2026-03-11 08:27:30 +00:00
|
|
|
use std::path::PathBuf;
|
|
|
|
|
|
|
|
|
|
use anyhow::Context;
|
|
|
|
|
|
|
|
|
|
fn main() -> anyhow::Result<()> {
|
|
|
|
|
tracing_subscriber::fmt()
|
|
|
|
|
.with_env_filter(
|
|
|
|
|
tracing_subscriber::EnvFilter::try_from_default_env()
|
|
|
|
|
.unwrap_or_else(|_| tracing_subscriber::EnvFilter::new("info")),
|
|
|
|
|
)
|
|
|
|
|
.init();
|
|
|
|
|
|
|
|
|
|
let args: Vec<String> = std::env::args().collect();
|
|
|
|
|
if args.len() < 3 {
|
2026-03-11 14:10:11 +00:00
|
|
|
anyhow::bail!(
|
|
|
|
|
"usage: weft-runtime <app_id> <session_id> \
|
|
|
|
|
[--preopen HOST::GUEST]... [--ipc-socket PATH]"
|
|
|
|
|
);
|
2026-03-11 08:27:30 +00:00
|
|
|
}
|
|
|
|
|
let app_id = &args[1];
|
|
|
|
|
let session_id: u64 = args[2]
|
|
|
|
|
.parse()
|
|
|
|
|
.with_context(|| format!("invalid session_id: {}", args[2]))?;
|
|
|
|
|
|
2026-03-11 14:10:11 +00:00
|
|
|
let mut preopen: Vec<(String, String)> = Vec::new();
|
|
|
|
|
let mut ipc_socket: Option<String> = None;
|
|
|
|
|
|
|
|
|
|
let mut i = 3usize;
|
|
|
|
|
while i < args.len() {
|
|
|
|
|
match args[i].as_str() {
|
|
|
|
|
"--preopen" => {
|
|
|
|
|
i += 1;
|
|
|
|
|
let spec = args.get(i).context("--preopen requires an argument")?;
|
|
|
|
|
if let Some((host, guest)) = spec.split_once("::") {
|
|
|
|
|
preopen.push((host.to_string(), guest.to_string()));
|
|
|
|
|
} else {
|
|
|
|
|
preopen.push((spec.clone(), spec.clone()));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
"--ipc-socket" => {
|
|
|
|
|
i += 1;
|
|
|
|
|
ipc_socket = Some(
|
|
|
|
|
args.get(i)
|
|
|
|
|
.context("--ipc-socket requires an argument")?
|
|
|
|
|
.clone(),
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
other => anyhow::bail!("unexpected argument: {other}"),
|
|
|
|
|
}
|
|
|
|
|
i += 1;
|
|
|
|
|
}
|
|
|
|
|
|
feat(runtime): seccomp blocklist filter via optional seccomp feature
Add seccomp feature flag (seccompiler + libc, Linux-only, optional).
When compiled with --features seccomp, weft-runtime installs a
SECCOMP_MODE_FILTER immediately after argument parsing, before any
package resolution or WASM execution.
Filter strategy: default-allow with explicit KillProcess rules for
high-risk syscalls a WASM runtime process has no legitimate need for:
ptrace, process_vm_readv/writev, kexec_load, personality, syslog,
reboot, mount/umount2, setuid/setgid/setreuid/setregid/setresuid/
setresgid, chroot, pivot_root, init_module/finit_module/delete_module,
bpf, perf_event_open, acct.
The feature is off by default so the standard build and tests are
unaffected. Enable in production service builds with --features seccomp.
2026-03-11 14:34:21 +00:00
|
|
|
#[cfg(feature = "seccomp")]
|
|
|
|
|
apply_seccomp_filter().context("apply seccomp filter")?;
|
|
|
|
|
|
2026-03-11 08:27:30 +00:00
|
|
|
tracing::info!(session_id, %app_id, "weft-runtime starting");
|
|
|
|
|
|
|
|
|
|
let pkg_dir = resolve_package(app_id)?;
|
|
|
|
|
tracing::info!(path = %pkg_dir.display(), "package resolved");
|
|
|
|
|
|
|
|
|
|
let wasm_path = pkg_dir.join("app.wasm");
|
|
|
|
|
if !wasm_path.exists() {
|
|
|
|
|
anyhow::bail!("app.wasm not found at {}", wasm_path.display());
|
|
|
|
|
}
|
|
|
|
|
|
2026-03-11 09:26:41 +00:00
|
|
|
tracing::info!(session_id, %app_id, wasm = %wasm_path.display(), "executing module");
|
2026-03-11 14:10:11 +00:00
|
|
|
run_module(&wasm_path, &preopen, ipc_socket.as_deref())?;
|
2026-03-11 08:27:30 +00:00
|
|
|
|
|
|
|
|
tracing::info!(session_id, %app_id, "exiting");
|
|
|
|
|
Ok(())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn resolve_package(app_id: &str) -> anyhow::Result<PathBuf> {
|
|
|
|
|
for store_root in package_store_roots() {
|
|
|
|
|
let pkg_dir = store_root.join(app_id);
|
|
|
|
|
let manifest = pkg_dir.join("wapp.toml");
|
|
|
|
|
if manifest.exists() {
|
|
|
|
|
return Ok(pkg_dir);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
anyhow::bail!("package '{}' not found in any package store", app_id)
|
|
|
|
|
}
|
|
|
|
|
|
2026-03-11 09:26:41 +00:00
|
|
|
#[cfg(not(feature = "wasmtime-runtime"))]
|
2026-03-11 14:10:11 +00:00
|
|
|
fn run_module(
|
|
|
|
|
_wasm_path: &std::path::Path,
|
|
|
|
|
_preopen: &[(String, String)],
|
|
|
|
|
_ipc_socket: Option<&str>,
|
|
|
|
|
) -> anyhow::Result<()> {
|
2026-03-11 09:26:41 +00:00
|
|
|
println!("READY");
|
|
|
|
|
Ok(())
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(feature = "wasmtime-runtime")]
|
2026-03-11 14:10:11 +00:00
|
|
|
fn run_module(
|
|
|
|
|
wasm_path: &std::path::Path,
|
|
|
|
|
preopen: &[(String, String)],
|
|
|
|
|
ipc_socket: Option<&str>,
|
|
|
|
|
) -> anyhow::Result<()> {
|
|
|
|
|
use cap_std::{ambient_authority, fs::Dir};
|
2026-03-11 14:03:16 +00:00
|
|
|
use wasmtime::{
|
|
|
|
|
Config, Engine, Store,
|
|
|
|
|
component::{Component, Linker},
|
|
|
|
|
};
|
|
|
|
|
use wasmtime_wasi::{
|
2026-03-11 14:10:11 +00:00
|
|
|
DirPerms, FilePerms, ResourceTable, WasiCtx, WasiCtxBuilder, WasiView, add_to_linker_sync,
|
2026-03-11 14:03:16 +00:00
|
|
|
bindings::sync::Command,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct State {
|
|
|
|
|
ctx: WasiCtx,
|
|
|
|
|
table: ResourceTable,
|
|
|
|
|
}
|
2026-03-11 09:26:41 +00:00
|
|
|
|
2026-03-11 14:03:16 +00:00
|
|
|
impl WasiView for State {
|
|
|
|
|
fn ctx(&mut self) -> &mut WasiCtx {
|
|
|
|
|
&mut self.ctx
|
|
|
|
|
}
|
|
|
|
|
fn table(&mut self) -> &mut ResourceTable {
|
|
|
|
|
&mut self.table
|
|
|
|
|
}
|
|
|
|
|
}
|
2026-03-11 09:26:41 +00:00
|
|
|
|
2026-03-11 14:03:16 +00:00
|
|
|
let mut config = Config::new();
|
|
|
|
|
config.wasm_component_model(true);
|
|
|
|
|
let engine = Engine::new(&config).context("create engine")?;
|
2026-03-11 09:26:41 +00:00
|
|
|
|
2026-03-11 14:03:16 +00:00
|
|
|
let component = Component::from_file(&engine, wasm_path)
|
|
|
|
|
.with_context(|| format!("load component {}", wasm_path.display()))?;
|
|
|
|
|
|
|
|
|
|
let mut linker: Linker<State> = Linker::new(&engine);
|
|
|
|
|
add_to_linker_sync(&mut linker).context("add WASI to linker")?;
|
2026-03-11 14:15:11 +00:00
|
|
|
linker
|
|
|
|
|
.instance("weft:app/notify@0.1.0")
|
|
|
|
|
.context("define weft:app/notify instance")?
|
|
|
|
|
.func_wrap("ready", |_: wasmtime::StoreContextMut<'_, State>, ()| {
|
|
|
|
|
println!("READY");
|
|
|
|
|
Ok::<(), wasmtime::Error>(())
|
|
|
|
|
})
|
|
|
|
|
.context("define weft:app/notify#ready")?;
|
2026-03-11 14:03:16 +00:00
|
|
|
|
2026-03-11 14:10:11 +00:00
|
|
|
let mut ctx_builder = WasiCtxBuilder::new();
|
|
|
|
|
ctx_builder.inherit_stdout().inherit_stderr();
|
|
|
|
|
|
|
|
|
|
if let Some(socket_path) = ipc_socket {
|
|
|
|
|
ctx_builder.env("WEFT_IPC_SOCKET", socket_path);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (host_path, guest_path) in preopen {
|
|
|
|
|
let dir = Dir::open_ambient_dir(host_path, ambient_authority())
|
|
|
|
|
.with_context(|| format!("open preopen dir {host_path}"))?;
|
|
|
|
|
ctx_builder.preopened_dir(dir, DirPerms::all(), FilePerms::all(), guest_path);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let ctx = ctx_builder.build();
|
2026-03-11 14:03:16 +00:00
|
|
|
let mut store = Store::new(
|
|
|
|
|
&engine,
|
|
|
|
|
State {
|
|
|
|
|
ctx,
|
|
|
|
|
table: ResourceTable::new(),
|
|
|
|
|
},
|
|
|
|
|
);
|
2026-03-11 09:26:41 +00:00
|
|
|
|
2026-03-11 14:03:16 +00:00
|
|
|
let command =
|
|
|
|
|
Command::instantiate(&mut store, &component, &linker).context("instantiate component")?;
|
2026-03-11 09:26:41 +00:00
|
|
|
|
2026-03-11 14:03:16 +00:00
|
|
|
command
|
|
|
|
|
.wasi_cli_run()
|
|
|
|
|
.call_run(&mut store)
|
|
|
|
|
.context("call run")?
|
|
|
|
|
.map_err(|()| anyhow::anyhow!("wasm component run exited with error"))
|
2026-03-11 09:26:41 +00:00
|
|
|
}
|
|
|
|
|
|
feat(runtime): seccomp blocklist filter via optional seccomp feature
Add seccomp feature flag (seccompiler + libc, Linux-only, optional).
When compiled with --features seccomp, weft-runtime installs a
SECCOMP_MODE_FILTER immediately after argument parsing, before any
package resolution or WASM execution.
Filter strategy: default-allow with explicit KillProcess rules for
high-risk syscalls a WASM runtime process has no legitimate need for:
ptrace, process_vm_readv/writev, kexec_load, personality, syslog,
reboot, mount/umount2, setuid/setgid/setreuid/setregid/setresuid/
setresgid, chroot, pivot_root, init_module/finit_module/delete_module,
bpf, perf_event_open, acct.
The feature is off by default so the standard build and tests are
unaffected. Enable in production service builds with --features seccomp.
2026-03-11 14:34:21 +00:00
|
|
|
#[cfg(feature = "seccomp")]
|
|
|
|
|
fn apply_seccomp_filter() -> anyhow::Result<()> {
|
|
|
|
|
use seccompiler::{BpfProgram, SeccompAction, SeccompFilter, SeccompRule};
|
|
|
|
|
use std::collections::BTreeMap;
|
|
|
|
|
use std::convert::TryInto;
|
|
|
|
|
|
|
|
|
|
#[cfg(target_arch = "x86_64")]
|
|
|
|
|
let arch = seccompiler::TargetArch::x86_64;
|
|
|
|
|
#[cfg(target_arch = "aarch64")]
|
|
|
|
|
let arch = seccompiler::TargetArch::aarch64;
|
|
|
|
|
|
|
|
|
|
let blocked: &[i64] = &[
|
|
|
|
|
libc::SYS_ptrace,
|
|
|
|
|
libc::SYS_process_vm_readv,
|
|
|
|
|
libc::SYS_process_vm_writev,
|
|
|
|
|
libc::SYS_kexec_load,
|
|
|
|
|
libc::SYS_personality,
|
|
|
|
|
libc::SYS_syslog,
|
|
|
|
|
libc::SYS_reboot,
|
|
|
|
|
libc::SYS_mount,
|
|
|
|
|
libc::SYS_umount2,
|
|
|
|
|
libc::SYS_setuid,
|
|
|
|
|
libc::SYS_setgid,
|
|
|
|
|
libc::SYS_setreuid,
|
|
|
|
|
libc::SYS_setregid,
|
|
|
|
|
libc::SYS_setresuid,
|
|
|
|
|
libc::SYS_setresgid,
|
|
|
|
|
libc::SYS_chroot,
|
|
|
|
|
libc::SYS_pivot_root,
|
|
|
|
|
libc::SYS_init_module,
|
|
|
|
|
libc::SYS_finit_module,
|
|
|
|
|
libc::SYS_delete_module,
|
|
|
|
|
libc::SYS_bpf,
|
|
|
|
|
libc::SYS_perf_event_open,
|
|
|
|
|
libc::SYS_acct,
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
let mut rules: BTreeMap<i64, Vec<SeccompRule>> = BTreeMap::new();
|
|
|
|
|
for &syscall in blocked {
|
|
|
|
|
rules.insert(syscall, vec![SeccompRule::new(vec![])?]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let filter = SeccompFilter::new(
|
|
|
|
|
rules,
|
|
|
|
|
SeccompAction::Allow,
|
|
|
|
|
SeccompAction::KillProcess,
|
|
|
|
|
arch,
|
|
|
|
|
)?;
|
|
|
|
|
let bpf: BpfProgram = filter.try_into()?;
|
|
|
|
|
seccompiler::apply_filter(&bpf)?;
|
|
|
|
|
Ok(())
|
|
|
|
|
}
|
|
|
|
|
|
2026-03-11 08:27:30 +00:00
|
|
|
fn package_store_roots() -> Vec<PathBuf> {
|
|
|
|
|
if let Ok(explicit) = std::env::var("WEFT_APP_STORE") {
|
|
|
|
|
return vec![PathBuf::from(explicit)];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let mut roots = Vec::new();
|
|
|
|
|
|
|
|
|
|
if let Ok(home) = std::env::var("HOME") {
|
|
|
|
|
roots.push(
|
|
|
|
|
PathBuf::from(home)
|
|
|
|
|
.join(".local")
|
|
|
|
|
.join("share")
|
|
|
|
|
.join("weft")
|
|
|
|
|
.join("apps"),
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
roots.push(PathBuf::from("/usr/share/weft/apps"));
|
|
|
|
|
|
|
|
|
|
roots
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(test)]
|
|
|
|
|
mod tests {
|
|
|
|
|
use super::*;
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn package_store_roots_includes_system_path() {
|
|
|
|
|
let roots = package_store_roots();
|
|
|
|
|
assert!(
|
|
|
|
|
roots
|
|
|
|
|
.iter()
|
|
|
|
|
.any(|p| p == &PathBuf::from("/usr/share/weft/apps"))
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn package_store_roots_uses_weft_app_store_when_set() {
|
|
|
|
|
// SAFETY: test binary is single-threaded at this point.
|
|
|
|
|
unsafe { std::env::set_var("WEFT_APP_STORE", "/custom/store") };
|
|
|
|
|
let roots = package_store_roots();
|
|
|
|
|
assert_eq!(roots, vec![PathBuf::from("/custom/store")]);
|
|
|
|
|
unsafe { std::env::remove_var("WEFT_APP_STORE") };
|
|
|
|
|
}
|
2026-03-11 11:19:17 +00:00
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn resolve_package_finds_installed_package() {
|
|
|
|
|
use std::fs;
|
|
|
|
|
let store =
|
|
|
|
|
std::env::temp_dir().join(format!("weft_runtime_resolve_{}", std::process::id()));
|
|
|
|
|
let pkg_dir = store.join("com.example.resolve");
|
|
|
|
|
fs::create_dir_all(&pkg_dir).unwrap();
|
|
|
|
|
fs::write(
|
|
|
|
|
pkg_dir.join("wapp.toml"),
|
|
|
|
|
"[package]\nid=\"com.example.resolve\"\n",
|
|
|
|
|
)
|
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
|
|
let prior = std::env::var("WEFT_APP_STORE").ok();
|
|
|
|
|
unsafe { std::env::set_var("WEFT_APP_STORE", &store) };
|
|
|
|
|
|
|
|
|
|
let result = resolve_package("com.example.resolve");
|
|
|
|
|
|
|
|
|
|
unsafe {
|
|
|
|
|
match prior {
|
|
|
|
|
Some(v) => std::env::set_var("WEFT_APP_STORE", v),
|
|
|
|
|
None => std::env::remove_var("WEFT_APP_STORE"),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
let _ = fs::remove_dir_all(&store);
|
|
|
|
|
|
|
|
|
|
assert!(result.is_ok());
|
|
|
|
|
assert!(result.unwrap().ends_with("com.example.resolve"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn resolve_package_errors_on_unknown_id() {
|
|
|
|
|
let store =
|
|
|
|
|
std::env::temp_dir().join(format!("weft_runtime_resolve_empty_{}", std::process::id()));
|
|
|
|
|
let _ = std::fs::create_dir_all(&store);
|
|
|
|
|
|
|
|
|
|
let prior = std::env::var("WEFT_APP_STORE").ok();
|
|
|
|
|
unsafe { std::env::set_var("WEFT_APP_STORE", &store) };
|
|
|
|
|
|
|
|
|
|
let result = resolve_package("com.does.not.exist");
|
|
|
|
|
|
|
|
|
|
unsafe {
|
|
|
|
|
match prior {
|
|
|
|
|
Some(v) => std::env::set_var("WEFT_APP_STORE", v),
|
|
|
|
|
None => std::env::remove_var("WEFT_APP_STORE"),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
let _ = std::fs::remove_dir_all(&store);
|
|
|
|
|
|
|
|
|
|
assert!(result.is_err());
|
|
|
|
|
}
|
2026-03-11 08:27:30 +00:00
|
|
|
}
|