2019-09-04 17:56:51 -04:00
|
|
|
# WebAssembly System Interface (WASI)
|
|
|
|
|
2020-04-24 18:43:06 +02:00
|
|
|
<!--introduced_in=v12.16.0-->
|
2019-09-04 17:56:51 -04:00
|
|
|
|
|
|
|
> Stability: 1 - Experimental
|
|
|
|
|
2023-10-25 10:56:26 -07:00
|
|
|
<strong class="critical">The `node:wasi` module does not currently provide the
|
|
|
|
comprehensive file system security properties provided by some WASI runtimes.
|
|
|
|
Full support for secure file system sandboxing may or may not be implemented in
|
|
|
|
future. In the mean time, do not rely on it to run untrusted code. </strong>
|
|
|
|
|
2020-06-22 13:56:08 -04:00
|
|
|
<!-- source_link=lib/wasi.js -->
|
|
|
|
|
2019-09-04 17:56:51 -04:00
|
|
|
The WASI API provides an implementation of the [WebAssembly System Interface][]
|
2023-10-25 10:56:26 -07:00
|
|
|
specification. WASI gives WebAssembly applications access to the underlying
|
|
|
|
operating system via a collection of POSIX-like functions.
|
2019-09-04 17:56:51 -04:00
|
|
|
|
2021-02-10 15:20:37 +01:00
|
|
|
```mjs
|
2022-04-20 10:23:41 +02:00
|
|
|
import { readFile } from 'node:fs/promises';
|
2024-07-21 17:44:27 +02:00
|
|
|
import { WASI } from 'node:wasi';
|
2022-04-20 10:23:41 +02:00
|
|
|
import { argv, env } from 'node:process';
|
2021-01-08 16:55:52 +01:00
|
|
|
|
2019-09-04 17:56:51 -04:00
|
|
|
const wasi = new WASI({
|
2023-01-31 18:46:55 -05:00
|
|
|
version: 'preview1',
|
2021-06-15 10:09:29 -07:00
|
|
|
args: argv,
|
|
|
|
env,
|
2019-09-04 17:56:51 -04:00
|
|
|
preopens: {
|
2023-10-25 10:56:26 -07:00
|
|
|
'/local': '/some/real/path/that/wasm/can/access',
|
2022-11-17 08:19:12 -05:00
|
|
|
},
|
2019-09-04 17:56:51 -04:00
|
|
|
});
|
2021-08-28 10:16:49 -07:00
|
|
|
|
|
|
|
const wasm = await WebAssembly.compile(
|
2022-11-17 08:19:12 -05:00
|
|
|
await readFile(new URL('./demo.wasm', import.meta.url)),
|
2021-08-28 10:16:49 -07:00
|
|
|
);
|
2023-01-31 18:46:55 -05:00
|
|
|
const instance = await WebAssembly.instantiate(wasm, wasi.getImportObject());
|
2019-09-04 17:56:51 -04:00
|
|
|
|
2021-01-08 16:55:52 +01:00
|
|
|
wasi.start(instance);
|
2019-09-04 17:56:51 -04:00
|
|
|
```
|
2021-01-31 23:10:11 +01:00
|
|
|
|
|
|
|
```cjs
|
|
|
|
'use strict';
|
2022-04-20 10:23:41 +02:00
|
|
|
const { readFile } = require('node:fs/promises');
|
2024-07-21 17:44:27 +02:00
|
|
|
const { WASI } = require('node:wasi');
|
2022-04-20 10:23:41 +02:00
|
|
|
const { argv, env } = require('node:process');
|
|
|
|
const { join } = require('node:path');
|
2021-06-15 10:09:29 -07:00
|
|
|
|
2021-01-31 23:10:11 +01:00
|
|
|
const wasi = new WASI({
|
2023-01-31 18:46:55 -05:00
|
|
|
version: 'preview1',
|
2021-06-15 10:09:29 -07:00
|
|
|
args: argv,
|
|
|
|
env,
|
2021-01-31 23:10:11 +01:00
|
|
|
preopens: {
|
2023-10-25 10:56:26 -07:00
|
|
|
'/local': '/some/real/path/that/wasm/can/access',
|
2022-11-17 08:19:12 -05:00
|
|
|
},
|
2021-01-31 23:10:11 +01:00
|
|
|
});
|
2021-08-28 10:16:49 -07:00
|
|
|
|
2021-01-31 23:10:11 +01:00
|
|
|
(async () => {
|
2021-08-28 10:16:49 -07:00
|
|
|
const wasm = await WebAssembly.compile(
|
2022-11-17 08:19:12 -05:00
|
|
|
await readFile(join(__dirname, 'demo.wasm')),
|
2021-08-28 10:16:49 -07:00
|
|
|
);
|
2023-01-31 18:46:55 -05:00
|
|
|
const instance = await WebAssembly.instantiate(wasm, wasi.getImportObject());
|
2021-01-31 23:10:11 +01:00
|
|
|
|
|
|
|
wasi.start(instance);
|
|
|
|
})();
|
|
|
|
```
|
2019-09-04 17:56:51 -04:00
|
|
|
|
2020-05-29 01:07:50 +05:30
|
|
|
To run the above example, create a new WebAssembly text format file named
|
|
|
|
`demo.wat`:
|
|
|
|
|
|
|
|
```text
|
|
|
|
(module
|
|
|
|
;; Import the required fd_write WASI function which will write the given io vectors to stdout
|
|
|
|
;; The function signature for fd_write is:
|
|
|
|
;; (File Descriptor, *iovs, iovs_len, nwritten) -> Returns number of bytes written
|
|
|
|
(import "wasi_snapshot_preview1" "fd_write" (func $fd_write (param i32 i32 i32 i32) (result i32)))
|
|
|
|
|
|
|
|
(memory 1)
|
|
|
|
(export "memory" (memory 0))
|
|
|
|
|
|
|
|
;; Write 'hello world\n' to memory at an offset of 8 bytes
|
|
|
|
;; Note the trailing newline which is required for the text to appear
|
|
|
|
(data (i32.const 8) "hello world\n")
|
|
|
|
|
|
|
|
(func $main (export "_start")
|
|
|
|
;; Creating a new io vector within linear memory
|
|
|
|
(i32.store (i32.const 0) (i32.const 8)) ;; iov.iov_base - This is a pointer to the start of the 'hello world\n' string
|
|
|
|
(i32.store (i32.const 4) (i32.const 12)) ;; iov.iov_len - The length of the 'hello world\n' string
|
|
|
|
|
|
|
|
(call $fd_write
|
|
|
|
(i32.const 1) ;; file_descriptor - 1 for stdout
|
|
|
|
(i32.const 0) ;; *iovs - The pointer to the iov array, which is stored at memory location 0
|
|
|
|
(i32.const 1) ;; iovs_len - We're printing 1 string stored in an iov - so one.
|
|
|
|
(i32.const 20) ;; nwritten - A place in memory to store the number of bytes written
|
|
|
|
)
|
|
|
|
drop ;; Discard the number of bytes written from the top of the stack
|
|
|
|
)
|
|
|
|
)
|
|
|
|
```
|
|
|
|
|
|
|
|
Use [wabt](https://github.com/WebAssembly/wabt) to compile `.wat` to `.wasm`
|
|
|
|
|
2023-05-20 00:14:03 +02:00
|
|
|
```bash
|
|
|
|
wat2wasm demo.wat
|
2020-05-29 01:07:50 +05:30
|
|
|
```
|
|
|
|
|
2023-10-25 10:56:26 -07:00
|
|
|
## Security
|
|
|
|
|
|
|
|
<!-- YAML
|
2023-12-12 00:10:33 +00:00
|
|
|
added:
|
|
|
|
- v21.2.0
|
|
|
|
- v20.11.0
|
2023-10-25 10:56:26 -07:00
|
|
|
changes:
|
2023-12-12 00:10:33 +00:00
|
|
|
- version:
|
|
|
|
- v21.2.0
|
|
|
|
- v20.11.0
|
2023-10-25 10:56:26 -07:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/50396
|
|
|
|
description: Clarify WASI security properties.
|
|
|
|
-->
|
|
|
|
|
|
|
|
WASI provides a capabilities-based model through which applications are provided
|
|
|
|
their own custom `env`, `preopens`, `stdin`, `stdout`, `stderr`, and `exit`
|
|
|
|
capabilities.
|
|
|
|
|
|
|
|
**The current Node.js threat model does not provide secure sandboxing as is
|
|
|
|
present in some WASI runtimes.**
|
|
|
|
|
|
|
|
While the capability features are supported, they do not form a security model
|
|
|
|
in Node.js. For example, the file system sandboxing can be escaped with various
|
|
|
|
techniques. The project is exploring whether these security guarantees could be
|
|
|
|
added in future.
|
|
|
|
|
2019-12-24 16:07:25 -08:00
|
|
|
## Class: `WASI`
|
2021-10-10 21:55:04 -07:00
|
|
|
|
2019-09-04 17:56:51 -04:00
|
|
|
<!-- YAML
|
2020-04-24 18:43:06 +02:00
|
|
|
added:
|
|
|
|
- v13.3.0
|
|
|
|
- v12.16.0
|
2019-09-04 17:56:51 -04:00
|
|
|
-->
|
|
|
|
|
|
|
|
The `WASI` class provides the WASI system call API and additional convenience
|
|
|
|
methods for working with WASI-based applications. Each `WASI` instance
|
2023-10-25 10:56:26 -07:00
|
|
|
represents a distinct environment.
|
2019-09-04 17:56:51 -04:00
|
|
|
|
2019-12-24 16:07:25 -08:00
|
|
|
### `new WASI([options])`
|
2021-10-10 21:55:04 -07:00
|
|
|
|
2019-09-04 17:56:51 -04:00
|
|
|
<!-- YAML
|
2020-04-24 18:43:06 +02:00
|
|
|
added:
|
|
|
|
- v13.3.0
|
|
|
|
- v12.16.0
|
2023-01-31 18:46:55 -05:00
|
|
|
changes:
|
2023-05-02 09:36:58 +02:00
|
|
|
- version: v20.1.0
|
2023-04-03 15:35:46 -04:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/47390
|
|
|
|
description: default value of returnOnExit changed to true.
|
2023-04-18 18:48:23 +02:00
|
|
|
- version: v20.0.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/47391
|
|
|
|
description: The version option is now required and has no default value.
|
2023-03-14 08:50:18 +01:00
|
|
|
- version: v19.8.0
|
2023-01-31 18:46:55 -05:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/46469
|
|
|
|
description: version field added to options.
|
2019-09-04 17:56:51 -04:00
|
|
|
-->
|
|
|
|
|
|
|
|
* `options` {Object}
|
|
|
|
* `args` {Array} An array of strings that the WebAssembly application will
|
2020-09-14 17:28:27 -07:00
|
|
|
see as command-line arguments. The first argument is the virtual path to the
|
2019-09-04 17:56:51 -04:00
|
|
|
WASI command itself. **Default:** `[]`.
|
|
|
|
* `env` {Object} An object similar to `process.env` that the WebAssembly
|
|
|
|
application will see as its environment. **Default:** `{}`.
|
|
|
|
* `preopens` {Object} This object represents the WebAssembly application's
|
2023-10-25 10:56:26 -07:00
|
|
|
local directory structure. The string keys of `preopens` are treated as
|
|
|
|
directories within the file system. The corresponding values in `preopens`
|
|
|
|
are the real paths to those directories on the host machine.
|
2023-04-03 15:35:46 -04:00
|
|
|
* `returnOnExit` {boolean} By default, when WASI applications call
|
|
|
|
`__wasi_proc_exit()` `wasi.start()` will return with the exit code
|
2023-04-23 17:04:08 +03:30
|
|
|
specified rather than terminating the process. Setting this option to
|
2023-04-03 15:35:46 -04:00
|
|
|
`false` will cause the Node.js process to exit with the specified
|
|
|
|
exit code instead. **Default:** `true`.
|
2020-03-26 00:22:13 -04:00
|
|
|
* `stdin` {integer} The file descriptor used as standard input in the
|
|
|
|
WebAssembly application. **Default:** `0`.
|
|
|
|
* `stdout` {integer} The file descriptor used as standard output in the
|
|
|
|
WebAssembly application. **Default:** `1`.
|
|
|
|
* `stderr` {integer} The file descriptor used as standard error in the
|
|
|
|
WebAssembly application. **Default:** `2`.
|
2023-01-31 18:46:55 -05:00
|
|
|
* `version` {string} The version of WASI requested. Currently the only
|
2023-04-03 17:50:18 -04:00
|
|
|
supported versions are `unstable` and `preview1`. This option is
|
|
|
|
mandatory.
|
2023-01-31 18:46:55 -05:00
|
|
|
|
|
|
|
### `wasi.getImportObject()`
|
|
|
|
|
|
|
|
<!-- YAML
|
2023-03-14 08:50:18 +01:00
|
|
|
added: v19.8.0
|
2023-01-31 18:46:55 -05:00
|
|
|
-->
|
|
|
|
|
|
|
|
Return an import object that can be passed to `WebAssembly.instantiate()` if
|
|
|
|
no other WASM imports are needed beyond those provided by WASI.
|
|
|
|
|
|
|
|
If version `unstable` was passed into the constructor it will return:
|
|
|
|
|
|
|
|
```json
|
|
|
|
{ wasi_unstable: wasi.wasiImport }
|
|
|
|
```
|
|
|
|
|
|
|
|
If version `preview1` was passed into the constructor or no version was
|
|
|
|
specified it will return:
|
|
|
|
|
|
|
|
```json
|
|
|
|
{ wasi_snapshot_preview1: wasi.wasiImport }
|
|
|
|
```
|
2019-09-04 17:56:51 -04:00
|
|
|
|
2019-12-24 16:07:25 -08:00
|
|
|
### `wasi.start(instance)`
|
2021-10-10 21:55:04 -07:00
|
|
|
|
2019-09-04 17:56:51 -04:00
|
|
|
<!-- YAML
|
2020-04-24 18:43:06 +02:00
|
|
|
added:
|
|
|
|
- v13.3.0
|
|
|
|
- v12.16.0
|
2019-09-04 17:56:51 -04:00
|
|
|
-->
|
|
|
|
|
|
|
|
* `instance` {WebAssembly.Instance}
|
|
|
|
|
2020-04-26 01:20:10 -04:00
|
|
|
Attempt to begin execution of `instance` as a WASI command by invoking its
|
|
|
|
`_start()` export. If `instance` does not contain a `_start()` export, or if
|
|
|
|
`instance` contains an `_initialize()` export, then an exception is thrown.
|
2019-09-04 17:56:51 -04:00
|
|
|
|
|
|
|
`start()` requires that `instance` exports a [`WebAssembly.Memory`][] named
|
|
|
|
`memory`. If `instance` does not have a `memory` export an exception is thrown.
|
|
|
|
|
2020-04-26 01:20:10 -04:00
|
|
|
If `start()` is called more than once, an exception is thrown.
|
|
|
|
|
2020-06-24 19:45:03 -05:00
|
|
|
### `wasi.initialize(instance)`
|
2021-10-10 21:55:04 -07:00
|
|
|
|
2020-06-24 19:45:03 -05:00
|
|
|
<!-- YAML
|
|
|
|
added:
|
2020-07-15 14:11:29 -04:00
|
|
|
- v14.6.0
|
2020-09-28 10:54:13 -07:00
|
|
|
- v12.19.0
|
2020-06-24 19:45:03 -05:00
|
|
|
-->
|
|
|
|
|
|
|
|
* `instance` {WebAssembly.Instance}
|
|
|
|
|
|
|
|
Attempt to initialize `instance` as a WASI reactor by invoking its
|
|
|
|
`_initialize()` export, if it is present. If `instance` contains a `_start()`
|
|
|
|
export, then an exception is thrown.
|
|
|
|
|
|
|
|
`initialize()` requires that `instance` exports a [`WebAssembly.Memory`][] named
|
|
|
|
`memory`. If `instance` does not have a `memory` export an exception is thrown.
|
|
|
|
|
|
|
|
If `initialize()` is called more than once, an exception is thrown.
|
|
|
|
|
2019-12-24 16:07:25 -08:00
|
|
|
### `wasi.wasiImport`
|
2021-10-10 21:55:04 -07:00
|
|
|
|
2019-09-04 17:56:51 -04:00
|
|
|
<!-- YAML
|
2020-04-24 18:43:06 +02:00
|
|
|
added:
|
|
|
|
- v13.3.0
|
|
|
|
- v12.16.0
|
2019-09-04 17:56:51 -04:00
|
|
|
-->
|
|
|
|
|
|
|
|
* {Object}
|
|
|
|
|
|
|
|
`wasiImport` is an object that implements the WASI system call API. This object
|
2019-12-15 10:38:58 -05:00
|
|
|
should be passed as the `wasi_snapshot_preview1` import during the instantiation
|
|
|
|
of a [`WebAssembly.Instance`][].
|
2019-09-04 17:56:51 -04:00
|
|
|
|
2020-09-17 18:53:37 +02:00
|
|
|
[WebAssembly System Interface]: https://wasi.dev/
|
2019-09-04 17:56:51 -04:00
|
|
|
[`WebAssembly.Instance`]: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/WebAssembly/Instance
|
|
|
|
[`WebAssembly.Memory`]: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/WebAssembly/Memory
|