wasmer_cli/commands/run/
wasi.rs

1use std::{
2    collections::{BTreeSet, HashMap},
3    path::{Path, PathBuf},
4    str::FromStr,
5    sync::{Arc, mpsc::Sender},
6    time::Duration,
7};
8
9use anyhow::{Context, Result, bail};
10use bytes::Bytes;
11use clap::Parser;
12use itertools::Itertools;
13use tokio::runtime::Handle;
14use url::Url;
15use virtual_fs::{DeviceFile, FileSystem, PassthruFileSystem, RootFileSystemBuilder};
16use virtual_net::ruleset::Ruleset;
17use wasmer::{Engine, Function, Instance, Memory32, Memory64, Module, RuntimeError, Store, Value};
18use wasmer_config::package::PackageSource as PackageSpecifier;
19use wasmer_types::ModuleHash;
20#[cfg(feature = "journal")]
21use wasmer_wasix::journal::{LogFileJournal, SnapshotTrigger};
22use wasmer_wasix::{
23    PluggableRuntime, RewindState, Runtime, WasiEnv, WasiEnvBuilder, WasiError, WasiFunctionEnv,
24    WasiVersion,
25    bin_factory::BinaryPackage,
26    capabilities::Capabilities,
27    default_fs_backing, get_wasi_versions,
28    http::HttpClient,
29    journal::{CompactingLogFileJournal, DynJournal, DynReadableJournal},
30    os::{TtyBridge, tty_sys::SysTty},
31    rewind_ext,
32    runners::MAPPED_CURRENT_DIR_DEFAULT_PATH,
33    runners::{MappedCommand, MappedDirectory},
34    runtime::{
35        module_cache::{FileSystemCache, ModuleCache},
36        package_loader::{BuiltinPackageLoader, PackageLoader},
37        resolver::{
38            BackendSource, FileSystemSource, InMemorySource, MultiSource, Source, WebSource,
39        },
40        task_manager::{
41            VirtualTaskManagerExt,
42            tokio::{RuntimeOrHandle, TokioTaskManager},
43        },
44    },
45    types::__WASI_STDIN_FILENO,
46    wasmer_wasix_types::wasi::Errno,
47};
48
49use crate::{
50    config::{UserRegistry, WasmerEnv},
51    utils::{parse_envvar, parse_mapdir, parse_volume},
52};
53
54use super::{
55    CliPackageSource, ExecutableTarget,
56    capabilities::{self, PkgCapabilityCache},
57};
58
59const WAPM_SOURCE_CACHE_TIMEOUT: Duration = Duration::from_secs(10 * 60);
60
61#[derive(Debug, Parser, Clone, Default)]
62/// WASI Options
63pub struct Wasi {
64    /// Map a host directory to a different location for the Wasm module
65    #[clap(
66        long = "volume",
67        name = "[HOST_DIR:]GUEST_DIR",
68        value_parser = parse_volume,
69    )]
70    pub(crate) volumes: Vec<MappedDirectory>,
71
72    // Legacy option
73    #[clap(long = "dir", group = "wasi", hide = true)]
74    pub(crate) pre_opened_directories: Vec<PathBuf>,
75
76    // Legacy option
77    #[clap(
78        long = "mapdir",
79        value_parser = parse_mapdir,
80        hide = true
81     )]
82    pub(crate) mapped_dirs: Vec<MappedDirectory>,
83
84    /// Set the module's initial CWD to this path; does not work with
85    /// WASI preview 1 modules.
86    #[clap(long = "cwd")]
87    pub(crate) cwd: Option<PathBuf>,
88
89    /// Pass custom environment variables
90    #[clap(
91        long = "env",
92        name = "KEY=VALUE",
93        value_parser=parse_envvar,
94    )]
95    pub(crate) env_vars: Vec<(String, String)>,
96
97    /// Forward all host env variables to guest
98    #[clap(long, env)]
99    pub(crate) forward_host_env: bool,
100
101    /// List of other containers this module depends on
102    #[clap(long = "use", name = "USE")]
103    pub(crate) uses: Vec<String>,
104
105    /// List of webc packages that are explicitly included for execution
106    /// Note: these packages will be used instead of those in the registry
107    #[clap(long = "include-webc", name = "WEBC")]
108    pub(super) include_webcs: Vec<PathBuf>,
109
110    /// List of injected atoms
111    #[clap(long = "map-command", name = "MAPCMD")]
112    pub(super) map_commands: Vec<String>,
113
114    /// Enable networking with the host network.
115    ///
116    /// Allows WASI modules to open TCP and UDP connections, create sockets, ...
117    ///
118    /// Optionally, a set of network filters could be defined which allows fine-grained
119    /// control over the network sandbox.
120    ///
121    /// Rule Syntax:
122    ///
123    /// <rule-type>:<allow|deny>=<rule-expression>
124    ///
125    /// Examples:
126    ///
127    ///  - Allow a specific domain and port: dns:allow=example.com:80
128    ///
129    ///  - Deny a domain and all its subdomains on all ports: dns:deny=*danger.xyz:*
130    ///
131    ///  - Allow opening ipv4 sockets only on a specific IP and port: ipv4:allow=127.0.0.1:80/in.
132    #[clap(long = "net", require_equals = true)]
133    // Note that when --net is passed to the cli, the first Option will be initialized: Some(None)
134    // and when --net=<ruleset> is specified, the inner Option will be initialized: Some(Some(ruleset))
135    pub networking: Option<Option<String>>,
136
137    /// Disables the TTY bridge
138    #[clap(long = "no-tty")]
139    pub no_tty: bool,
140
141    /// Enables asynchronous threading
142    #[clap(long = "enable-async-threads")]
143    pub enable_async_threads: bool,
144
145    /// Enables an exponential backoff (measured in milli-seconds) of
146    /// the process CPU usage when there are no active run tokens (when set
147    /// holds the maximum amount of time that it will pause the CPU)
148    /// (default = off)
149    #[clap(long = "enable-cpu-backoff")]
150    pub enable_cpu_backoff: Option<u64>,
151
152    /// Specifies one or more journal files that Wasmer will use to restore
153    /// the state of the WASM process as it executes.
154    ///
155    /// The state of the WASM process and its sandbox will be reapplied using
156    /// the journals in the order that you specify here.
157    #[cfg(feature = "journal")]
158    #[clap(long = "journal")]
159    pub read_only_journals: Vec<PathBuf>,
160
161    /// Specifies one or more journal files that Wasmer will use to restore
162    /// and save the state of the WASM process as it executes.
163    ///
164    /// The state of the WASM process and its sandbox will be reapplied using
165    /// the journals in the order that you specify here.
166    ///
167    /// The last journal file specified will be created if it does not exist
168    /// and opened for read and write. New journal events will be written to this
169    /// file
170    #[cfg(feature = "journal")]
171    #[clap(long = "journal-writable")]
172    pub writable_journals: Vec<PathBuf>,
173
174    /// Flag that indicates if the journal will be automatically compacted
175    /// as it fills up and when the process exits
176    #[cfg(feature = "journal")]
177    #[clap(long = "enable-compaction")]
178    pub enable_compaction: bool,
179
180    /// Tells the compactor not to compact when the journal log file is closed
181    #[cfg(feature = "journal")]
182    #[clap(long = "without-compact-on-drop")]
183    pub without_compact_on_drop: bool,
184
185    /// Tells the compactor to compact when it grows by a certain factor of
186    /// its original size. (i.e. '0.2' would be it compacts after the journal
187    /// has grown by 20 percent)
188    ///
189    /// Default is to compact on growth that exceeds 15%
190    #[cfg(feature = "journal")]
191    #[clap(long = "with-compact-on-growth", default_value = "0.15")]
192    pub with_compact_on_growth: f32,
193
194    /// Indicates what events will cause a snapshot to be taken
195    /// and written to the journal file.
196    ///
197    /// If not specified, the default is to snapshot when the process idles, when
198    /// the process exits or periodically if an interval argument is also supplied,
199    /// as well as when the process requests a snapshot explicitly.
200    ///
201    /// Additionally if the snapshot-on is not specified it will also take a snapshot
202    /// on the first stdin, environ or socket listen - this can be used to accelerate
203    /// the boot up time of WASM processes.
204    #[cfg(feature = "journal")]
205    #[clap(long = "snapshot-on")]
206    pub snapshot_on: Vec<SnapshotTrigger>,
207
208    /// Adds a periodic interval (measured in milli-seconds) that the runtime will automatically
209    /// take snapshots of the running process and write them to the journal. When specifying
210    /// this parameter it implies that `--snapshot-on interval` has also been specified.
211    #[cfg(feature = "journal")]
212    #[clap(long = "snapshot-period")]
213    pub snapshot_interval: Option<u64>,
214
215    /// If specified, the runtime will stop executing the WASM module after the first snapshot
216    /// is taken.
217    #[cfg(feature = "journal")]
218    #[clap(long = "stop-after-snapshot")]
219    pub stop_after_snapshot: bool,
220
221    /// Skip writes to stdout and stderr when replying journal events to bootstrap a module.
222    #[cfg(feature = "journal")]
223    #[clap(long = "skip-journal-stdio")]
224    pub skip_stdio_during_bootstrap: bool,
225
226    /// Allow instances to send http requests.
227    ///
228    /// Access to domains is granted by default.
229    #[clap(long)]
230    pub http_client: bool,
231
232    /// Require WASI modules to only import 1 version of WASI.
233    #[clap(long = "deny-multiple-wasi-versions")]
234    pub deny_multiple_wasi_versions: bool,
235
236    /// Disable the cache for the compiled modules.
237    ///
238    /// Cache is used to speed up the loading of modules, as the
239    /// generated artifacts are cached.
240    #[clap(long = "disable-cache")]
241    disable_cache: bool,
242}
243
244pub struct RunProperties {
245    pub ctx: WasiFunctionEnv,
246    pub path: PathBuf,
247    pub invoke: Option<String>,
248    pub args: Vec<String>,
249}
250
251fn endpoint_to_folder(url: &Url) -> String {
252    url.to_string()
253        .replace("registry.wasmer.io", "wasmer.io")
254        .replace("registry.wasmer.wtf", "wasmer.wtf")
255        .replace(|c| "/:?&=#%\\".contains(c), "_")
256}
257
258#[allow(dead_code)]
259impl Wasi {
260    pub fn map_dir(&mut self, alias: &str, target_on_disk: PathBuf) {
261        self.volumes.push(MappedDirectory {
262            guest: alias.to_string(),
263            host: target_on_disk,
264        });
265    }
266
267    pub fn set_env(&mut self, key: &str, value: &str) {
268        self.env_vars.push((key.to_string(), value.to_string()));
269    }
270
271    /// Gets the WASI version (if any) for the provided module
272    pub fn get_versions(module: &Module) -> Option<BTreeSet<WasiVersion>> {
273        // Get the wasi version in non-strict mode, so multiple wasi versions
274        // are potentially allowed.
275        //
276        // Checking for multiple wasi versions is handled outside this function.
277        get_wasi_versions(module, false)
278    }
279
280    /// Checks if a given module has any WASI imports at all.
281    pub fn has_wasi_imports(module: &Module) -> bool {
282        // Get the wasi version in non-strict mode, so no other imports
283        // are allowed
284        get_wasi_versions(module, false).is_some()
285    }
286
287    pub(crate) fn all_volumes(&self) -> Vec<MappedDirectory> {
288        self.volumes
289            .iter()
290            .cloned()
291            .chain(self.pre_opened_directories.iter().map(|d| MappedDirectory {
292                host: d.clone(),
293                guest: d.to_str().expect("must be a valid path string").to_string(),
294            }))
295            .chain(self.mapped_dirs.iter().cloned())
296            .collect_vec()
297    }
298
299    pub fn prepare(
300        &self,
301        module: &Module,
302        program_name: String,
303        args: Vec<String>,
304        rt: Arc<dyn Runtime + Send + Sync>,
305    ) -> Result<WasiEnvBuilder> {
306        let args = args.into_iter().map(|arg| arg.into_bytes());
307
308        let map_commands = self
309            .map_commands
310            .iter()
311            .map(|map| map.split_once('=').unwrap())
312            .map(|(a, b)| (a.to_string(), b.to_string()))
313            .collect::<HashMap<_, _>>();
314
315        let mut uses = Vec::new();
316        for name in &self.uses {
317            let specifier = PackageSpecifier::from_str(name)
318                .with_context(|| format!("Unable to parse \"{name}\" as a package specifier"))?;
319            let pkg = {
320                let inner_rt = rt.clone();
321                rt.task_manager()
322                    .spawn_and_block_on(async move {
323                        BinaryPackage::from_registry(&specifier, &*inner_rt).await
324                    })
325                    .with_context(|| format!("Unable to load \"{name}\""))??
326            };
327            uses.push(pkg);
328        }
329
330        let mut builder = WasiEnv::builder(program_name)
331            .runtime(Arc::clone(&rt))
332            .args(args)
333            .envs(self.env_vars.clone())
334            .uses(uses)
335            .map_commands(map_commands);
336
337        let mut builder = {
338            // If we preopen anything from the host then shallow copy it over
339            let root_fs = RootFileSystemBuilder::new()
340                .with_tty(Box::new(DeviceFile::new(__WASI_STDIN_FILENO)))
341                .build();
342
343            let (have_current_dir, mut mapped_dirs) = self.build_mapped_directories(false)?;
344            if !mapped_dirs.is_empty() {
345                // TODO: should we expose the common ancestor instead of root?
346                let fs_backing: Arc<dyn FileSystem + Send + Sync> =
347                    Arc::new(PassthruFileSystem::new_arc(default_fs_backing()));
348                for MappedDirectory { host, guest } in self.all_volumes() {
349                    let host = if !host.is_absolute() {
350                        Path::new("/").join(host)
351                    } else {
352                        host
353                    };
354                    root_fs.mount(guest.into(), &fs_backing, host)?;
355                }
356            }
357
358            if let Some(cwd) = self.cwd.as_ref() {
359                if !cwd.starts_with("/") {
360                    bail!("The argument to --cwd must be an absolute path");
361                }
362                builder = builder.current_dir(cwd.clone());
363            }
364
365            // Open the root of the new filesystem
366            builder = builder
367                .sandbox_fs(root_fs)
368                .preopen_dir(Path::new("/"))
369                .unwrap();
370
371            if have_current_dir {
372                builder.map_dir(".", MAPPED_CURRENT_DIR_DEFAULT_PATH)?
373            } else {
374                builder.map_dir(".", "/")?
375            }
376        };
377
378        *builder.capabilities_mut() = self.capabilities();
379
380        #[cfg(feature = "journal")]
381        {
382            for trigger in self.snapshot_on.iter().cloned() {
383                builder.add_snapshot_trigger(trigger);
384            }
385            if let Some(interval) = self.snapshot_interval {
386                builder.with_snapshot_interval(std::time::Duration::from_millis(interval));
387            }
388            if self.stop_after_snapshot {
389                builder.with_stop_running_after_snapshot(true);
390            }
391            let (r, w) = self.build_journals()?;
392            for journal in r {
393                builder.add_read_only_journal(journal);
394            }
395            for journal in w {
396                builder.add_writable_journal(journal);
397            }
398            builder.with_skip_stdio_during_bootstrap(self.skip_stdio_during_bootstrap);
399        }
400
401        Ok(builder)
402    }
403
404    #[cfg(feature = "journal")]
405    #[allow(clippy::type_complexity)]
406    pub fn build_journals(
407        &self,
408    ) -> anyhow::Result<(Vec<Arc<DynReadableJournal>>, Vec<Arc<DynJournal>>)> {
409        let mut readable = Vec::new();
410        for journal in self.read_only_journals.clone() {
411            if matches!(std::fs::metadata(&journal), Err(e) if e.kind() == std::io::ErrorKind::NotFound)
412            {
413                bail!("Read-only journal file does not exist: {journal:?}");
414            }
415
416            readable
417                .push(Arc::new(LogFileJournal::new_readonly(journal)?) as Arc<DynReadableJournal>);
418        }
419
420        let mut writable = Vec::new();
421        for journal in self.writable_journals.clone() {
422            if self.enable_compaction {
423                let mut journal = CompactingLogFileJournal::new(journal)?;
424                if !self.without_compact_on_drop {
425                    journal = journal.with_compact_on_drop()
426                }
427                if self.with_compact_on_growth.is_normal() && self.with_compact_on_growth != 0f32 {
428                    journal = journal.with_compact_on_factor_size(self.with_compact_on_growth);
429                }
430                writable.push(Arc::new(journal) as Arc<DynJournal>);
431            } else {
432                writable.push(Arc::new(LogFileJournal::new(journal)?));
433            }
434        }
435        Ok((readable, writable))
436    }
437
438    #[cfg(not(feature = "journal"))]
439    pub fn build_journals(&self) -> anyhow::Result<Vec<Arc<DynJournal>>> {
440        Ok(Vec::new())
441    }
442
443    pub fn build_mapped_directories(
444        &self,
445        is_wasix: bool,
446    ) -> Result<(bool, Vec<MappedDirectory>), anyhow::Error> {
447        let mut mapped_dirs = Vec::new();
448
449        // Process the --volume flag.
450        let mut have_current_dir = false;
451        for MappedDirectory { host, guest } in &self.all_volumes() {
452            let resolved_host = host.canonicalize().with_context(|| {
453                format!(
454                    "could not canonicalize path for argument '--volume {}:{}'",
455                    host.display(),
456                    guest,
457                )
458            })?;
459
460            if guest == "/" && is_wasix {
461                // Note: it appears we canonicalize the path before this point and showing the value of
462                // `host` in the error message may throw users off, so we use a placeholder.
463                tracing::warn!(
464                    "Mounting on the guest's virtual root with --volume <HOST_DIR>:/ breaks WASIX modules' filesystems"
465                );
466            }
467
468            let mapping = if guest == "." {
469                if have_current_dir {
470                    bail!(
471                        "Cannot pre-open the current directory twice: '--volume=.' must only be specified once"
472                    );
473                }
474                have_current_dir = true;
475
476                let host = if host == Path::new(".") {
477                    std::env::current_dir().context("could not determine current directory")?
478                } else {
479                    host.clone()
480                };
481                MappedDirectory {
482                    host: resolved_host,
483                    guest: if is_wasix {
484                        MAPPED_CURRENT_DIR_DEFAULT_PATH.to_string()
485                    } else {
486                        "/".to_string()
487                    },
488                }
489            } else {
490                MappedDirectory {
491                    host: resolved_host,
492                    guest: guest.clone(),
493                }
494            };
495            mapped_dirs.push(mapping);
496        }
497
498        Ok((have_current_dir, mapped_dirs))
499    }
500
501    pub fn build_mapped_commands(&self) -> Result<Vec<MappedCommand>, anyhow::Error> {
502        self.map_commands
503            .iter()
504            .map(|item| {
505                let (a, b) = item.split_once('=').with_context(|| {
506                    format!(
507                        "Invalid --map-command flag: expected <ALIAS>=<HOST_PATH>, got '{item}'"
508                    )
509                })?;
510
511                let a = a.trim();
512                let b = b.trim();
513
514                if a.is_empty() {
515                    bail!("Invalid --map-command flag - alias cannot be empty: '{item}'");
516                }
517                // TODO(theduke): check if host command exists, and canonicalize PathBuf.
518                if b.is_empty() {
519                    bail!("Invalid --map-command flag - host path cannot be empty: '{item}'");
520                }
521
522                Ok(MappedCommand {
523                    alias: a.to_string(),
524                    target: b.to_string(),
525                })
526            })
527            .collect::<Result<Vec<_>, anyhow::Error>>()
528    }
529
530    pub fn capabilities(&self) -> Capabilities {
531        let mut caps = Capabilities::default();
532
533        if self.http_client {
534            caps.http_client = wasmer_wasix::http::HttpClientCapabilityV1::new_allow_all();
535        }
536
537        caps.threading.enable_asynchronous_threading = self.enable_async_threads;
538        caps.threading.enable_exponential_cpu_backoff =
539            self.enable_cpu_backoff.map(Duration::from_millis);
540
541        caps
542    }
543
544    pub fn prepare_runtime<I>(
545        &self,
546        engine: Engine,
547        env: &WasmerEnv,
548        pkg_cache_path: &Path,
549        rt_or_handle: I,
550        preferred_webc_version: webc::Version,
551        compiler_debug_dir_used: bool,
552    ) -> Result<impl Runtime + Send + Sync + use<I>>
553    where
554        I: Into<RuntimeOrHandle>,
555    {
556        let tokio_task_manager = Arc::new(TokioTaskManager::new(rt_or_handle.into()));
557        let mut rt = PluggableRuntime::new(tokio_task_manager.clone());
558
559        let has_networking = self.networking.is_some()
560            || capabilities::get_cached_capability(pkg_cache_path)
561                .ok()
562                .is_some_and(|v| v.enable_networking);
563
564        let ruleset = self
565            .networking
566            .clone()
567            .flatten()
568            .map(|ruleset| Ruleset::from_str(&ruleset))
569            .transpose()?;
570
571        let network = if let Some(ruleset) = ruleset {
572            virtual_net::host::LocalNetworking::with_ruleset(ruleset)
573        } else {
574            virtual_net::host::LocalNetworking::default()
575        };
576
577        if has_networking {
578            rt.set_networking_implementation(network);
579        } else {
580            let net = super::capabilities::net::AskingNetworking::new(
581                pkg_cache_path.to_path_buf(),
582                Arc::new(network),
583            );
584
585            rt.set_networking_implementation(net);
586        }
587
588        #[cfg(feature = "journal")]
589        {
590            let (r, w) = self.build_journals()?;
591            for journal in r {
592                rt.add_read_only_journal(journal);
593            }
594            for journal in w {
595                rt.add_writable_journal(journal);
596            }
597        }
598
599        if !self.no_tty {
600            let tty = Arc::new(SysTty);
601            tty.reset();
602            rt.set_tty(tty);
603        }
604
605        let client =
606            wasmer_wasix::http::default_http_client().context("No HTTP client available")?;
607        let client = Arc::new(client);
608
609        let package_loader = self
610            .prepare_package_loader(env, client.clone())
611            .context("Unable to prepare the package loader")?;
612
613        let registry = self.prepare_source(env, client, preferred_webc_version)?;
614
615        if !self.disable_cache && !compiler_debug_dir_used {
616            let cache_dir = env.cache_dir().join("compiled");
617            let module_cache = wasmer_wasix::runtime::module_cache::in_memory()
618                .with_fallback(FileSystemCache::new(cache_dir, tokio_task_manager));
619            rt.set_module_cache(module_cache);
620        }
621
622        rt.set_package_loader(package_loader)
623            .set_source(registry)
624            .set_engine(engine);
625
626        Ok(rt)
627    }
628
629    /// Helper function for instantiating a module with Wasi imports for the `Run` command.
630    pub fn instantiate(
631        &self,
632        module: &Module,
633        module_hash: ModuleHash,
634        program_name: String,
635        args: Vec<String>,
636        runtime: Arc<dyn Runtime + Send + Sync>,
637        store: &mut Store,
638    ) -> Result<(WasiFunctionEnv, Instance)> {
639        let builder = self.prepare(module, program_name, args, runtime)?;
640        let (instance, wasi_env) = builder.instantiate_ext(module.clone(), module_hash, store)?;
641
642        Ok((wasi_env, instance))
643    }
644
645    pub fn for_binfmt_interpreter() -> Result<Self> {
646        let dir = std::env::var_os("WASMER_BINFMT_MISC_PREOPEN")
647            .map(Into::into)
648            .unwrap_or_else(|| PathBuf::from("."));
649        Ok(Self {
650            deny_multiple_wasi_versions: true,
651            env_vars: std::env::vars().collect(),
652            volumes: vec![MappedDirectory {
653                host: dir.clone(),
654                guest: dir
655                    .to_str()
656                    .expect("dir must be a valid string")
657                    .to_string(),
658            }],
659            ..Self::default()
660        })
661    }
662
663    fn prepare_package_loader(
664        &self,
665        env: &WasmerEnv,
666        client: Arc<dyn HttpClient + Send + Sync>,
667    ) -> Result<BuiltinPackageLoader> {
668        let checkout_dir = env.cache_dir().join("checkouts");
669        let tokens = tokens_by_authority(env)?;
670
671        let loader = BuiltinPackageLoader::new()
672            .with_cache_dir(checkout_dir)
673            .with_shared_http_client(client)
674            .with_tokens(tokens);
675
676        Ok(loader)
677    }
678
679    fn prepare_source(
680        &self,
681        env: &WasmerEnv,
682        client: Arc<dyn HttpClient + Send + Sync>,
683        preferred_webc_version: webc::Version,
684    ) -> Result<MultiSource> {
685        let mut source = MultiSource::default();
686
687        // Note: This should be first so our "preloaded" sources get a chance to
688        // override the main registry.
689        let mut preloaded = InMemorySource::new();
690        for path in &self.include_webcs {
691            preloaded
692                .add_webc(path)
693                .with_context(|| format!("Unable to load \"{}\"", path.display()))?;
694        }
695        source.add_source(preloaded);
696
697        let graphql_endpoint = self.graphql_endpoint(env)?;
698        let cache_dir = env
699            .cache_dir()
700            .join("queries")
701            .join(endpoint_to_folder(&graphql_endpoint));
702        let mut wapm_source = BackendSource::new(graphql_endpoint, Arc::clone(&client))
703            .with_local_cache(cache_dir, WAPM_SOURCE_CACHE_TIMEOUT)
704            .with_preferred_webc_version(preferred_webc_version);
705        if let Some(token) = env
706            .config()?
707            .registry
708            .get_login_token_for_registry(wapm_source.registry_endpoint().as_str())
709        {
710            wapm_source = wapm_source.with_auth_token(token);
711        }
712        source.add_source(wapm_source);
713
714        let cache_dir = env.cache_dir().join("downloads");
715        source.add_source(WebSource::new(cache_dir, client));
716
717        source.add_source(FileSystemSource::default());
718
719        Ok(source)
720    }
721
722    fn graphql_endpoint(&self, env: &WasmerEnv) -> Result<Url> {
723        if let Ok(endpoint) = env.registry_endpoint() {
724            return Ok(endpoint);
725        }
726
727        let config = env.config()?;
728        let graphql_endpoint = config.registry.get_graphql_url();
729        let graphql_endpoint = graphql_endpoint
730            .parse()
731            .with_context(|| format!("Unable to parse \"{graphql_endpoint}\" as a URL"))?;
732
733        Ok(graphql_endpoint)
734    }
735}
736
737fn parse_registry(r: &str) -> Result<Url> {
738    UserRegistry::from(r).graphql_endpoint()
739}
740
741fn tokens_by_authority(env: &WasmerEnv) -> Result<HashMap<String, String>> {
742    let mut tokens = HashMap::new();
743    let config = env.config()?;
744
745    for credentials in config.registry.tokens {
746        if let Ok(url) = Url::parse(&credentials.registry)
747            && url.has_authority()
748        {
749            tokens.insert(url.authority().to_string(), credentials.token);
750        }
751    }
752
753    if let (Ok(current_registry), Some(token)) = (env.registry_endpoint(), env.token())
754        && current_registry.has_authority()
755    {
756        tokens.insert(current_registry.authority().to_string(), token);
757    }
758
759    // Note: The global wasmer.toml config file stores URLs for the GraphQL
760    // endpoint, however that's often on the backend (i.e.
761    // https://registry.wasmer.io/graphql) and we also want to use the same API
762    // token when sending requests to the frontend (e.g. downloading a package
763    // using the `Accept: application/webc` header).
764    //
765    // As a workaround to avoid needing to query *all* backends to find out
766    // their frontend URL every time the `wasmer` CLI runs, we'll assume that
767    // when a backend is called something like `registry.wasmer.io`, the
768    // frontend will be at `wasmer.io`. This works everywhere except for people
769    // developing the backend locally... Sorry, Ayush.
770
771    let mut frontend_tokens = HashMap::new();
772    for (hostname, token) in &tokens {
773        if let Some(frontend_url) = hostname.strip_prefix("registry.")
774            && !tokens.contains_key(frontend_url)
775        {
776            frontend_tokens.insert(frontend_url.to_string(), token.clone());
777        }
778    }
779    tokens.extend(frontend_tokens);
780
781    Ok(tokens)
782}