refactor: rewrite fly/lib/common.sh — eliminate redundancy and fragility (#1594)

- Replace _fly_json_get (stdin pipe) + _fly_parse_error with unified _fly_json
  that takes JSON string, python expression, and default as arguments
- Collapse 5-step auth chain into 2 steps: fly auth token → ensure_api_token_with_provider
- Replace _validate_fly_token (dual-endpoint fallback) with _test_fly_token (single Machines API call)
- Replace python3-based _fly_build_machine_body with printf + json_escape
- Remove fly ssh console -C fallback from run_server (FLY_MACHINE_ID always set)
- Remove base64 fallback from upload_file (stdin pipe via fly machine exec only)
- Remove collision re-prompt loop from create_server, fail with actionable message
- Add _fly_cleanup_on_failure to delete app when machine creation fails
- Lighten wait_for_cloud_init: install curl/unzip/git only (drop build-essential, python3-pip, zsh)
- Delete unused functions: _try_flyctl_auth, _try_fly_browser_auth, get_fly_org, _fly_json_get, _fly_parse_error

730 → 536 lines. All 112 mock tests pass, zero regressions.

Co-authored-by: lab <6723574+louisgv@users.noreply.github.com>
Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
A 2026-02-21 08:43:00 -08:00 committed by GitHub
parent 3db19d90ac
commit 51493ccc75
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -6,10 +6,9 @@
set -eo pipefail
# ============================================================
# Provider-agnostic functions
# Source shared provider-agnostic functions (local or remote)
# ============================================================
# Source shared provider-agnostic functions (local or remote fallback)
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" 2>/dev/null && pwd)"
if [[ -n "$SCRIPT_DIR" && -f "$SCRIPT_DIR/../../shared/common.sh" ]]; then
source "$SCRIPT_DIR/../../shared/common.sh"
@ -17,19 +16,19 @@ else
eval "$(curl -fsSL https://raw.githubusercontent.com/OpenRouterTeam/spawn/main/shared/common.sh)"
fi
# Note: Provider-agnostic functions (logging, OAuth, browser, nc_listen) are now in shared/common.sh
# ============================================================
# Fly.io specific functions
# Fly.io constants
# ============================================================
readonly FLY_API_BASE="https://api.machines.dev/v1"
SPAWN_DASHBOARD_URL="https://fly.io/dashboard"
# Centralized curl wrapper for Fly.io Machines API
# Handles both token formats:
# - FlyV1 tokens (from dashboard/fly tokens create): Authorization: FlyV1 fm2_...
# - Legacy tokens (from fly auth token): Authorization: Bearer <token>
# ============================================================
# Helpers
# ============================================================
# Centralized curl wrapper for Fly.io Machines API.
# Dispatches FlyV1 vs Bearer based on token format.
fly_api() {
local method="$1"
local endpoint="$2"
@ -41,8 +40,8 @@ fly_api() {
fi
}
# Resolve the flyctl CLI command name ("fly" or "flyctl")
# Prints the command name on stdout; returns 1 if neither is found
# Resolve the flyctl CLI command name ("fly" or "flyctl").
# Prints the command name on stdout; returns 1 if neither is found.
_get_fly_cmd() {
if command -v fly &>/dev/null; then
echo "fly"
@ -53,29 +52,65 @@ _get_fly_cmd() {
fi
}
# Extract a top-level field from a Fly.io JSON response piped to stdin.
# Usage: echo "$json" | _fly_json_get FIELD [DEFAULT]
# Null / missing values return DEFAULT (empty string by default).
# Extract a top-level JSON field from stdin using python3 (universally available).
# Usage: echo "$json" | _fly_json_get FIELD [DEFAULT]
_fly_json_get() {
local field="$1" default="${2:-}"
_FIELD="$field" _DEFAULT="$default" python3 -c "
import json, sys, os
# Extract a field from a JSON string.
# Usage: _fly_json JSON_STRING PYTHON_EXPR [DEFAULT]
# Example: _fly_json "$resp" "d.get('id')" ""
# Example: _fly_json "$resp" "[m['id'] for m in (d if isinstance(d,list) else [])]" ""
_fly_json() {
local json="$1" expr="$2" default="${3:-}"
_FLY_JSON="$json" _FLY_EXPR="$expr" _FLY_DEFAULT="$default" python3 -c "
import json, os, sys
try:
d = json.loads(sys.stdin.read())
v = d.get(os.environ['_FIELD'])
print(str(v) if v is not None else os.environ.get('_DEFAULT',''), end='')
d = json.loads(os.environ['_FLY_JSON'])
v = eval(os.environ['_FLY_EXPR'])
if v is None:
print(os.environ.get('_FLY_DEFAULT',''), end='')
elif isinstance(v, list):
print('\n'.join(str(x) for x in v), end='')
else:
print(str(v), end='')
except Exception:
print(os.environ.get('_DEFAULT',''), end='')
print(os.environ.get('_FLY_DEFAULT',''), end='')
" 2>/dev/null || printf '%s' "$default"
}
# Parse the "error" field from a Fly.io API JSON response
# Usage: echo "$response" | _fly_parse_error [DEFAULT]
_fly_parse_error() {
local default="${1:-Unknown error}"
_fly_json_get "error" "$default"
# ============================================================
# Authentication
# ============================================================
# Sanitize a Fly.io token — trim whitespace, extract/wrap macaroon tokens.
# The dashboard copy button may include the display name before the token.
_sanitize_fly_token() {
local raw="$1"
raw=$(printf '%s' "$raw" | tr -d '\n\r' | sed 's/^[[:space:]]*//;s/[[:space:]]*$//')
if [[ "$raw" == *"FlyV1 "* ]]; then
raw="FlyV1 ${raw##*FlyV1 }"
elif [[ "$raw" == *"fm2_"* ]]; then
raw=$(printf '%s' "$raw" | sed 's/.*\(fm2_[^ ,]*\).*/\1/')
raw="FlyV1 $raw"
elif [[ "$raw" == m2.* ]]; then
raw="FlyV1 $raw"
fi
printf '%s' "$raw"
}
# Validate a Fly.io token by making a test API call.
# Sanitizes the token first, then tests against the Machines API.
_test_fly_token() {
if [[ -n "${FLY_API_TOKEN:-}" ]]; then
FLY_API_TOKEN=$(_sanitize_fly_token "$FLY_API_TOKEN")
export FLY_API_TOKEN
fi
local response
response=$(fly_api GET "/apps?org_slug=${FLY_ORG:-personal}")
if printf '%s' "$response" | grep -q '"error"\|"errors"'; then
log_error "Authentication failed: Invalid Fly.io API token"
log_error "How to fix:"
log_warn " 1. Run: fly tokens deploy"
log_warn " 2. Or generate a token at: https://fly.io/dashboard"
return 1
fi
return 0
}
# Ensure flyctl CLI is installed
@ -92,7 +127,6 @@ ensure_fly_cli() {
return 1
}
# Add to PATH if installed to ~/.fly/bin
if [[ -d "$HOME/.fly/bin" ]]; then
export PATH="$HOME/.fly/bin:$PATH"
fi
@ -105,93 +139,54 @@ ensure_fly_cli() {
log_info "flyctl CLI installed"
}
# Ensure FLY_API_TOKEN is available
# Auth chain: env var → config file → flyctl CLI → browser OAuth → manual prompt
# Try to get token from flyctl CLI if available
_try_flyctl_auth() {
# Ensure FLY_API_TOKEN is available.
# Auth chain: (1) fly auth token from CLI, (2) ensure_api_token_with_provider
ensure_fly_token() {
# 1. Try flyctl CLI auth (quick, no validation needed — CLI is authoritative)
local fly_cmd
fly_cmd=$(_get_fly_cmd) || return 1
local token
token=$("$fly_cmd" auth token 2>/dev/null | head -1 | sed 's/\x1b\[[0-9;]*m//g' || true)
if [[ -n "$token" ]]; then
echo "$token"
return 0
if fly_cmd=$(_get_fly_cmd 2>/dev/null); then
local token
token=$("$fly_cmd" auth token 2>/dev/null | head -1 | sed 's/\x1b\[[0-9;]*m//g' || true)
if [[ -n "$token" ]]; then
FLY_API_TOKEN=$(_sanitize_fly_token "$token")
export FLY_API_TOKEN
log_info "Using Fly.io API token from flyctl"
_save_token_to_config "$HOME/.config/spawn/fly.json" "$FLY_API_TOKEN"
_fly_prompt_org
return 0
fi
fi
return 1
}
# Sanitize a Fly.io token — the dashboard copy button may include the
# display name before the actual token (e.g. "Deploy Token FlyV1 fm2_...")
# Also handles raw macaroon tokens returned by the CLI Sessions API
# (e.g. "m2.XXXX" or "fm2_XXXX" without the "FlyV1 " prefix).
_sanitize_fly_token() {
local raw="$1"
# Trim leading/trailing whitespace and newlines
raw=$(printf '%s' "$raw" | tr -d '\n\r' | sed 's/^[[:space:]]*//;s/[[:space:]]*$//')
# If it already contains "FlyV1 ", strip any display name prefix before it
if [[ "$raw" == *"FlyV1 "* ]]; then
raw="FlyV1 ${raw##*FlyV1 }"
# Raw fm2_ macaroon (no FlyV1 prefix) — extract and wrap
elif [[ "$raw" == *"fm2_"* ]]; then
raw=$(printf '%s' "$raw" | sed 's/.*\(fm2_[^ ]*\).*/\1/')
raw="FlyV1 $raw"
# Raw m2. macaroon returned by CLI Sessions API — wrap with FlyV1 prefix
elif [[ "$raw" == m2.* ]]; then
raw="FlyV1 $raw"
fi
printf '%s' "$raw"
}
# 2. Env var / config file / manual prompt — same pattern as Hetzner
ensure_api_token_with_provider \
"Fly.io" \
"FLY_API_TOKEN" \
"$HOME/.config/spawn/fly.json" \
"https://fly.io/dashboard → Tokens" \
"_test_fly_token"
# Validate a Fly.io token by making a test API call
# Also sanitizes the token in-place (strips display name prefix from dashboard copy)
_validate_fly_token() {
# Sanitize before validating — dashboard copy button may include display name
# Sanitize whatever we got (may include display name prefix)
if [[ -n "${FLY_API_TOKEN:-}" ]]; then
FLY_API_TOKEN=$(_sanitize_fly_token "$FLY_API_TOKEN")
export FLY_API_TOKEN
fi
# Use api.fly.io for validation — OAuth user tokens work there.
# The Machines API (api.machines.dev) only accepts deploy tokens.
local response
response=$(curl -fsSL \
-H "Authorization: Bearer ${FLY_API_TOKEN}" \
"https://api.fly.io/v1/user" 2>/dev/null)
if echo "$response" | grep -q '"error"\|"errors"'; then
# Fallback: try machines API (for deploy tokens)
response=$(fly_api GET "/apps?org_slug=${FLY_ORG:-personal}")
fi
if echo "$response" | grep -q '"error"\|"errors"'; then
log_error "Authentication failed: Invalid Fly.io API token"
log_error "API Error: $(echo "$response" | _fly_parse_error "No details available")"
log_error "How to fix:"
log_warn " 1. Run: fly tokens deploy"
log_warn " 2. Or generate a token at: https://fly.io/dashboard"
log_warn " 3. Ensure the token has appropriate permissions"
return 1
fi
return 0
_fly_prompt_org
}
# List Fly.io organizations via flyctl and emit pipe-delimited "slug|name (type)" lines.
# Used as the LIST_CALLBACK for interactive_pick.
# List Fly.io organizations via flyctl — emit pipe-delimited "slug|name" lines.
_fly_list_orgs() {
local fly_cmd
fly_cmd=$(_get_fly_cmd 2>/dev/null) || return 1
# Some flyctl versions exit non-zero even on success — capture regardless.
local json
json=$("$fly_cmd" orgs list --json 2>/dev/null)
[[ -z "$json" ]] && return 1
# Pass JSON as an argument (not stdin pipe) to avoid bun stdin buffering issues.
printf '%s' "$json" | python3 -c "
import json, sys
try:
data = json.loads(sys.stdin.read())
if isinstance(data, dict) and not any(k in data for k in ('nodes', 'organizations')):
# Flat dict format: {'slug': 'Display Name', ...}
if not data:
sys.exit(1)
for slug, name in data.items():
@ -212,8 +207,7 @@ except Exception:
" 2>/dev/null
}
# Prompt user to select their Fly.io organization using the shared picker.
# Follows the same interactive_pick pattern as Hetzner/GCP pickers.
# Prompt user to select their Fly.io organization.
_fly_prompt_org() {
if [[ -n "${FLY_ORG:-}" || "${SPAWN_NON_INTERACTIVE:-}" == "1" ]]; then
return 0
@ -224,183 +218,52 @@ _fly_prompt_org() {
log_info "Using Fly.io org: ${FLY_ORG}"
}
# Browser-based auth — delegates to flyctl when available (correct token exchange),
# falls back to a direct API prompt when flyctl is absent.
_try_fly_browser_auth() {
local fly_cmd
if fly_cmd=$(_get_fly_cmd 2>/dev/null); then
# flyctl handles the full browser-flow + token exchange internally.
# It outputs the auth URL to the terminal so sandbox users can copy it.
log_step "Opening Fly.io browser login via flyctl..."
if "$fly_cmd" auth login </dev/tty >/dev/tty 2>&1; then
local token
token=$("$fly_cmd" auth token 2>/dev/null | head -1 | sed 's/\x1b\[[0-9;]*m//g') || true
if [[ -n "$token" ]]; then
echo "$token"
return 0
fi
fi
log_warn "flyctl browser login failed."
return 1
fi
# Fallback when flyctl is not installed: direct token entry
log_warn "flyctl not found — cannot open browser flow automatically."
log_warn "Generate a token at: https://fly.io/dashboard → Tokens → Create token"
local manual_token
manual_token=$(safe_read "Paste Fly.io API token: ") || return 1
if [[ -n "${manual_token}" ]]; then
echo "${manual_token}"
return 0
fi
return 1
}
ensure_fly_token() {
# 1. Try env var (sanitize — dashboard copy button may include display name)
log_info "Checking FLY_API_TOKEN env var..."
if [[ -n "${FLY_API_TOKEN:-}" ]]; then
FLY_API_TOKEN=$(_sanitize_fly_token "$FLY_API_TOKEN")
export FLY_API_TOKEN
log_info "Validating token from env var..."
_validate_fly_token && return 0
log_warn "FLY_API_TOKEN is set but invalid, trying next method..."
unset FLY_API_TOKEN
else
log_info "FLY_API_TOKEN not set, trying next method..."
fi
# 2. Try config file (sanitize in case it was saved with display name)
log_info "Checking config file ~/.config/spawn/fly.json..."
if _load_token_from_config "$HOME/.config/spawn/fly.json" "FLY_API_TOKEN" "Fly.io"; then
FLY_API_TOKEN=$(_sanitize_fly_token "$FLY_API_TOKEN")
export FLY_API_TOKEN
log_info "Validating token from config file..."
if _validate_fly_token; then
return 0
fi
log_warn "Token from config file is invalid, trying next method..."
unset FLY_API_TOKEN
else
log_info "No token found in config file, trying next method..."
fi
# 3. Try flyctl CLI auth
log_info "Trying fly auth token..."
local token
token=$(_try_flyctl_auth 2>/dev/null) && {
export FLY_API_TOKEN="$token"
log_info "Using Fly.io API token from flyctl auth"
_save_token_to_config "$HOME/.config/spawn/fly.json" "$token"
_fly_prompt_org
return 0
}
log_warn "flyctl auth token not available, trying next method..."
# 4. Try browser-based OAuth via flyctl
# Token from 'fly auth login' + 'fly auth token' is definitionally valid —
# skip _validate_fly_token to avoid false failures on the Machines API.
log_info "Opening browser for Fly.io OAuth..."
token=$(_try_fly_browser_auth) && {
FLY_API_TOKEN=$(_sanitize_fly_token "$token")
export FLY_API_TOKEN
log_info "Authenticated with Fly.io via browser"
_save_token_to_config "$HOME/.config/spawn/fly.json" "$FLY_API_TOKEN"
_fly_prompt_org
return 0
}
# 5. Last resort: manual token entry
log_warn "Browser login unavailable or failed, falling back to manual token entry..."
ensure_api_token_with_provider \
"Fly.io" \
"FLY_API_TOKEN" \
"$HOME/.config/spawn/fly.json" \
"https://fly.io/dashboard → Tokens" \
"_validate_fly_token"
# Sanitize whatever the manual prompt gave us (may include display name)
if [[ -n "${FLY_API_TOKEN:-}" ]]; then
FLY_API_TOKEN=$(_sanitize_fly_token "$FLY_API_TOKEN")
export FLY_API_TOKEN
_fly_prompt_org
fi
}
# Get the Fly.io org slug (default: personal)
get_fly_org() {
echo "${FLY_ORG:-personal}"
}
# ============================================================
# Provisioning
# ============================================================
# Get server name from env var or prompt
get_server_name() {
get_validated_server_name "FLY_APP_NAME" "Enter app name: "
}
# Create Fly.io app, returning 0 on success or if app already exists
# Create Fly.io app. Fails with clear message if name is taken.
_fly_create_app() {
local name="$1"
local org
org=$(get_fly_org)
# SECURITY: Validate org slug to prevent JSON injection via FLY_ORG env var
if [[ ! "$org" =~ ^[a-zA-Z0-9_-]+$ ]]; then
log_error "Invalid FLY_ORG: must be alphanumeric with hyphens/underscores only"
return 1
fi
local org="${FLY_ORG:-personal}"
log_step "Creating Fly.io app '$name'..."
# SECURITY: Use json_escape to prevent JSON injection
local app_body
app_body=$(printf '{"app_name":%s,"org_slug":%s}' "$(json_escape "$name")" "$(json_escape "$org")")
local response
response=$(fly_api POST "/apps" "$app_body")
if echo "$response" | grep -q '"error"'; then
if printf '%s' "$response" | grep -q '"error"'; then
local error_msg
error_msg=$(echo "$response" | _fly_parse_error)
if echo "$error_msg" | grep -qi "already exists"; then
error_msg=$(_fly_json "$response" "d.get('error')" "Unknown error")
if printf '%s' "$error_msg" | grep -qi "already exists"; then
log_info "App '$name' already exists, reusing it"
return 0
fi
# Name taken by another user — return 2 so caller can re-prompt
if echo "$error_msg" | grep -qi "taken\|Name.*valid"; then
log_warn "App name '$name' is not available (taken by another user or invalid)"
return 2
log_error "Failed to create Fly.io app: $error_msg"
if printf '%s' "$error_msg" | grep -qi "taken\|Name.*valid"; then
log_warn "Fly.io app names are globally unique. Set a different name with: FLY_APP_NAME=my-unique-name"
fi
log_error "Failed to create Fly.io app"
log_error "API Error: $error_msg"
log_warn "Common issues:"
log_warn " - Invalid organization slug"
log_warn " - API token lacks permissions"
return 1
fi
log_info "App '$name' created"
}
# Build JSON request body for Fly.io machine creation
# SECURITY: Pass values via environment variables to prevent Python injection
# Build JSON request body for Fly.io machine creation using bash printf + json_escape.
_fly_build_machine_body() {
local name="$1" region="$2" vm_memory="$3"
_FLY_NAME="$name" _FLY_REGION="$region" _FLY_MEM="$vm_memory" python3 -c "
import json, os
body = {
'name': os.environ['_FLY_NAME'],
'region': os.environ['_FLY_REGION'],
'config': {
'image': 'ubuntu:24.04',
'guest': {'cpu_kind': 'shared', 'cpus': 1, 'memory_mb': int(os.environ['_FLY_MEM'])},
'init': {'exec': ['/bin/sleep', 'inf']},
'auto_destroy': False,
},
}
print(json.dumps(body))
"
printf '{"name":%s,"region":%s,"config":{"image":"ubuntu:24.04","guest":{"cpu_kind":"shared","cpus":1,"memory_mb":%d},"init":{"exec":["/bin/sleep","inf"]},"auto_destroy":false}}' \
"$(json_escape "$name")" "$(json_escape "$region")" "$vm_memory"
}
# Create a Fly.io machine via the Machines API
# Sets FLY_MACHINE_ID and FLY_APP_NAME on success
# Create a Fly.io machine via the Machines API.
# Sets FLY_MACHINE_ID and FLY_APP_NAME on success.
_fly_create_machine() {
local name="$1"
local region="$2"
@ -414,21 +277,15 @@ _fly_create_machine() {
local response
response=$(fly_api POST "/apps/$name/machines" "$machine_body")
if echo "$response" | grep -q '"error"'; then
log_error "Failed to create Fly.io machine"
log_error "API Error: $(echo "$response" | _fly_parse_error)"
log_warn "Common issues:"
log_warn " - Insufficient account balance or payment method required"
log_warn " - Region unavailable (try different FLY_REGION)"
log_warn " - Machine limit reached"
if printf '%s' "$response" | grep -q '"error"'; then
log_error "Failed to create Fly.io machine: $(_fly_json "$response" "d.get('error')" "Unknown error")"
log_warn "Check your dashboard: https://fly.io/dashboard"
return 1
fi
FLY_MACHINE_ID=$(echo "$response" | _fly_json_get "id")
FLY_MACHINE_ID=$(_fly_json "$response" "d.get('id')")
if [[ -z "$FLY_MACHINE_ID" ]]; then
log_error "Failed to extract machine ID from API response"
log_error "Response: $response"
return 1
fi
export FLY_MACHINE_ID FLY_APP_NAME="$name"
@ -436,8 +293,6 @@ _fly_create_machine() {
}
# Wait for a Fly.io machine to reach "started" state using the /wait endpoint.
# Blocks server-side — one API call instead of a polling loop (#1569).
# Usage: _fly_wait_for_machine_start APP_NAME MACHINE_ID [TIMEOUT_SECS]
_fly_wait_for_machine_start() {
local name="$1"
local machine_id="$2"
@ -447,49 +302,102 @@ _fly_wait_for_machine_start() {
local response
response=$(fly_api GET "/apps/$name/machines/$machine_id/wait?state=started&timeout=$timeout")
if echo "$response" | grep -q '"error"'; then
log_error "Machine did not reach 'started' state: $(echo "$response" | _fly_parse_error)"
log_error "Check status: fly machines list -a $name"
if printf '%s' "$response" | grep -q '"error"'; then
log_error "Machine did not reach 'started' state: $(_fly_json "$response" "d.get('error')" "timeout")"
log_error "Try a new region: FLY_REGION=ord spawn fly <agent>"
log_error "Dashboard: https://fly.io/dashboard"
return 1
fi
log_info "Machine is running"
}
# Delete app on machine creation failure
_fly_cleanup_on_failure() {
local app_name="$1"
log_warn "Cleaning up app '$app_name' after provisioning failure..."
fly_api DELETE "/apps/$app_name" >/dev/null 2>&1 || true
}
# Create a Fly.io app and machine
create_server() {
local name="$1"
local region="${FLY_REGION:-iad}"
local vm_size="${FLY_VM_SIZE:-shared-cpu-1x}"
local vm_memory="${FLY_VM_MEMORY:-1024}"
# Validate env var inputs to prevent injection into Python code
validate_region_name "$region" || { log_error "Invalid FLY_REGION"; return 1; }
validate_resource_name "$vm_size" || { log_error "Invalid FLY_VM_SIZE"; return 1; }
if [[ ! "$vm_memory" =~ ^[0-9]+$ ]]; then log_error "Invalid FLY_VM_MEMORY: must be numeric"; return 1; fi
local create_rc=0 collision_attempts=0
_fly_create_app "$name" || create_rc=$?
while [[ "$create_rc" -eq 2 ]]; do
collision_attempts=$((collision_attempts + 1))
if [[ "$collision_attempts" -ge 5 ]]; then
log_error "Too many name collisions. Set a unique name with: FLY_APP_NAME=my-unique-name"
return 1
fi
log_warn "App name '$name' is taken — Fly.io app names are globally unique."
name=$(safe_read "Enter a different app name: ") || return 1
[[ -z "$name" ]] && { log_error "App name cannot be empty"; return 1; }
create_rc=0
_fly_create_app "$name" || create_rc=$?
done
if [[ "$create_rc" -ne 0 ]]; then return 1; fi
_fly_create_machine "$name" "$region" "$vm_memory" || return 1
_fly_wait_for_machine_start "$name" "$FLY_MACHINE_ID"
_fly_create_app "$name" || return 1
if ! _fly_create_machine "$name" "$region" "$vm_memory"; then
_fly_cleanup_on_failure "$name"
return 1
fi
_fly_wait_for_machine_start "$name" "$FLY_MACHINE_ID" || return 1
save_vm_connection "fly-ssh" "root" "${FLY_MACHINE_ID}" "$name" "fly"
}
# ============================================================
# Execution
# ============================================================
# Run a command on the Fly.io machine via `fly machine exec`.
# Optional second arg: timeout in seconds.
run_server() {
local cmd="$1"
local timeout_secs="${2:-}"
local full_cmd="export PATH=\"\$HOME/.local/bin:\$HOME/.bun/bin:\$PATH\" && $cmd"
local fly_cmd
fly_cmd=$(_get_fly_cmd)
local timeout_bin=""
if command -v timeout &>/dev/null; then timeout_bin="timeout"
elif command -v gtimeout &>/dev/null; then timeout_bin="gtimeout"; fi
if [[ -n "${timeout_secs}" && -n "${timeout_bin}" ]]; then
"${timeout_bin}" "${timeout_secs}" \
"$fly_cmd" machine exec "$FLY_MACHINE_ID" --app "$FLY_APP_NAME" \
-- bash -c "$full_cmd"
return $?
fi
"$fly_cmd" machine exec "$FLY_MACHINE_ID" --app "$FLY_APP_NAME" \
-- bash -c "$full_cmd"
}
# Upload a file to the machine via stdin pipe through `fly machine exec`.
upload_file() {
local local_path="$1"
local remote_path="$2"
if [[ ! "${remote_path}" =~ ^[a-zA-Z0-9/_.~-]+$ ]]; then
log_error "Invalid remote path (must contain only alphanumeric, /, _, ., ~, -): ${remote_path}"
return 1
fi
local fly_cmd
fly_cmd=$(_get_fly_cmd)
"$fly_cmd" machine exec "$FLY_MACHINE_ID" --app "$FLY_APP_NAME" \
-- bash -c "cat > $(printf '%q' "$remote_path")" \
< "$local_path"
}
# Start an interactive SSH session on the Fly.io machine.
# Uses fly ssh console --pty for proper TTY allocation.
interactive_session() {
local cmd="$1"
local full_cmd="export PATH=\"\$HOME/.local/bin:\$HOME/.bun/bin:\$PATH\" && $cmd"
local escaped_cmd
escaped_cmd=$(printf '%q' "$full_cmd")
local session_exit=0
"$(_get_fly_cmd)" ssh console -a "$FLY_APP_NAME" --pty -C "bash -c $escaped_cmd" || session_exit=$?
SERVER_NAME="${FLY_APP_NAME:-}" SPAWN_RECONNECT_CMD="fly ssh console -a ${FLY_APP_NAME:-}" \
_show_exec_post_session_summary
return "${session_exit}"
}
# Retry a run_server command up to N times with sleep between attempts.
# Usage: _fly_run_with_retry MAX_ATTEMPTS SLEEP_SEC TIMEOUT CMD
_fly_run_with_retry() {
@ -535,10 +443,9 @@ _fly_wait_for_ssh() {
wait_for_cloud_init() {
_fly_wait_for_ssh || return 1
log_step "Installing packages (this may take 1-2 minutes)..."
_fly_run_with_retry 3 10 600 "apt-get update -y && apt-get install -y curl unzip git zsh python3 python3-pip build-essential" || {
log_warn "Full package install failed after retries, trying minimal set..."
_fly_run_with_retry 2 5 300 "apt-get install -y curl git" || true
log_step "Installing packages..."
_fly_run_with_retry 3 10 300 "apt-get update -y && apt-get install -y curl unzip git" || {
log_warn "Package install failed, continuing anyway..."
}
log_step "Installing Node.js..."
_fly_run_with_retry 3 10 120 "curl -fsSL https://deb.nodesource.com/setup_22.x | bash - && apt-get install -y nodejs" || {
@ -551,102 +458,11 @@ wait_for_cloud_init() {
log_info "Base tools installed"
}
# Run a command on the Fly.io machine.
# Uses 'fly machine exec' (direct API, no WireGuard tunnel) when FLY_MACHINE_ID
# is set (#1570). Falls back to 'fly ssh console -C' otherwise.
# Optional second arg: timeout in seconds.
run_server() {
local cmd="$1"
local timeout_secs="${2:-}"
local full_cmd="export PATH=\"\$HOME/.local/bin:\$HOME/.bun/bin:\$PATH\" && $cmd"
# ============================================================
# Lifecycle
# ============================================================
local fly_cmd
fly_cmd=$(_get_fly_cmd)
local timeout_bin=""
if command -v timeout &>/dev/null; then timeout_bin="timeout"
elif command -v gtimeout &>/dev/null; then timeout_bin="gtimeout"; fi
# fly machine exec: direct API execution, no WireGuard tunnel overhead
if [[ -n "${FLY_MACHINE_ID:-}" ]]; then
if [[ -n "${timeout_secs}" && -n "${timeout_bin}" ]]; then
"${timeout_bin}" "${timeout_secs}" \
"$fly_cmd" machine exec "$FLY_MACHINE_ID" --app "$FLY_APP_NAME" \
-- bash -c "$full_cmd"
return $?
fi
"$fly_cmd" machine exec "$FLY_MACHINE_ID" --app "$FLY_APP_NAME" \
-- bash -c "$full_cmd"
return $?
fi
# Fallback: fly ssh console (WireGuard tunnel)
local escaped_cmd
escaped_cmd=$(printf '%q' "$full_cmd")
if [[ -n "${timeout_secs}" && -n "${timeout_bin}" ]]; then
"${timeout_bin}" "${timeout_secs}" \
"$fly_cmd" ssh console -a "$FLY_APP_NAME" -C "bash -c $escaped_cmd" --quiet
return $?
fi
"$fly_cmd" ssh console -a "$FLY_APP_NAME" -C "bash -c $escaped_cmd" --quiet
}
# Upload a file to the machine via stdin pipe — avoids embedding file content
# in a shell command string (#1580). Uses fly machine exec with stdin when
# FLY_MACHINE_ID is available; falls back to base64 via ssh console.
upload_file() {
local local_path="$1"
local remote_path="$2"
# SECURITY: Strict allowlist validation — only safe path characters
if [[ ! "${remote_path}" =~ ^[a-zA-Z0-9/_.~-]+$ ]]; then
log_error "Invalid remote path (must contain only alphanumeric, /, _, ., ~, -): ${remote_path}"
return 1
fi
local fly_cmd
fly_cmd=$(_get_fly_cmd)
# Preferred: stream file via stdin to fly machine exec (no size limit, no injection)
if [[ -n "${FLY_MACHINE_ID:-}" ]]; then
"$fly_cmd" machine exec "$FLY_MACHINE_ID" --app "$FLY_APP_NAME" \
-- bash -c "cat > $(printf '%q' "$remote_path")" \
< "$local_path"
return $?
fi
# Fallback: base64 encode and decode via ssh console
local content
content=$(base64 -w0 < "$local_path" 2>/dev/null || base64 < "$local_path")
if [[ "${content}" =~ [^A-Za-z0-9+/=] ]]; then
log_error "upload_file: base64 output contains unexpected characters"
return 1
fi
run_server "printf '%s' '${content}' | base64 -d > '${remote_path}'"
}
# Start an interactive SSH session on the Fly.io machine
interactive_session() {
local cmd="$1"
# Wrap in bash -c with PATH prepended (same as run_server) so shell builtins
# like "source" work — fly ssh console -C execs directly, not via a shell.
local full_cmd="export PATH=\"\$HOME/.local/bin:\$HOME/.bun/bin:\$PATH\" && $cmd"
# printf '%q' makes the command a single shell word; the remote shell
# unescapes it back into the original command for bash -c.
# Do NOT add quotes around $escaped_cmd (see run_server comment).
local escaped_cmd
escaped_cmd=$(printf '%q' "$full_cmd")
local session_exit=0
# --pty allocates a pseudo-terminal so interactive TUI agents (claude, codex)
# receive a proper TTY on stdin. Without it, fly ssh console -C runs the
# command without a PTY and agents see "Input is not a terminal (fd=0)".
"$(_get_fly_cmd)" ssh console -a "$FLY_APP_NAME" --pty -C "bash -c $escaped_cmd" || session_exit=$?
SERVER_NAME="${FLY_APP_NAME:-}" SPAWN_RECONNECT_CMD="fly ssh console -a ${FLY_APP_NAME:-}" \
_show_exec_post_session_summary
return "${session_exit}"
}
# Destroy a Fly.io machine and app (#1577: errors are now reported, not swallowed)
# Destroy a Fly.io machine and app
destroy_server() {
local app_name="${1:-$FLY_APP_NAME}"
if [[ -z "$app_name" ]]; then
@ -660,15 +476,7 @@ destroy_server() {
machines=$(fly_api GET "/apps/$app_name/machines")
local machine_ids
machine_ids=$(printf '%s' "$machines" | python3 -c "
import json, sys
try:
data = json.loads(sys.stdin.read())
for m in (data if isinstance(data, list) else []):
print(m['id'])
except Exception:
pass
" 2>/dev/null || true)
machine_ids=$(_fly_json "$machines" "[m['id'] for m in (d if isinstance(d,list) else [])]")
local failed=0
for mid in $machine_ids; do
@ -681,8 +489,8 @@ except Exception:
local delete_response
delete_response=$(fly_api DELETE "/apps/$app_name" 2>&1)
if echo "$delete_response" | grep -q '"error"'; then
log_error "Failed to delete app '$app_name': $(echo "$delete_response" | _fly_parse_error)"
if printf '%s' "$delete_response" | grep -q '"error"'; then
log_error "Failed to delete app '$app_name': $(_fly_json "$delete_response" "d.get('error')" "Unknown error")"
return 1
fi
@ -690,18 +498,17 @@ except Exception:
log_info "App '$app_name' destroyed"
}
# List all Fly.io apps and machines
# List all Fly.io apps
list_servers() {
local org
org=$(get_fly_org)
local org="${FLY_ORG:-personal}"
local response
response=$(fly_api GET "/apps?org_slug=$org")
printf '%s' "$response" | python3 -c "
import json, sys
_FLY_JSON="$response" python3 -c "
import json, os, sys
try:
data = json.loads(sys.stdin.read())
apps = data if isinstance(data, list) else data.get('apps', [])
d = json.loads(os.environ['_FLY_JSON'])
apps = d if isinstance(d, list) else d.get('apps', [])
if not apps:
print('No apps found')
sys.exit(0)