wasmtime_wasi/ctx.rs
1use crate::cli::{StdinStream, StdoutStream, WasiCliCtx};
2use crate::clocks::{HostMonotonicClock, HostWallClock, WasiClocksCtx};
3use crate::filesystem::{Dir, WasiFilesystemCtx};
4use crate::random::WasiRandomCtx;
5use crate::sockets::{SocketAddrCheck, SocketAddrUse, WasiSocketsCtx};
6use crate::{DirPerms, FilePerms, OpenMode};
7use cap_rand::RngCore;
8use cap_std::ambient_authority;
9use std::future::Future;
10use std::mem;
11use std::net::SocketAddr;
12use std::path::Path;
13use std::pin::Pin;
14use tokio::io::{stderr, stdin, stdout};
15use wasmtime::Result;
16
17/// Builder-style structure used to create a [`WasiCtx`].
18///
19/// This type is used to create a [`WasiCtx`] that is considered per-[`Store`]
20/// state. The [`build`][WasiCtxBuilder::build] method is used to finish the
21/// building process and produce a finalized [`WasiCtx`].
22///
23/// # Examples
24///
25/// ```
26/// use wasmtime_wasi::WasiCtx;
27///
28/// let mut wasi = WasiCtx::builder();
29/// wasi.arg("./foo.wasm");
30/// wasi.arg("--help");
31/// wasi.env("FOO", "bar");
32///
33/// let wasi: WasiCtx = wasi.build();
34/// ```
35///
36/// [`Store`]: wasmtime::Store
37#[derive(Default)]
38pub struct WasiCtxBuilder {
39 cli: WasiCliCtx,
40 clocks: WasiClocksCtx,
41 filesystem: WasiFilesystemCtx,
42 random: WasiRandomCtx,
43 sockets: WasiSocketsCtx,
44 built: bool,
45}
46
47impl WasiCtxBuilder {
48 /// Creates a builder for a new context with default parameters set.
49 ///
50 /// The current defaults are:
51 ///
52 /// * stdin is closed
53 /// * stdout and stderr eat all input and it doesn't go anywhere
54 /// * no env vars
55 /// * no arguments
56 /// * no preopens
57 /// * clocks use the host implementation of wall/monotonic clocks
58 /// * RNGs are all initialized with random state and suitable generator
59 /// quality to satisfy the requirements of WASI APIs.
60 /// * TCP/UDP are allowed but all addresses are denied by default.
61 /// * `wasi:sockets/ip-name-lookup` is denied by default.
62 ///
63 /// These defaults can all be updated via the various builder configuration
64 /// methods below.
65 pub fn new() -> Self {
66 Self::default()
67 }
68
69 /// Provides a custom implementation of stdin to use.
70 ///
71 /// By default stdin is closed but an example of using the host's native
72 /// stdin looks like:
73 ///
74 /// ```
75 /// use wasmtime_wasi::WasiCtx;
76 /// use wasmtime_wasi::cli::stdin;
77 ///
78 /// let mut wasi = WasiCtx::builder();
79 /// wasi.stdin(stdin());
80 /// ```
81 ///
82 /// Note that inheriting the process's stdin can also be done through
83 /// [`inherit_stdin`](WasiCtxBuilder::inherit_stdin).
84 pub fn stdin(&mut self, stdin: impl StdinStream + 'static) -> &mut Self {
85 self.cli.stdin = Box::new(stdin);
86 self
87 }
88
89 /// Same as [`stdin`](WasiCtxBuilder::stdin), but for stdout.
90 pub fn stdout(&mut self, stdout: impl StdoutStream + 'static) -> &mut Self {
91 self.cli.stdout = Box::new(stdout);
92 self
93 }
94
95 /// Same as [`stdin`](WasiCtxBuilder::stdin), but for stderr.
96 pub fn stderr(&mut self, stderr: impl StdoutStream + 'static) -> &mut Self {
97 self.cli.stderr = Box::new(stderr);
98 self
99 }
100
101 /// Configures this context's stdin stream to read the host process's
102 /// stdin.
103 ///
104 /// Note that concurrent reads of stdin can produce surprising results so
105 /// when using this it's typically best to have a single wasm instance in
106 /// the process using this.
107 pub fn inherit_stdin(&mut self) -> &mut Self {
108 self.stdin(stdin())
109 }
110
111 /// Configures this context's stdout stream to write to the host process's
112 /// stdout.
113 ///
114 /// Note that unlike [`inherit_stdin`](WasiCtxBuilder::inherit_stdin)
115 /// multiple instances printing to stdout works well.
116 pub fn inherit_stdout(&mut self) -> &mut Self {
117 self.stdout(stdout())
118 }
119
120 /// Configures this context's stderr stream to write to the host process's
121 /// stderr.
122 ///
123 /// Note that unlike [`inherit_stdin`](WasiCtxBuilder::inherit_stdin)
124 /// multiple instances printing to stderr works well.
125 pub fn inherit_stderr(&mut self) -> &mut Self {
126 self.stderr(stderr())
127 }
128
129 /// Configures all of stdin, stdout, and stderr to be inherited from the
130 /// host process.
131 ///
132 /// See [`inherit_stdin`](WasiCtxBuilder::inherit_stdin) for some rationale
133 /// on why this should only be done in situations of
134 /// one-instance-per-process.
135 pub fn inherit_stdio(&mut self) -> &mut Self {
136 self.inherit_stdin().inherit_stdout().inherit_stderr()
137 }
138
139 /// Configures whether or not blocking operations made through this
140 /// `WasiCtx` are allowed to block the current thread.
141 ///
142 /// WASI is currently implemented on top of the Rust
143 /// [Tokio](https://tokio.rs/) library. While most WASI APIs are
144 /// non-blocking some are instead blocking from the perspective of
145 /// WebAssembly. For example opening a file is a blocking operation with
146 /// respect to WebAssembly but it's implemented as an asynchronous operation
147 /// on the host. This is currently done with Tokio's
148 /// [`spawn_blocking`](https://docs.rs/tokio/latest/tokio/task/fn.spawn_blocking.html).
149 ///
150 /// When WebAssembly is used in a synchronous context then this asynchronous
151 /// operation is quickly turned back into a synchronous operation with a
152 /// `block_on` in Rust. This switching back-and-forth between a blocking a
153 /// non-blocking context can have overhead, and this option exists to help
154 /// alleviate this overhead.
155 ///
156 /// This option indicates that for WASI functions that are blocking from the
157 /// perspective of WebAssembly it's ok to block the native thread as well.
158 /// This means that this back-and-forth between async and sync won't happen
159 /// and instead blocking operations are performed on-thread (such as opening
160 /// a file). This can improve the performance of WASI operations when async
161 /// support is disabled.
162 pub fn allow_blocking_current_thread(&mut self, enable: bool) -> &mut Self {
163 self.filesystem.allow_blocking_current_thread = enable;
164 self
165 }
166
167 /// Appends multiple environment variables at once for this builder.
168 ///
169 /// All environment variables are appended to the list of environment
170 /// variables that this builder will configure.
171 ///
172 /// At this time environment variables are not deduplicated and if the same
173 /// key is set twice then the guest will see two entries for the same key.
174 ///
175 /// # Examples
176 ///
177 /// ```
178 /// use wasmtime_wasi::WasiCtxBuilder;
179 ///
180 /// let mut wasi = WasiCtxBuilder::new();
181 /// wasi.envs(&[
182 /// ("FOO", "bar"),
183 /// ("HOME", "/somewhere"),
184 /// ]);
185 /// ```
186 pub fn envs(&mut self, env: &[(impl AsRef<str>, impl AsRef<str>)]) -> &mut Self {
187 self.cli.environment.extend(
188 env.iter()
189 .map(|(k, v)| (k.as_ref().to_owned(), v.as_ref().to_owned())),
190 );
191 self
192 }
193
194 /// Appends a single environment variable for this builder.
195 ///
196 /// At this time environment variables are not deduplicated and if the same
197 /// key is set twice then the guest will see two entries for the same key.
198 ///
199 /// # Examples
200 ///
201 /// ```
202 /// use wasmtime_wasi::WasiCtxBuilder;
203 ///
204 /// let mut wasi = WasiCtxBuilder::new();
205 /// wasi.env("FOO", "bar");
206 /// ```
207 pub fn env(&mut self, k: impl AsRef<str>, v: impl AsRef<str>) -> &mut Self {
208 self.cli
209 .environment
210 .push((k.as_ref().to_owned(), v.as_ref().to_owned()));
211 self
212 }
213
214 /// Configures all environment variables to be inherited from the calling
215 /// process into this configuration.
216 ///
217 /// This will use [`envs`](WasiCtxBuilder::envs) to append all host-defined
218 /// environment variables.
219 pub fn inherit_env(&mut self) -> &mut Self {
220 self.cli.environment.extend(std::env::vars());
221 self
222 }
223
224 /// Appends a list of arguments to the argument array to pass to wasm.
225 pub fn args(&mut self, args: &[impl AsRef<str>]) -> &mut Self {
226 self.cli
227 .arguments
228 .extend(args.iter().map(|a| a.as_ref().to_owned()));
229 self
230 }
231
232 /// Appends a single argument to get passed to wasm.
233 pub fn arg(&mut self, arg: impl AsRef<str>) -> &mut Self {
234 self.cli.arguments.push(arg.as_ref().to_owned());
235 self
236 }
237
238 /// Appends all host process arguments to the list of arguments to get
239 /// passed to wasm.
240 pub fn inherit_args(&mut self) -> &mut Self {
241 self.cli.arguments.extend(std::env::args());
242 self
243 }
244
245 /// Configures a "preopened directory" to be available to WebAssembly.
246 ///
247 /// By default WebAssembly does not have access to the filesystem because
248 /// there are no preopened directories. All filesystem operations, such as
249 /// opening a file, are done through a preexisting handle. This means that
250 /// to provide WebAssembly access to a directory it must be configured
251 /// through this API.
252 ///
253 /// WASI will also prevent access outside of files provided here. For
254 /// example `..` can't be used to traverse up from the `host_path` provided here
255 /// to the containing directory.
256 ///
257 /// * `host_path` - a path to a directory on the host to open and make
258 /// accessible to WebAssembly. Note that the name of this directory in the
259 /// guest is configured with `guest_path` below.
260 /// * `guest_path` - the name of the preopened directory from WebAssembly's
261 /// perspective. Note that this does not need to match the host's name for
262 /// the directory.
263 /// * `dir_perms` - this is the permissions that wasm will have to operate on
264 /// `guest_path`. This can be used, for example, to provide readonly access to a
265 /// directory.
266 /// * `file_perms` - similar to `dir_perms` but corresponds to the maximum set
267 /// of permissions that can be used for any file in this directory.
268 ///
269 /// # Errors
270 ///
271 /// This method will return an error if `host_path` cannot be opened.
272 ///
273 /// # Examples
274 ///
275 /// ```
276 /// use wasmtime_wasi::WasiCtxBuilder;
277 /// use wasmtime_wasi::{DirPerms, FilePerms};
278 ///
279 /// # fn main() {}
280 /// # fn foo() -> wasmtime::Result<()> {
281 /// let mut wasi = WasiCtxBuilder::new();
282 ///
283 /// // Make `./host-directory` available in the guest as `.`
284 /// wasi.preopened_dir("./host-directory", ".", DirPerms::all(), FilePerms::all());
285 ///
286 /// // Make `./readonly` available in the guest as `./ro`
287 /// wasi.preopened_dir("./readonly", "./ro", DirPerms::READ, FilePerms::READ);
288 /// # Ok(())
289 /// # }
290 /// ```
291 pub fn preopened_dir(
292 &mut self,
293 host_path: impl AsRef<Path>,
294 guest_path: impl AsRef<str>,
295 dir_perms: DirPerms,
296 file_perms: FilePerms,
297 ) -> Result<&mut Self> {
298 let dir = cap_std::fs::Dir::open_ambient_dir(host_path.as_ref(), ambient_authority())?;
299 let mut open_mode = OpenMode::empty();
300 if dir_perms.contains(DirPerms::READ) {
301 open_mode |= OpenMode::READ;
302 }
303 if dir_perms.contains(DirPerms::MUTATE) {
304 open_mode |= OpenMode::WRITE;
305 }
306 self.filesystem.preopens.push((
307 Dir::new(
308 dir,
309 dir_perms,
310 file_perms,
311 open_mode,
312 self.filesystem.allow_blocking_current_thread,
313 ),
314 guest_path.as_ref().to_owned(),
315 ));
316 Ok(self)
317 }
318
319 /// Set the generator for the `wasi:random/random` number generator to the
320 /// custom generator specified.
321 ///
322 /// Note that contexts have a default RNG configured which is a suitable
323 /// generator for WASI and is configured with a random seed per-context.
324 ///
325 /// Guest code may rely on this random number generator to produce fresh
326 /// unpredictable random data in order to maintain its security invariants,
327 /// and ideally should use the insecure random API otherwise, so using any
328 /// prerecorded or otherwise predictable data may compromise security.
329 pub fn secure_random(&mut self, random: impl RngCore + Send + 'static) -> &mut Self {
330 self.random.random = Box::new(random);
331 self
332 }
333
334 /// Configures the generator for `wasi:random/insecure`.
335 ///
336 /// The `insecure_random` generator provided will be used for all randomness
337 /// requested by the `wasi:random/insecure` interface.
338 pub fn insecure_random(&mut self, insecure_random: impl RngCore + Send + 'static) -> &mut Self {
339 self.random.insecure_random = Box::new(insecure_random);
340 self
341 }
342
343 /// Configures the seed to be returned from `wasi:random/insecure-seed` to
344 /// the specified custom value.
345 ///
346 /// By default this number is randomly generated when a builder is created.
347 pub fn insecure_random_seed(&mut self, insecure_random_seed: u128) -> &mut Self {
348 self.random.insecure_random_seed = insecure_random_seed;
349 self
350 }
351
352 /// Configures the maximum len accepted by
353 /// `wasi:random/random.get-random-bytes` and
354 /// `wasi:random/insecure.get-insecure-random-bytes`. Calls with a len
355 /// larger than this limit will trap.
356 ///
357 /// Limited to 64M by default. This limit protects the host implementation
358 /// from memory exhaustion from untrusted guest input. A limit of `u64::MAX`
359 /// is equivalent to no limit, but note that this enables a guest to also
360 /// force the host to attempt an allocation of that size.
361 pub fn max_random_size(&mut self, max_size: u64) -> &mut Self {
362 self.random.max_size = max_size;
363 self
364 }
365
366 /// Configures `wasi:clocks/wall-clock` to use the `clock` specified.
367 ///
368 /// By default the host's wall clock is used.
369 pub fn wall_clock(&mut self, clock: impl HostWallClock + 'static) -> &mut Self {
370 self.clocks.wall_clock = Box::new(clock);
371 self
372 }
373
374 /// Configures `wasi:clocks/monotonic-clock` to use the `clock` specified.
375 ///
376 /// By default the host's monotonic clock is used.
377 pub fn monotonic_clock(&mut self, clock: impl HostMonotonicClock + 'static) -> &mut Self {
378 self.clocks.monotonic_clock = Box::new(clock);
379 self
380 }
381
382 /// Allow all network addresses accessible to the host.
383 ///
384 /// This method will inherit all network addresses meaning that any address
385 /// can be bound by the guest or connected to by the guest using any
386 /// protocol.
387 ///
388 /// See also [`WasiCtxBuilder::socket_addr_check`].
389 pub fn inherit_network(&mut self) -> &mut Self {
390 self.socket_addr_check(|_, _| Box::pin(async { true }))
391 }
392
393 /// A check that will be called for each socket address that is used.
394 ///
395 /// Returning `true` will permit socket connections to the `SocketAddr`,
396 /// while returning `false` will reject the connection.
397 pub fn socket_addr_check<F>(&mut self, check: F) -> &mut Self
398 where
399 F: Fn(SocketAddr, SocketAddrUse) -> Pin<Box<dyn Future<Output = bool> + Send + Sync>>
400 + Send
401 + Sync
402 + 'static,
403 {
404 self.sockets.socket_addr_check = SocketAddrCheck::new(check);
405 self
406 }
407
408 /// Allow usage of `wasi:sockets/ip-name-lookup`
409 ///
410 /// By default this is disabled.
411 pub fn allow_ip_name_lookup(&mut self, enable: bool) -> &mut Self {
412 self.sockets.allowed_network_uses.ip_name_lookup = enable;
413 self
414 }
415
416 /// Allow usage of UDP.
417 ///
418 /// This is enabled by default, but can be disabled if UDP should be blanket
419 /// disabled.
420 pub fn allow_udp(&mut self, enable: bool) -> &mut Self {
421 self.sockets.allowed_network_uses.udp = enable;
422 self
423 }
424
425 /// Allow usage of TCP
426 ///
427 /// This is enabled by default, but can be disabled if TCP should be blanket
428 /// disabled.
429 pub fn allow_tcp(&mut self, enable: bool) -> &mut Self {
430 self.sockets.allowed_network_uses.tcp = enable;
431 self
432 }
433
434 /// Uses the configured context so far to construct the final [`WasiCtx`].
435 ///
436 /// Note that each `WasiCtxBuilder` can only be used to "build" once, and
437 /// calling this method twice will panic.
438 ///
439 /// # Panics
440 ///
441 /// Panics if this method is called twice. Each [`WasiCtxBuilder`] can be
442 /// used to create only a single [`WasiCtx`]. Repeated usage of this method
443 /// is not allowed and should use a second builder instead.
444 pub fn build(&mut self) -> WasiCtx {
445 assert!(!self.built);
446
447 let Self {
448 cli,
449 clocks,
450 filesystem,
451 random,
452 sockets,
453 built: _,
454 } = mem::replace(self, Self::new());
455 self.built = true;
456
457 WasiCtx {
458 cli,
459 clocks,
460 filesystem,
461 random,
462 sockets,
463 }
464 }
465 /// Builds a WASIp1 context instead of a [`WasiCtx`].
466 ///
467 /// This method is the same as [`build`](WasiCtxBuilder::build) but it
468 /// creates a [`WasiP1Ctx`] instead. This is intended for use with the
469 /// [`p1`] module of this crate
470 ///
471 /// [`WasiP1Ctx`]: crate::p1::WasiP1Ctx
472 /// [`p1`]: crate::p1
473 ///
474 /// # Panics
475 ///
476 /// Panics if this method is called twice. Each [`WasiCtxBuilder`] can be
477 /// used to create only a single [`WasiCtx`] or [`WasiP1Ctx`]. Repeated
478 /// usage of this method is not allowed and should use a second builder
479 /// instead.
480 #[cfg(feature = "p1")]
481 pub fn build_p1(&mut self) -> crate::p1::WasiP1Ctx {
482 let wasi = self.build();
483 crate::p1::WasiP1Ctx::new(wasi)
484 }
485}
486
487/// Per-[`Store`] state which holds state necessary to implement WASI from this
488/// crate.
489///
490/// This structure is created through [`WasiCtxBuilder`] and is stored within
491/// the `T` of [`Store<T>`][`Store`]. Access to the structure is provided
492/// through the [`WasiView`](crate::WasiView) trait as an implementation on `T`.
493///
494/// Note that this structure itself does not have any accessors, it's here for
495/// internal use within the `wasmtime-wasi` crate's implementation of
496/// bindgen-generated traits.
497///
498/// [`Store`]: wasmtime::Store
499///
500/// # Example
501///
502/// ```
503/// use wasmtime_wasi::{ResourceTable, WasiCtx, WasiCtxView, WasiView, WasiCtxBuilder};
504///
505/// struct MyState {
506/// ctx: WasiCtx,
507/// table: ResourceTable,
508/// }
509///
510/// impl WasiView for MyState {
511/// fn ctx(&mut self) -> WasiCtxView<'_> {
512/// WasiCtxView { ctx: &mut self.ctx, table: &mut self.table }
513/// }
514/// }
515///
516/// impl MyState {
517/// fn new() -> MyState {
518/// let mut wasi = WasiCtxBuilder::new();
519/// wasi.arg("./foo.wasm");
520/// wasi.arg("--help");
521/// wasi.env("FOO", "bar");
522///
523/// MyState {
524/// ctx: wasi.build(),
525/// table: ResourceTable::new(),
526/// }
527/// }
528/// }
529/// ```
530#[derive(Default)]
531pub struct WasiCtx {
532 pub(crate) cli: WasiCliCtx,
533 pub(crate) clocks: WasiClocksCtx,
534 pub(crate) filesystem: WasiFilesystemCtx,
535 pub(crate) random: WasiRandomCtx,
536 pub(crate) sockets: WasiSocketsCtx,
537}
538
539impl WasiCtx {
540 /// Convenience function for calling [`WasiCtxBuilder::new`].
541 pub fn builder() -> WasiCtxBuilder {
542 WasiCtxBuilder::new()
543 }
544
545 /// Returns access to the underlying [`WasiRandomCtx`].
546 pub fn random(&mut self) -> &mut WasiRandomCtx {
547 &mut self.random
548 }
549
550 /// Returns access to the underlying [`WasiClocksCtx`].
551 pub fn clocks(&mut self) -> &mut WasiClocksCtx {
552 &mut self.clocks
553 }
554
555 /// Returns access to the underlying [`WasiFilesystemCtx`].
556 pub fn filesystem(&mut self) -> &mut WasiFilesystemCtx {
557 &mut self.filesystem
558 }
559
560 /// Returns access to the underlying [`WasiCliCtx`].
561 pub fn cli(&mut self) -> &mut WasiCliCtx {
562 &mut self.cli
563 }
564
565 /// Returns access to the underlying [`WasiSocketsCtx`].
566 pub fn sockets(&mut self) -> &mut WasiSocketsCtx {
567 &mut self.sockets
568 }
569}