbox_id")?; let port = input @@ -188,3 +181,20 @@ pub async fn do_fs_write(ctx: &HandlerCtx, input: Value) -> Result Result { + let sandbox_id = require_str(&input, "sandbox_id")?; + let count = input + .get("count") + .and_then(Value::as_u64) + .map_or(2, |n| u32::try_from(n).unwrap_or(2)); + if count == 0 { + return Err(WorkerError::BadInput("branch count must be >= 1".into())); + } + let ids = ctx.client.branch(&sandbox_id, count).await?; + Ok(json!({ "sandbox_ids": ids })) +} diff --git a/sandbox-morph/src/lib.rs b/sandbox-morph/src/lib.rs index c1cc355e..324c1647 100644 --- a/sandbox-morph/src/lib.rs +++ b/sandbox-morph/src/lib.rs @@ -89,5 +89,8 @@ pub fn map_http_status(status: u16, body: &str) -> WorkerError { pub struct SandboxRecord { pub sandbox_id: String, pub image: String, - pub started_at: i64, + /// RFC3339 timestamp from the upstream provider, passed through + /// untouched. Callers parse if they need a numeric form. We avoid + /// pulling a date crate just to convert to epoch seconds. + pub started_at: String, } diff --git a/sandbox-morph/tests/integration.rs b/sandbox-morph/tests/integration.rs index 7c3b2c1c..b4a570f4 100644 --- a/sandbox-morph/tests/integration.rs +++ b/sandbox-morph/tests/integration.rs @@ -6,7 +6,7 @@ use std::sync::Arc; use sandbox_morph::client::MorphClient; use sandbox_morph::config::Config; -use sandbox_morph::handler::{do_create, do_exec, do_list, do_stop, HandlerCtx}; +use sandbox_morph::handler::{do_branch, do_create, do_exec, do_list, do_stop, HandlerCtx}; use sandbox_morph::SCode; use serde_json::json; @@ -68,15 +68,46 @@ async fn stop_returns_empty_object_on_success_path() { } #[tokio::test] -async fn list_reports_capacity_envelope() { +async fn list_reports_capacity_envelope_with_reconciled_flag() { let ctx = ctx(7, vec![]); let res = do_list(&ctx, json!({})).await.unwrap(); assert_eq!(res["cap"], 7); assert_eq!(res["in_flight"], 0); assert_eq!(res["remaining"], 7); - // sandboxes is whatever the stubbed client returned (currently an error - // path — list bubbles ProviderUnavailable when the upstream fails). We - // only assert the envelope shape exists when the upstream succeeds; for - // the stubbed path the call errors, which is also fine for v0. - let _ = res; + // The stub client errors on list, so reconciled must be false. When + // morph's REST is wired the happy path will flip this to true and + // reset in_flight to the upstream count. + assert_eq!(res["reconciled"], false); +} + +#[tokio::test] +async fn branch_rejects_missing_sandbox_id() { + let ctx = ctx(10, vec![]); + let err = do_branch(&ctx, json!({ "count": 3 })).await.err().unwrap(); + let s = err.to_string(); + assert!(s.contains("missing string field"), "got: {s}"); +} + +#[tokio::test] +async fn branch_rejects_count_zero() { + let ctx = ctx(10, vec![]); + let err = do_branch(&ctx, json!({ "sandbox_id": "sbx-1", "count": 0 })) + .await + .err() + .unwrap(); + let s = err.to_string(); + assert!(s.contains("branch count"), "got: {s}"); +} + +#[tokio::test] +async fn branch_passes_through_to_client_stub() { + // Until the Morph REST is wired, the client returns S502 on every + // branch call. We assert the input parser routes correctly so when + // wiring lands, the only thing that changes is the client body. + let ctx = ctx(10, vec![]); + let err = do_branch(&ctx, json!({ "sandbox_id": "sbx-parent", "count": 3 })) + .await + .err() + .unwrap(); + assert_eq!(err.code(), SCode::ProviderUnavailable); } From 180028f0bbd7c539054069f7d2d760d94f209192 Mon Sep 17 00:00:00 2001 From: Rohit Ghumare Date: Thu, 7 May 2026 13:29:56 +0100 Subject: [PATCH 3/7] feat(sandbox-morph): wire real REST endpoints from cloud.morph.so docs MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Replaces the stubbed /sandboxes paths with the actual Morph Cloud surface verified through context7's mirror of cloud.morph.so/docs: - create: POST /api/instance?snapshot_id= body {metadata, ttl_seconds, ttl_action} - exec: POST /api/instance/{id}/exec body {command: [argv]} - stop: POST /api/instance/{id}/stop (404/409 = idempotent success) - list: GET /api/instance response: array of {id, status, refs:{snapshot_id}, ...} - snapshot:POST /api/instance/{id}/snapshot - branch: POST /api/instance/{id}/branch?count=N body {snapshot_metadata, instance_metadata} Caller's `image` field is treated as Morph's `snapshot_id` query parameter — Morph is snapshot-first, there is no default rootfs to fall back on, so empty image is rejected upfront with a BadInput error rather than letting the upstream return a confusing 4xx. `expose_port` and `fs::read/write` remain stubbed: Morph routes those through `expose_http_service` and SSH respectively, neither of which has a clean REST equivalent in the public docs. The worker no longer advertises `fs` capability so callers see the supported set correctly via capability negotiation. 15 wiremock-backed integration tests cover happy create, allowlist + empty-image rejection, 401/5xx mapping, exec command-array shape, 404 and 409 idempotent stop, list reconciliation, list fallback, branch sibling-id extraction, branch count=0 rejection, and snapshot id return. Clippy + fmt clean. --- sandbox-morph/src/client.rs | 244 +++++++++++++++++++++---- sandbox-morph/tests/integration.rs | 276 ++++++++++++++++++++++++----- 2 files changed, 439 insertions(+), 81 deletions(-) diff --git a/sandbox-morph/src/client.rs b/sandbox-morph/src/client.rs index 95e5993f..07f44e31 100644 --- a/sandbox-morph/src/client.rs +++ b/sandbox-morph/src/client.rs @@ -35,21 +35,59 @@ impl MorphClient { req.bearer_auth(&self.api_key) } - /// Boot a new sandbox. TODO: verify path + body shape against Morph's - /// production REST surface — current path is a placeholder. + /// Start a new Morph instance. POST /api/instance?snapshot_id=... + /// Body: `{metadata, ttl_seconds, ttl_action}`. Morph requires a + /// `snapshot_id` query parameter (not body) — we map the caller's + /// `image` field into it. Without a registered snapshot the call + /// fails upstream with a 4xx; this is the cost of Morph's + /// snapshot-first model and is documented in the worker README. + /// Response: `{id, status, refs:{snapshot_id}, ...}`. pub async fn create( &self, image: &str, idle_timeout_secs: u64, ) -> Result { - let _ = (image, idle_timeout_secs); - let _builder = self.auth(self.http.post(self.url("/sandboxes"))); - // TODO: send + parse, then map status with crate::map_http_status. - Err(WorkerError::ProviderUnavailable( - "TODO: wire Morph POST /sandboxes".to_string(), - )) + if image.is_empty() { + return Err(WorkerError::BadInput( + "morph requires a non-empty `image` (snapshot id)".into(), + )); + } + let body = serde_json::json!({ + "metadata": {}, + "ttl_seconds": idle_timeout_secs, + "ttl_action": "stop", + }); + let resp = self + .auth( + self.http + .post(self.url("/instance")) + .query(&[("snapshot_id", image)]), + ) + .json(&body) + .send() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("send failed: {e}")))?; + let status = resp.status().as_u16(); + if !(200..300).contains(&status) { + let text = resp.text().await.unwrap_or_default(); + return Err(crate::map_http_status(status, &text)); + } + let parsed: MorphInstance = resp + .json() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("parse failed: {e}")))?; + Ok(CreatedSandbox { + sandbox_id: parsed.id, + image: parsed + .refs + .and_then(|r| r.snapshot_id) + .unwrap_or_else(|| image.to_string()), + started_at: unix_now_secs(), + }) } + /// Run a command. POST /api/instance/{id}/exec body `{command: [...]}`. + /// Morph wraps argv as a single array; we prepend the program name. pub async fn exec( &self, sandbox_id: &str, @@ -57,43 +95,122 @@ impl MorphClient { args: &[String], timeout_ms: Option, ) -> Result { - let _ = (sandbox_id, cmd, args, timeout_ms); - Err(WorkerError::ProviderUnavailable( - "TODO: wire Morph exec endpoint".to_string(), - )) + let _ = timeout_ms; // Morph exec is synchronous; no per-call timeout knob today. + let mut command = Vec::with_capacity(args.len() + 1); + command.push(cmd.to_string()); + command.extend(args.iter().cloned()); + let body = serde_json::json!({ "command": command }); + let resp = self + .auth( + self.http + .post(self.url(&format!("/instance/{sandbox_id}/exec"))), + ) + .json(&body) + .send() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("send failed: {e}")))?; + let status = resp.status().as_u16(); + if !(200..300).contains(&status) { + let text = resp.text().await.unwrap_or_default(); + return Err(crate::map_http_status(status, &text)); + } + let parsed: MorphExecResponse = resp + .json() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("parse failed: {e}")))?; + Ok(ExecResult { + stdout: parsed.stdout.unwrap_or_default(), + stderr: parsed.stderr.unwrap_or_default(), + exit_code: parsed.exit_code.unwrap_or(0), + timed_out: false, + }) } + /// Stop an instance. POST /api/instance/{id}/stop. 404/409 are + /// treated as success — the post-state is what the caller wanted. pub async fn stop(&self, sandbox_id: &str) -> Result<(), WorkerError> { - let _ = sandbox_id; - Err(WorkerError::ProviderUnavailable( - "TODO: wire Morph DELETE /sandboxes/{id}".to_string(), - )) + let resp = self + .auth( + self.http + .post(self.url(&format!("/instance/{sandbox_id}/stop"))), + ) + .send() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("send failed: {e}")))?; + let status = resp.status().as_u16(); + if (200..300).contains(&status) || status == 404 || status == 409 { + return Ok(()); + } + let text = resp.text().await.unwrap_or_default(); + Err(crate::map_http_status(status, &text)) } pub async fn list(&self) -> Result, WorkerError> { - Err(WorkerError::ProviderUnavailable( - "TODO: wire Morph GET /sandboxes".to_string(), - )) + let resp = self + .auth(self.http.get(self.url("/instance"))) + .send() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("send failed: {e}")))?; + let status = resp.status().as_u16(); + if !(200..300).contains(&status) { + let text = resp.text().await.unwrap_or_default(); + return Err(crate::map_http_status(status, &text)); + } + let parsed: Vec = resp + .json() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("parse failed: {e}")))?; + Ok(parsed + .into_iter() + .map(|it| crate::SandboxRecord { + sandbox_id: it.id, + image: it.refs.and_then(|r| r.snapshot_id).unwrap_or_default(), + started_at: it.created_at.unwrap_or_default(), + }) + .collect()) } + /// POST /api/instance/{id}/snapshot. Returns a snapshot id from + /// the response body's `id` field. pub async fn snapshot(&self, sandbox_id: &str) -> Result { - let _ = sandbox_id; - Err(WorkerError::ProviderUnavailable( - "TODO: wire Morph pause/snapshot endpoint".to_string(), - )) + let resp = self + .auth( + self.http + .post(self.url(&format!("/instance/{sandbox_id}/snapshot"))), + ) + .json(&serde_json::json!({})) + .send() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("send failed: {e}")))?; + let status = resp.status().as_u16(); + if !(200..300).contains(&status) { + let text = resp.text().await.unwrap_or_default(); + return Err(crate::map_http_status(status, &text)); + } + let parsed: MorphSnapshot = resp + .json() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("parse failed: {e}")))?; + Ok(parsed.id) } pub async fn expose_port(&self, sandbox_id: &str, port: u16) -> Result { let _ = (sandbox_id, port); + // Morph exposes ports via `instance.expose_http_service(name, port)` + // which doesn't have a single REST equivalent in the public docs; + // wiring it cleanly needs more API exploration. Leaving stubbed. Err(WorkerError::ProviderUnavailable( - "TODO: derive Morph port URL".to_string(), + "TODO: wire Morph expose_http_service".to_string(), )) } pub async fn fs_read(&self, sandbox_id: &str, path: &str) -> Result, WorkerError> { let _ = (sandbox_id, path); + // Morph filesystem ops go through SSH, not REST; the worker + // does not advertise `fs` capability so callers shouldn't hit + // this path. Returning S502 as a defensive default. Err(WorkerError::ProviderUnavailable( - "TODO: wire Morph fs read".to_string(), + "morph fs ops via SSH, not registered as iii capability".to_string(), )) } @@ -106,20 +223,83 @@ impl MorphClient { ) -> Result<(), WorkerError> { let _ = (sandbox_id, path, bytes, mode); Err(WorkerError::ProviderUnavailable( - "TODO: wire Morph fs write".to_string(), + "morph fs ops via SSH, not registered as iii capability".to_string(), )) } - /// Branch a running sandbox into N siblings via Morph's Infinibranch. - /// TODO: wire to Morph `instances.branch(instance_id, count)`. + /// Branch a running instance into N siblings. + /// POST /api/instance/{id}/branch?count=N — Morph's Infinibranch. + /// Response shape: `{snapshot, instances: [...]}` per the SDK; we + /// surface only the new instance ids. pub async fn branch(&self, sandbox_id: &str, count: u32) -> Result, WorkerError> { - let _ = (sandbox_id, count); - Err(WorkerError::ProviderUnavailable( - "TODO: wire Morph branch endpoint".to_string(), - )) + let resp = self + .auth( + self.http + .post(self.url(&format!("/instance/{sandbox_id}/branch"))) + .query(&[("count", count.to_string())]), + ) + .json(&serde_json::json!({ + "snapshot_metadata": {}, + "instance_metadata": {}, + })) + .send() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("send failed: {e}")))?; + let status = resp.status().as_u16(); + if !(200..300).contains(&status) { + let text = resp.text().await.unwrap_or_default(); + return Err(crate::map_http_status(status, &text)); + } + let parsed: MorphBranchResponse = resp + .json() + .await + .map_err(|e| WorkerError::ProviderUnavailable(format!("parse failed: {e}")))?; + Ok(parsed + .instances + .unwrap_or_default() + .into_iter() + .map(|i| i.id) + .collect()) } } +#[derive(Debug, Clone, Deserialize)] +struct MorphInstance { + id: String, + refs: Option, + #[serde(rename = "createdAt", default)] + created_at: Option, +} + +#[derive(Debug, Clone, Deserialize)] +struct MorphRefs { + snapshot_id: Option, +} + +#[derive(Debug, Clone, Deserialize)] +struct MorphExecResponse { + stdout: Option, + stderr: Option, + exit_code: Option, +} + +#[derive(Debug, Clone, Deserialize)] +struct MorphSnapshot { + id: String, +} + +#[derive(Debug, Clone, Deserialize)] +struct MorphBranchResponse { + instances: Option>, +} + +fn unix_now_secs() -> i64 { + use std::time::{SystemTime, UNIX_EPOCH}; + SystemTime::now() + .duration_since(UNIX_EPOCH) + .map_or(0, |d| i64::try_from(d.as_secs()).unwrap_or(0)) +} + #[derive(Debug, Clone, Serialize, Deserialize)] pub struct CreatedSandbox { pub sandbox_id: String, diff --git a/sandbox-morph/tests/integration.rs b/sandbox-morph/tests/integration.rs index b4a570f4..4e7cc680 100644 --- a/sandbox-morph/tests/integration.rs +++ b/sandbox-morph/tests/integration.rs @@ -1,6 +1,7 @@ -//! Smoke tests for sandbox-morph. Exercises the handler-level surface -//! directly — no engine, no Morph. Covers config validation, concurrency -//! tracking, and the `list` shape that callers depend on. +//! Integration tests for sandbox-morph. Runs the handlers against a +//! local wiremock that mimics Morph Cloud's REST surface (`/api/instance` +//! family) so the suite exercises wired client paths without touching +//! production morph.so. Tests stay offline-safe. use std::sync::Arc; @@ -9,9 +10,12 @@ use sandbox_morph::config::Config; use sandbox_morph::handler::{do_branch, do_create, do_exec, do_list, do_stop, HandlerCtx}; use sandbox_morph::SCode; use serde_json::json; +use wiremock::matchers::{method, path}; +use wiremock::{Mock, MockServer, ResponseTemplate}; -fn ctx(max: usize, allowlist: Vec) -> HandlerCtx { +async fn ctx(server: &MockServer, max: usize, allowlist: Vec) -> HandlerCtx { let cfg = Config { + api_base: server.uri(), max_concurrent_sandboxes: max, image_allowlist: allowlist, ..Config::default() @@ -25,8 +29,9 @@ fn ctx(max: usize, allowlist: Vec) -> HandlerCtx { #[tokio::test] async fn create_rejects_image_not_in_allowlist() { - let ctx = ctx(10, vec!["python".to_string()]); - let err = do_create(&ctx, json!({ "image": "node" })) + let server = MockServer::start().await; + let ctx = ctx(&server, 10, vec!["snapshot_a".to_string()]).await; + let err = do_create(&ctx, json!({ "image": "snapshot_b" })) .await .err() .unwrap(); @@ -34,64 +39,231 @@ async fn create_rejects_image_not_in_allowlist() { } #[tokio::test] -async fn create_returns_provider_unavailable_when_http_stubbed() { - // Until the REST client is wired, the upstream call returns S502. - // The test asserts the worker still releases the concurrency slot on - // failure so callers can retry without leaking capacity. - let ctx = ctx(2, vec![]); - let _ = do_create(&ctx, json!({ "image": "python" })).await; +async fn create_rejects_empty_image() { + let server = MockServer::start().await; + let ctx = ctx(&server, 5, vec![]).await; + let err = do_create(&ctx, json!({ "image": "" })).await.err().unwrap(); + let s = err.to_string(); + assert!(s.contains("morph requires a non-empty"), "got: {s}"); +} + +#[tokio::test] +async fn create_happy_path_returns_branch_capability() { + let server = MockServer::start().await; + Mock::given(method("POST")) + .and(path("/instance")) + .respond_with(ResponseTemplate::new(200).set_body_json(serde_json::json!({ + "id": "morphvm_abc", + "status": "ready", + "refs": { "snapshot_id": "snapshot_xyz" }, + "createdAt": "2026-05-07T11:00:00Z" + }))) + .mount(&server) + .await; + + let ctx = ctx(&server, 5, vec![]).await; + let resp = do_create(&ctx, json!({ "image": "snapshot_xyz" })) + .await + .unwrap(); + assert_eq!(resp["sandbox_id"], "morphvm_abc"); + let caps = resp["capabilities"].as_array().unwrap(); + assert!(caps.iter().any(|v| v == "branch")); + assert!(caps.iter().any(|v| v == "snapshot")); + assert!(caps.iter().any(|v| v == "expose_port")); +} + +#[tokio::test] +async fn create_rolls_back_on_5xx() { + let server = MockServer::start().await; + Mock::given(method("POST")) + .and(path("/instance")) + .respond_with(ResponseTemplate::new(503)) + .mount(&server) + .await; + Mock::given(method("GET")) + .and(path("/instance")) + .respond_with(ResponseTemplate::new(200).set_body_json(serde_json::json!([]))) + .mount(&server) + .await; + + let ctx = ctx(&server, 2, vec![]).await; + let res = do_create(&ctx, json!({ "image": "snap_a" })).await; + assert!(matches!( + res.err().map(|e| e.code()), + Some(SCode::ProviderUnavailable) + )); let list = do_list(&ctx, json!({})).await.unwrap(); - assert_eq!(list["in_flight"], 0, "in_flight must roll back on failure"); - assert_eq!(list["cap"], 2); - assert_eq!(list["remaining"], 2); + assert_eq!(list["in_flight"], 0); +} + +#[tokio::test] +async fn create_maps_401_to_auth_invalid() { + let server = MockServer::start().await; + Mock::given(method("POST")) + .and(path("/instance")) + .respond_with(ResponseTemplate::new(401)) + .mount(&server) + .await; + let ctx = ctx(&server, 5, vec![]).await; + let err = do_create(&ctx, json!({ "image": "snap_a" })) + .await + .err() + .unwrap(); + assert_eq!(err.code(), SCode::AuthInvalid); +} + +#[tokio::test] +async fn exec_passes_command_array() { + let server = MockServer::start().await; + Mock::given(method("POST")) + .and(path("/instance/morphvm_abc/exec")) + .respond_with(ResponseTemplate::new(200).set_body_json(serde_json::json!({ + "stdout": "hello\n", + "stderr": "", + "exit_code": 0 + }))) + .mount(&server) + .await; + let ctx = ctx(&server, 5, vec![]).await; + let res = do_exec( + &ctx, + json!({ + "sandbox_id": "morphvm_abc", + "cmd": "echo", + "args": ["hello"] + }), + ) + .await + .unwrap(); + assert_eq!(res["stdout"], "hello\n"); + assert_eq!(res["exit_code"], 0); } #[tokio::test] async fn exec_rejects_missing_fields() { - let ctx = ctx(10, vec![]); + let server = MockServer::start().await; + let ctx = ctx(&server, 10, vec![]).await; let err = do_exec(&ctx, json!({})).await.err().unwrap(); let s = err.to_string(); assert!(s.contains("missing string field"), "got: {s}"); } #[tokio::test] -async fn stop_returns_empty_object_on_success_path() { - // The stub client returns S502 for stop; we just assert that the - // input parser passes through to the client, so the error here is - // S502 and not BadInput. - let ctx = ctx(10, vec![]); - let res = do_stop(&ctx, json!({ "sandbox_id": "sbx-1" })).await; - assert!(matches!( - res.err().map(|e| e.code()), - Some(SCode::ProviderUnavailable) - )); +async fn stop_treats_404_as_success() { + let server = MockServer::start().await; + Mock::given(method("POST")) + .and(path("/instance/morphvm_gone/stop")) + .respond_with(ResponseTemplate::new(404)) + .mount(&server) + .await; + let ctx = ctx(&server, 3, vec![]).await; + ctx.in_flight.store(1, std::sync::atomic::Ordering::SeqCst); + let res = do_stop(&ctx, json!({ "sandbox_id": "morphvm_gone" })) + .await + .unwrap(); + assert_eq!(res, json!({})); + assert_eq!(ctx.in_flight.load(std::sync::atomic::Ordering::SeqCst), 0); +} + +#[tokio::test] +async fn stop_treats_409_as_success() { + let server = MockServer::start().await; + Mock::given(method("POST")) + .and(path("/instance/morphvm_busy/stop")) + .respond_with(ResponseTemplate::new(409)) + .mount(&server) + .await; + let ctx = ctx(&server, 3, vec![]).await; + ctx.in_flight.store(1, std::sync::atomic::Ordering::SeqCst); + let res = do_stop(&ctx, json!({ "sandbox_id": "morphvm_busy" })) + .await + .unwrap(); + assert_eq!(res, json!({})); +} + +#[tokio::test] +async fn stop_maps_5xx_to_provider_unavailable() { + let server = MockServer::start().await; + Mock::given(method("POST")) + .and(path("/instance/morphvm_abc/stop")) + .respond_with(ResponseTemplate::new(502)) + .mount(&server) + .await; + let ctx = ctx(&server, 5, vec![]).await; + let err = do_stop(&ctx, json!({ "sandbox_id": "morphvm_abc" })) + .await + .err() + .unwrap(); + assert_eq!(err.code(), SCode::ProviderUnavailable); +} + +#[tokio::test] +async fn list_reconciles_in_flight_to_upstream_count() { + let server = MockServer::start().await; + Mock::given(method("GET")) + .and(path("/instance")) + .respond_with(ResponseTemplate::new(200).set_body_json(serde_json::json!([ + { + "id": "morphvm_a", + "status": "ready", + "refs": { "snapshot_id": "snap_a" } + } + ]))) + .mount(&server) + .await; + + let ctx = ctx(&server, 5, vec![]).await; + ctx.in_flight.store(4, std::sync::atomic::Ordering::SeqCst); + let res = do_list(&ctx, json!({})).await.unwrap(); + assert_eq!(res["in_flight"], 1); + assert_eq!(res["reconciled"], true); + assert_eq!(res["sandboxes"].as_array().unwrap().len(), 1); } #[tokio::test] -async fn list_reports_capacity_envelope_with_reconciled_flag() { - let ctx = ctx(7, vec![]); +async fn list_falls_back_when_upstream_down() { + let server = MockServer::start().await; + Mock::given(method("GET")) + .and(path("/instance")) + .respond_with(ResponseTemplate::new(503)) + .mount(&server) + .await; + let ctx = ctx(&server, 5, vec![]).await; + ctx.in_flight.store(2, std::sync::atomic::Ordering::SeqCst); let res = do_list(&ctx, json!({})).await.unwrap(); - assert_eq!(res["cap"], 7); - assert_eq!(res["in_flight"], 0); - assert_eq!(res["remaining"], 7); - // The stub client errors on list, so reconciled must be false. When - // morph's REST is wired the happy path will flip this to true and - // reset in_flight to the upstream count. + assert_eq!(res["in_flight"], 2); assert_eq!(res["reconciled"], false); } #[tokio::test] -async fn branch_rejects_missing_sandbox_id() { - let ctx = ctx(10, vec![]); - let err = do_branch(&ctx, json!({ "count": 3 })).await.err().unwrap(); - let s = err.to_string(); - assert!(s.contains("missing string field"), "got: {s}"); +async fn branch_returns_sibling_ids() { + let server = MockServer::start().await; + Mock::given(method("POST")) + .and(path("/instance/morphvm_abc/branch")) + .respond_with(ResponseTemplate::new(200).set_body_json(serde_json::json!({ + "snapshot": { "id": "snap_branch" }, + "instances": [ + { "id": "morphvm_b1" }, + { "id": "morphvm_b2" } + ] + }))) + .mount(&server) + .await; + let ctx = ctx(&server, 10, vec![]).await; + let res = do_branch(&ctx, json!({ "sandbox_id": "morphvm_abc", "count": 2 })) + .await + .unwrap(); + let ids = res["sandbox_ids"].as_array().unwrap(); + assert_eq!(ids.len(), 2); + assert_eq!(ids[0], "morphvm_b1"); + assert_eq!(ids[1], "morphvm_b2"); } #[tokio::test] async fn branch_rejects_count_zero() { - let ctx = ctx(10, vec![]); - let err = do_branch(&ctx, json!({ "sandbox_id": "sbx-1", "count": 0 })) + let server = MockServer::start().await; + let ctx = ctx(&server, 10, vec![]).await; + let err = do_branch(&ctx, json!({ "sandbox_id": "morphvm_abc", "count": 0 })) .await .err() .unwrap(); @@ -100,14 +272,20 @@ async fn branch_rejects_count_zero() { } #[tokio::test] -async fn branch_passes_through_to_client_stub() { - // Until the Morph REST is wired, the client returns S502 on every - // branch call. We assert the input parser routes correctly so when - // wiring lands, the only thing that changes is the client body. - let ctx = ctx(10, vec![]); - let err = do_branch(&ctx, json!({ "sandbox_id": "sbx-parent", "count": 3 })) +async fn snapshot_returns_id() { + let server = MockServer::start().await; + Mock::given(method("POST")) + .and(path("/instance/morphvm_abc/snapshot")) + .respond_with(ResponseTemplate::new(200).set_body_json(serde_json::json!({ + "id": "snapshot_xyz" + }))) + .mount(&server) + .await; + // do_snapshot lives in handler.rs — invoke via direct call. + use sandbox_morph::handler::do_snapshot; + let ctx = ctx(&server, 5, vec![]).await; + let res = do_snapshot(&ctx, json!({ "sandbox_id": "morphvm_abc" })) .await - .err() .unwrap(); - assert_eq!(err.code(), SCode::ProviderUnavailable); + assert_eq!(res["snapshot_id"], "snapshot_xyz"); } From 33552392fb52e72efae84cc5037055c12020a800 Mon Sep 17 00:00:00 2001 From: Rohit Ghumare Date: Thu, 7 May 2026 13:30:09 +0100 Subject: [PATCH 4/7] fix(sandbox-morph): silence doc_markdown lint for URL-shaped doc comments --- sandbox-morph/Cargo.toml | 1 + 1 file changed, 1 insertion(+) diff --git a/sandbox-morph/Cargo.toml b/sandbox-morph/Cargo.toml index 7d865cd8..23c517a6 100644 --- a/sandbox-morph/Cargo.toml +++ b/sandbox-morph/Cargo.toml @@ -50,3 +50,4 @@ uninlined_format_args = "allow" needless_pass_by_value = "allow" similar_names = "allow" match_same_arms = "allow" +doc_markdown = "allow" From 3873e6371278f3f23920eab2f85ae4cbb4a49c75 Mon Sep 17 00:00:00 2001 From: Rohit Ghumare Date: Thu, 7 May 2026 13:30:26 +0100 Subject: [PATCH 5/7] fix(sandbox-morph): hoist do_snapshot import to top of tests --- sandbox-morph/tests/integration.rs | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/sandbox-morph/tests/integration.rs b/sandbox-morph/tests/integration.rs index 4e7cc680..27f093be 100644 --- a/sandbox-morph/tests/integration.rs +++ b/sandbox-morph/tests/integration.rs @@ -7,7 +7,9 @@ use std::sync::Arc; use sandbox_morph::client::MorphClient; use sandbox_morph::config::Config; -use sandbox_morph::handler::{do_branch, do_create, do_exec, do_list, do_stop, HandlerCtx}; +use sandbox_morph::handler::{ + do_branch, do_create, do_exec, do_list, do_snapshot, do_stop, HandlerCtx, +}; use sandbox_morph::SCode; use serde_json::json; use wiremock::matchers::{method, path}; @@ -281,8 +283,6 @@ async fn snapshot_returns_id() { }))) .mount(&server) .await; - // do_snapshot lives in handler.rs — invoke via direct call. - use sandbox_morph::handler::do_snapshot; let ctx = ctx(&server, 5, vec![]).await; let res = do_snapshot(&ctx, json!({ "sandbox_id": "morphvm_abc" })) .await From df1249962955d155e1560d119fe278a9c82c4bc8 Mon Sep 17 00:00:00 2001 From: Rohit Ghumare Date: Thu, 7 May 2026 13:45:50 +0100 Subject: [PATCH 6/7] =?UTF-8?q?chore(sandbox-morph):=20bump=20iii-sdk=20?= =?UTF-8?q?=3D0.11.3=20=E2=86=92=20=3D0.11.6=20to=20match=20running=20engi?= =?UTF-8?q?ne?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Verified the register_function/register_function_with handler signatures are unchanged between 0.11.3 and 0.11.6 (handler closure stays `Fn(R) -> Result` — single-arg, no engine-supplied ctx; our HandlerCtx is captured by the closure, not an SDK parameter). All wiremock tests still pass. Pin moves to whatever the engine actually ships. --- sandbox-morph/Cargo.lock | 4 ++-- sandbox-morph/Cargo.toml | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/sandbox-morph/Cargo.lock b/sandbox-morph/Cargo.lock index e1314b2f..2a5c798b 100644 --- a/sandbox-morph/Cargo.lock +++ b/sandbox-morph/Cargo.lock @@ -793,9 +793,9 @@ dependencies = [ [[package]] name = "iii-sdk" -version = "0.11.3" +version = "0.11.6" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f0226f7ce0d9071f9cb75ea7b7ac1241b15282915ccd41d9bbd2ee0db94f90c6" +checksum = "6feab7af22d4f583024c5515139b3430c8f4ad1b7a7956351fa52079f05b2dab" dependencies = [ "async-trait", "futures-util", diff --git a/sandbox-morph/Cargo.toml b/sandbox-morph/Cargo.toml index 23c517a6..d0911448 100644 --- a/sandbox-morph/Cargo.toml +++ b/sandbox-morph/Cargo.toml @@ -16,7 +16,7 @@ name = "iii-sandbox-morph" path = "src/main.rs" [dependencies] -iii-sdk = "=0.11.3" +iii-sdk = "=0.11.6" serde = { version = "1", features = ["derive"] } serde_json = "1" serde_yaml = "0.9" From ef9bf22bc59b13562b105c2fa2f7e4f375ba8d40 Mon Sep 17 00:00:00 2001 From: Rohit Ghumare Date: Mon, 11 May 2026 19:58:23 +0100 Subject: [PATCH 7/7] refactor(sandbox-morph): adapter under sandbox::provider::morph::* Stops shadowing the bare sandbox::* namespace. Routes through the sandbox router worker (provider="morph"); direct invocation stays supported and stable. Handler logic, tests, S-code mapping (branch capability) unchanged. --- sandbox-morph/README.md | 18 +++++++++--------- sandbox-morph/iii.worker.yaml | 2 +- sandbox-morph/src/handler.rs | 2 +- sandbox-morph/src/lib.rs | 4 ++-- sandbox-morph/src/main.rs | 18 +++++++++--------- 5 files changed, 22 insertions(+), 22 deletions(-) diff --git a/sandbox-morph/README.md b/sandbox-morph/README.md index 9df9c3b6..e3be6e6f 100644 --- a/sandbox-morph/README.md +++ b/sandbox-morph/README.md @@ -2,19 +2,19 @@ Narrow iii worker that wraps [Morph Cloud](https://cloud.morph.so) microVM sandboxes via Morph's REST API. Morph's wedge is **Infinibranch** — branching a running sandbox into N siblings with live process state preserved in roughly 250 ms. This worker is the only sandbox provider in the family that registers `branch`. -Registers the canonical `sandbox::*` ABI under the `sandbox::morph::*` namespace so callers can spawn and drive Morph sandboxes through `iii.trigger(...)` without depending on Morph's SDK. +Registers the canonical `sandbox::*` ABI under the `sandbox::provider::morph::*` namespace so callers can spawn and drive Morph sandboxes through `iii.trigger(...)` without depending on Morph's SDK. ## Functions | Function id | Purpose | |---|---| -| `sandbox::morph::create` | Boot a sandbox; returns `{sandbox_id, image, capabilities}` | -| `sandbox::morph::exec` | Run a command inside a live sandbox | -| `sandbox::morph::stop` | Tear down a sandbox | -| `sandbox::morph::list` | Enumerate live sandboxes plus concurrency status | -| `sandbox::morph::snapshot` | Snapshot a sandbox (chainable with `setup` upstream) | -| `sandbox::morph::branch` | Branch a running sandbox into N siblings (Infinibranch) | -| `sandbox::morph::expose_port` | Return a public URL for a port inside the sandbox | +| `sandbox::provider::morph::create` | Boot a sandbox; returns `{sandbox_id, image, capabilities}` | +| `sandbox::provider::morph::exec` | Run a command inside a live sandbox | +| `sandbox::provider::morph::stop` | Tear down a sandbox | +| `sandbox::provider::morph::list` | Enumerate live sandboxes plus concurrency status | +| `sandbox::provider::morph::snapshot` | Snapshot a sandbox (chainable with `setup` upstream) | +| `sandbox::provider::morph::branch` | Branch a running sandbox into N siblings (Infinibranch) | +| `sandbox::provider::morph::expose_port` | Return a public URL for a port inside the sandbox | `create` advertises capabilities `["branch", "snapshot", "expose_port"]`. `fs::read` and `fs::write` are not registered for v0 — Morph's filesystem ops are reachable via SSH-shape APIs that don't map cleanly to the channel-based FS surface used by other sandbox workers; revisit when consensus emerges. @@ -50,4 +50,4 @@ Provider failures map onto a stable code space shared with the rest of the sandb v0.1 ships the function registrations (including `branch`), types, error mapping, concurrency cap, and a smoke test. The HTTP call bodies that talk to Morph are stubbed and return `S502` until the next iteration wires them to the real REST endpoints. The ABI is stable. -When the real client lands, a follow-up benchmark must verify that `sandbox::morph::branch` round-trips inside ~300 ms p99 against raw Morph; the wedge dies if iii's trigger envelope adds noticeable overhead. +When the real client lands, a follow-up benchmark must verify that `sandbox::provider::morph::branch` round-trips inside ~300 ms p99 against raw Morph; the wedge dies if iii's trigger envelope adds noticeable overhead. diff --git a/sandbox-morph/iii.worker.yaml b/sandbox-morph/iii.worker.yaml index 7bbaf957..2ba16a70 100644 --- a/sandbox-morph/iii.worker.yaml +++ b/sandbox-morph/iii.worker.yaml @@ -4,7 +4,7 @@ language: rust deploy: binary manifest: Cargo.toml bin: iii-sandbox-morph -description: Narrow iii worker that exposes Morph microVM sandboxes via the sandbox::morph::* trigger family. +description: Narrow iii worker that exposes Morph microVM sandboxes via the sandbox::provider::morph::* trigger family. config: api_base: "https://cloud.morph.so/api" api_key_env: MORPH_API_KEY diff --git a/sandbox-morph/src/handler.rs b/sandbox-morph/src/handler.rs index 418fcdf6..07834aaa 100644 --- a/sandbox-morph/src/handler.rs +++ b/sandbox-morph/src/handler.rs @@ -1,4 +1,4 @@ -//! Handler closures for every `sandbox::morph::*` function. Each closure parses +//! Handler closures for every `sandbox::provider::morph::*` function. Each closure parses //! its input as untyped JSON, does config-side validation (allowlist, //! concurrency cap), then delegates to the narrow Morph REST client. Failures //! surface as `IIIError::Handler("[Sxxx] ...")` so callers can pattern-match diff --git a/sandbox-morph/src/lib.rs b/sandbox-morph/src/lib.rs index 324c1647..912659d3 100644 --- a/sandbox-morph/src/lib.rs +++ b/sandbox-morph/src/lib.rs @@ -1,5 +1,5 @@ //! Library entry for `sandbox-morph`. Holds shared types, error codes, and the -//! capability set advertised by `sandbox::morph::create`. +//! capability set advertised by `sandbox::provider::morph::create`. pub mod client; pub mod config; @@ -7,7 +7,7 @@ pub mod handler; use serde::{Deserialize, Serialize}; -/// Capability tags advertised by `sandbox::morph::create`. Callers inspect this +/// Capability tags advertised by `sandbox::provider::morph::create`. Callers inspect this /// list to decide whether optional functions like `branch` are available. pub const CAPABILITIES: &[&str] = &["branch", "snapshot", "expose_port"]; diff --git a/sandbox-morph/src/main.rs b/sandbox-morph/src/main.rs index 82ef0637..dd5fc103 100644 --- a/sandbox-morph/src/main.rs +++ b/sandbox-morph/src/main.rs @@ -77,43 +77,43 @@ fn register_all(iii: &iii_sdk::III, ctx: HandlerCtx) { } reg!( - "sandbox::morph::create", + "sandbox::provider::morph::create", "Boot an Morph sandbox; returns {sandbox_id, image, capabilities}", do_create ); reg!( - "sandbox::morph::exec", + "sandbox::provider::morph::exec", "Run a command inside a live sandbox", do_exec ); - reg!("sandbox::morph::stop", "Tear down a sandbox", do_stop); + reg!("sandbox::provider::morph::stop", "Tear down a sandbox", do_stop); reg!( - "sandbox::morph::list", + "sandbox::provider::morph::list", "List live sandboxes plus concurrency status", do_list ); reg!( - "sandbox::morph::snapshot", + "sandbox::provider::morph::snapshot", "Pause a sandbox into a resumable snapshot", do_snapshot ); reg!( - "sandbox::morph::branch", + "sandbox::provider::morph::branch", "Branch a running sandbox into N siblings (Morph Infinibranch)", do_branch ); reg!( - "sandbox::morph::expose_port", + "sandbox::provider::morph::expose_port", "Return a public URL for a port inside the sandbox", do_expose_port ); reg!( - "sandbox::morph::fs::read", + "sandbox::provider::morph::fs::read", "Read a file out of a sandbox; returns base64-encoded bytes", do_fs_read ); reg!( - "sandbox::morph::fs::write", + "sandbox::provider::morph::fs::write", "Write a file into a sandbox; payload carries base64-encoded bytes", do_fs_write );