Crates.io | provider-archive |
lib.rs | provider-archive |
version | 0.14.0 |
source | src |
created_at | 2020-10-13 16:44:29.661121 |
updated_at | 2024-11-08 22:28:33.231608 |
description | Library for reading and writing wasmCloud capability provider archive files |
homepage | |
repository | https://github.com/wasmCloud/wasmCloud |
max_upload_size | |
id | 299284 |
size | 46,343 |
Until the WASI specification includes robust networking support and the available WebAssembly tooling (wasm3 , wasmtime, etc) supports this WASI specification, and the Rust compiler is able to generate the right set of WASI imports when compiling "regular" socket code ... our support for portable capability providers will be limited.
In the absence of useful portable capability providers, we need the ability to store, retrieve, and schedule native capability providers. A native capability provider is an FFI plugin stored in a binary file that is specific to a particular CPU architecture and Operating System. The issue with these binary files (shared object files on linux) is that we cannot embed secure claims JWTs in these like we can in WebAssembly files. With components, we use these signed tokens to get a verifiable, globally unique public key (identity) as well as a hash of the associated file to verify that the file has not been tampered with since being signed.
To give us the ability to store, retrieve, schedule, and sign capability providers, we need a Provider Archive (PAR). This is a simple TAR file that contains a signed JWT, as well as a binary file for each of the supported OS/CPU combinations.
Each provider archive file contains a root claims.jwt
file that holds a signed set of claims (see appendix). Also in the root directory of the archive are binary files containing the bytes of the native capability provider executable with a filename of the format [arch]-[os].bin
.
The following is an example of the contents of a provider archive file:
+ provider_archive.tar
|
+---- claims.jwt
|
|---- x86_64-linux.bin
|---- aarch64-linux.bin
|---- x86_64-macos.bin
`---- aarch64-ios.bin
Until we gain the ability to create network-capable WASI modules that can support robust capability provider functionality (like DB clients, web servers, raw TCP or UDP control, etc), Gantry will be storing and retrieving par files for each capability provider.
The following is a list of some of the possible architectures (NOTE not all of these architectures may be supported by the wasmCloud host):
The following is a list of some of the possible operating systems (NOTE not all of these operating systems may be supported by the wasmCloud host):
The following is a list of the custom claims that will appear in the wascap
section beneath the standard JWT fields. This is the same nesting style used by component claims when embedded into a WebAssembly file:
hashes
- This is a map where the key is an [arch]-[os]
string and the value is the hash for that particular file. Having these hashes inside the signed token means we can verify that the plugin binaries have not been tampered with.name
- Friendly name of the capability provider.vendor
- A vendor string helping to identify the provider (e.g. Redis
or Cassandra
or PostgreSQL
etc). This is an information-only field and is not used as any kind of key or unique identifier.version
- Friendly version stringrevision
- A monotonically increasing revision value. This value will be used to retrieve / store version-specific files.config_schema
- An optional JSON schema that describes the configuration structure for this capability provider.Note that when using this library to create or append to a provider archive the claims for the JWT are not generated until write-time because the hash values for the files are not known until the files are written to the archive. In other words, if you instantiate a ProviderArchive
, accessing claims()
will return None
until after you've called write
.