Go to file
Jarrod Sanders 9276abde3e pkg(ada-2012): Added ada 2012 2022-01-30 19:56:03 -05:00
.github ci: don 2021-11-29 14:00:10 +13:00
api api(config): respect $PORT as used by heroku if no explicit bind address provided 2021-11-26 02:32:28 +13:00
builder Make builder script run relative to directory it was called from 2022-01-02 09:39:24 +00:00
cli Don't read the file twice 2021-10-16 11:55:22 +02:00
docs build(deps): bump mkdocs from 1.1.2 to 1.2.3 in /docs 2021-11-25 14:56:13 +00:00
packages pkg(ada-2012): Added ada 2012 2022-01-30 19:56:03 -05:00
repo pkg(iverilog-11.0.0): Added iverilog 11.0.0 2021-09-26 13:25:13 +02:00
tests Piston lint 2021-10-09 18:10:58 +02:00
var/docs/images updated readme 2021-04-22 21:30:01 -05:00
.envrc basic api docs 2021-07-17 14:44:21 +12:00
.gitignore Piston lint 2021-10-09 18:10:58 +02:00
.prettierignore Piston lint 2021-10-09 18:10:58 +02:00
.prettierrc.yaml Piston lint 2021-10-09 18:10:58 +02:00
.readthedocs.yaml Piston lint 2021-10-09 18:10:58 +02:00
dev.pps cli: add `ppman spec` command 2021-06-13 18:41:01 +12:00
docker-compose.dev.yaml Piston lint 2021-10-09 18:10:58 +02:00
docker-compose.yaml make /tmp executable 2021-04-29 13:57:29 +12:00
license Add self to license 2021-09-30 08:11:47 +13:00
mkdocs.yml Piston lint 2021-10-09 18:10:58 +02:00
package-lock.json pkg(brachylog-1.0.0): added brachylog 2021-11-28 07:03:57 -07:00
package.json Piston lint 2021-10-09 18:10:58 +02:00
piston Fix piston script after rebase 2021-10-14 12:44:51 +02:00
pre-commit Improve precommit 2021-10-10 18:48:34 +02:00
public.pps cli: add `ppman spec` command 2021-06-13 18:41:01 +12:00
readme.md pkg(MATL-22.5.0): added MATL 22.5.0 2021-12-30 11:12:20 -07:00
shell.nix basic api docs 2021-07-17 14:44:21 +12:00

readme.md

engineer-man piston Piston

A high performance general purpose code execution engine.


GitHub last commit GitHub issues GitHub pull requests


AboutPublic APIGetting StartedUsageSupported LanguagesPrinciplesSecurityLicenseDocumentation



About

Piston is a high performance general purpose code execution engine. It excels at running untrusted and possibly malicious code without fear from any harmful effects.


It's used in numerous places including:


Official Extensions

The following are approved and endorsed extensions/utilities to the core Piston offering.

  • I Run Code, a Discord bot used in 4100+ servers to handle arbitrary code evaluation in Discord. To get this bot in your own server, go here: https://emkc.org/run.
  • Piston CLI, a universal shell supporting code highlighting, files, and interpretation without the need to download a language.
  • Node Piston Client, a Node.js wrapper for accessing the Piston API.
  • Piston4J, a Java wrapper for accessing the Piston API.
  • Pyston, a Python wrapper for accessing the Piston API.
  • Go-Piston, a Golang wrapper for accessing the Piston API.
  • piston_rs, a Rust wrapper for accessing the Piston API.

Public API

  • Requires no installation and you can use it immediately.
  • Reference the Runtimes/Execute sections below to learn about the request and response formats.

When using the public Piston API, use the following two URLs:

GET  https://emkc.org/api/v2/piston/runtimes
POST https://emkc.org/api/v2/piston/execute

Important Note: The Piston API is rate limited to 5 requests per second. If you have a need for more requests than that and it's for a good cause, please reach out to me (EngineerMan#0001) on Discord so we can discuss potentially getting you an unlimited key. What is and isn't a good cause is up to me, but, in general if your project is a) open source, b) helping people at no cost to them, and c) not likely to use tons of resources thereby impairing another's ability to enjoy Piston, you'll likely be granted a key.


Getting Started

All In One

Host System Package Dependencies

  • Docker
  • Docker Compose
  • Node JS (>= 13, preferably >= 15)

After system dependencies are installed, clone this repository:

# clone and enter repo
git clone https://github.com/engineer-man/piston

Installation

# Start the API container
docker-compose up -d api

# Install all the dependencies for the cli
cd cli && npm i && cd -

The API will now be online with no language runtimes installed. To install runtimes, use the CLI.

Just Piston (no CLI)

Host System Package Dependencies

  • Docker

Installation

docker run \
    -v $PWD:'/piston' \
    --tmpfs /piston/jobs \
    -dit \
    -p 2000:2000 \
    --name piston_api \
    ghcr.io/engineer-man/piston

Piston for testing packages locally

Host System Package Dependencies

Installation

# Build the Docker containers
./piston start

# For more help
./piston help

Usage

CLI

The CLI is the main tool used for installing packages within piston, but also supports running code.

You can execute the cli with cli/index.js.

# List all available packages
cli/index.js ppman list

# Install latest python
cli/index.js ppman install python

# Install specific version of python
cli/index.js ppman install python=3.9.4

# Run a python script using the latest version
echo 'print("Hello world!")' > test.py
cli/index.js run python test.py

# Run a python script using a specific version
echo 'print("Hello world!")' > test.py
cli/index.js run python test.py -l 3.9.4
cli/index.js run python test.py -l 3.x
cli/index.js run python test.py -l 3

If you are operating on a remote machine, add the -u flag like so:

cli/index.js -u http://piston.server:2000 ppman list

API

The container exposes an API on port 2000 by default. This is used by the CLI to carry out running jobs and package management.

Runtimes Endpoint

GET /api/v2/runtimes This endpoint will return the supported languages along with the current version and aliases. To execute code for a particular language using the /api/v2/execute endpoint, either the name or one of the aliases must be provided, along with the version. Multiple versions of the same language may be present at the same time, and may be selected when running a job.

HTTP/1.1 200 OK
Content-Type: application/json

[
    {
        "language": "bash",
        "version": "5.1.0",
        "aliases": [
            "sh"
        ]
    },
    {
        "language": "brainfuck",
        "version": "2.7.3",
        "aliases": [
            "bf"
        ]
    },
    ...
]

Execute Endpoint

POST /api/v2/execute This endpoint requests execution of some arbitrary code.

  • language (required) The language to use for execution, must be a string and must be installed.
  • version (required) The version of the language to use for execution, must be a string containing a SemVer selector for the version or the specific version number to use.
  • files (required) An array of files containing code or other data that should be used for execution. The first file in this array is considered the main file.
  • files[].name (optional) The name of the file to upload, must be a string containing no path or left out.
  • files[].content (required) The content of the files to upload, must be a string containing text to write.
  • files[].encoding (optional) The encoding scheme used for the file content. One of base64, hex or utf8. Defaults to utf8.
  • stdin (optional) The text to pass as stdin to the program. Must be a string or left out. Defaults to blank string.
  • args (optional) The arguments to pass to the program. Must be an array or left out. Defaults to [].
  • compile_timeout (optional) The maximum time allowed for the compile stage to finish before bailing out in milliseconds. Must be a number or left out. Defaults to 10000 (10 seconds).
  • run_timeout (optional) The maximum time allowed for the run stage to finish before bailing out in milliseconds. Must be a number or left out. Defaults to 3000 (3 seconds).
  • compile_memory_limit (optional) The maximum amount of memory the compile stage is allowed to use in bytes. Must be a number or left out. Defaults to -1 (no limit)
  • run_memory_limit (optional) The maximum amount of memory the run stage is allowed to use in bytes. Must be a number or left out. Defaults to -1 (no limit)
{
    "language": "js",
    "version": "15.10.0",
    "files": [
        {
            "name": "my_cool_code.js",
            "content": "console.log(process.argv)"
        }
    ],
    "stdin": "",
    "args": ["1", "2", "3"],
    "compile_timeout": 10000,
    "run_timeout": 3000,
    "compile_memory_limit": -1,
    "run_memory_limit": -1
}

A typical response upon successful execution will contain 1 or 2 keys run and compile. compile will only be present if the language requested requires a compile stage.

Each of these keys has an identical structure, containing both a stdout and stderr key, which is a string containing the text outputted during the stage into each buffer. It also contains the code and signal which was returned from each process.

HTTP/1.1 200 OK
Content-Type: application/json

{
    "language": "js",
    "version": "15.10.0",
    "run": {
        "stdout": "[\n  '/piston/packages/node/15.10.0/bin/node',\n  '/piston/jobs/9501b09d-0105-496b-b61a-e5148cf66384/my_cool_code.js',\n  '1',\n  '2',\n  '3'\n]\n",
        "stderr": "",
        "output": "[\n  '/piston/packages/node/15.10.0/bin/node',\n  '/piston/jobs/9501b09d-0105-496b-b61a-e5148cf66384/my_cool_code.js',\n  '1',\n  '2',\n  '3'\n]\n",
        "code": 0,
        "signal": null
    }
}

If a problem exists with the request, a 400 status code is returned and the reason in the message key.

HTTP/1.1 400 Bad Request
Content-Type: application/json

{
    "message": "html-5.0.0 runtime is unknown"
}

Supported Languages

awk, bash, befunge93, brachylog, brainfuck, c, c++, cjam, clojure, cobol, coffeescript, cow, crystal, csharp, csharp.net, d, dart, dash, dragon, elixir, emacs, erlang, file, forte, fortran, freebasic, fsharp.net, fsi, go, golfscript, groovy, haskell, husk, iverilog, japt, java, javascript, jelly, julia, kotlin, lisp, llvm_ir, lolcode, lua, matl, nasm, nasm64, nim, ocaml, octave, osabie, paradoc, pascal, perl, php, ponylang, powershell, prolog, pure, pyth, python, python2, racket, raku, retina, rockstar, rscript, ruby, rust, scala, sqlite3, swift, typescript, basic, basic.net, vlang, vyxal, yeethon, zig,


Principle of Operation

Piston uses Docker as the primary mechanism for sandboxing. There is an API within the container written in Node which takes in execution requests and executees them within the container safely. High level, the API writes any source code to a temporary directory in /piston/jobs. The source file is either ran or compiled and ran (in the case of languages like c, c++, c#, go, etc.).


Security

Docker provides a great deal of security out of the box in that it's separate from the system. Piston takes additional steps to make it resistant to various privilege escalation, denial-of-service, and resource saturation threats. These steps include:

  • Disabling outgoing network interaction
  • Capping max processes at 256 by default (resists :(){ :|: &}:;, while True: os.fork(), etc.)
  • Capping max files at 2048 (resists various file based attacks)
  • Cleaning up all temp space after each execution (resists out of drive space attacks)
  • Running as a variety of unprivileged users
  • Capping runtime execution at 3 seconds
  • Capping stdout to 65536 characters (resists yes/no bombs and runaway output)
  • SIGKILLing misbehaving code

License

Piston is licensed under the MIT license.