Conversation
d41bc38 to
655d584
Compare
…les (bytecodealliance#6737)" (bytecodealliance#6830) * [12.0.0] Revert "Require wasmtime options are first when running modules (bytecodealliance#6737)" This reverts commit 8091556. The fallout of this change has been larger than expected so revert this on the 12.0.0 branch to provide more time to discuss this and figure out the best course of action. * Revert addition of one more test
* Release Wasmtime 12.0.0 [automatically-tag-and-release-this-commit] * Update release date to today * Update release notes for 12.0.0 --------- Co-authored-by: Wasmtime Publish <wasmtime-publish@users.noreply.github.com> Co-authored-by: Alex Crichton <alex@alexcrichton.com>
…ing" to 12.0.1 (bytecodealliance#6897) * Cranelift: avoid quadratic behavior in label-fixup processing (bytecodealliance#6804) * WIP: two-tier processing for MachBuffer veneer processing in island emission * Unconditionally emit veneers for label forward-refs that cross islands. * Clean up and fix tests * Review feedback * Add some more detailed comments. * Update the releases file to reflect the patch --------- Co-authored-by: Chris Fallin <chris@cfallin.org>
* Release Wasmtime 12.0.1 [automatically-tag-and-release-this-commit] * Update cargo-vet metadata --------- Co-authored-by: Wasmtime Publish <wasmtime-publish@users.noreply.github.com> Co-authored-by: Alex Crichton <alex@alexcrichton.com>
|
This looks like a rebase that went wrong and is pulling in commits from other branches. I think only 0b024af was supposed to be in this PR, and GitHub automatically tagging in Cranelift folks is a false positive as a result. So I'm removing the review request for Chris. |
Subscribe to Label Actioncc @cfallin, @fitzgen, @peterhuene DetailsThis issue or pull request has been labeled: "cranelift", "cranelift:area:aarch64", "cranelift:area:machinst", "cranelift:meta", "cranelift:module", "cranelift:wasm", "isle", "wasmtime:c-api", "wasmtime:docs"Thus the following users have been cc'd because of the following labels:
To subscribe or unsubscribe from this label, edit the |
|
I rebased on the 12.0 release branch so we can use this in our platform. I can see in the 13.0 pre-release wasi-http has a |
|
I'm not particularly familiar with the status of wasi-http, but it sounds to me like you don't expect to merge this PR because we have a different solution that will meet your needs. In that case, can we close this PR? |
|
Sorry I didn't chime in earlier. We have had various wasi-http implementation plans we would get to "real soon now" for a while now. The short version is: I don't believe that we should implement ACLs as a host functionality in any of our component interfaces, including HTTP. Instead, we want to see ACLs implemented as a component which attenuates component interfaces. Over in the wasi-virt project, Guy has been demonstrating some of the patterns possible for component composition which interpose between the host and the user's component. In that project, he is demonstrating providing extra environment variables, a read-only filesystem image, and other basic on/off functionality for wasi interfaces. I think the best design for an http ACL is a component generator like wasi-virt that, given an ACL, generates a component that exports a wasi-http interface to the user's component, and imports a wasi-http implementation. When wiring that export to that import, the ACL component will make any access control checks and accept (by forwarding) or reject (by returning an error) the user's import calls. This has a bunch of advantages over building it into the host: 1. it works on any component runtime, not just wasmtime, 2. it minimizes the amount of code we need to trust in the host. practically this shows up when we |
Yep this PR can be closed. It was more of a proof of concept to highlight one possible solution to this problem and to give us something to work with in our platform.
I wasn't aware of wasi-virt till now but it is a better approach and one which gives flexibility to end users. |
|
Thanks. Please stay in touch with what your platform needs from wasmtime, whether here or on the bytecode alliance discord. |
Similar to #6401 I added support to use our http-acl crate which allows settings ACL rules to allow/deny HTTP requests based on the:
This also fixes the broken IPv6 authority support in the wasi-http crate which currently just splits the authority on
:and then takes the second split value as the port.