mirror of
https://github.com/pezkuwichain/pezkuwi-subxt.git
synced 2026-04-28 03:58:04 +00:00
e9b69bc1b0
* sp-sandbox: move the sandbox module of sp-core into sp-sandbox Signed-off-by: koushiro <koushiro.cqx@gmail.com> * Fix Signed-off-by: koushiro <koushiro.cqx@gmail.com> * Fix Signed-off-by: koushiro <koushiro.cqx@gmail.com>
191 lines
7.1 KiB
Rust
191 lines
7.1 KiB
Rust
// This file is part of Substrate.
|
|
|
|
// Copyright (C) 2018-2022 Parity Technologies (UK) Ltd.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
//! This crate provides means to instantiate and execute wasm modules.
|
|
//!
|
|
//! It works even when the user of this library executes from
|
|
//! inside the wasm VM. In this case the same VM is used for execution
|
|
//! of both the sandbox owner and the sandboxed module, without compromising security
|
|
//! and without the performance penalty of full wasm emulation inside wasm.
|
|
//!
|
|
//! This is achieved by using bindings to the wasm VM, which are published by the host API.
|
|
//! This API is thin and consists of only a handful functions. It contains functions for
|
|
//! instantiating modules and executing them, but doesn't contain functions for inspecting the
|
|
//! module structure. The user of this library is supposed to read the wasm module.
|
|
//!
|
|
//! When this crate is used in the `std` environment all these functions are implemented by directly
|
|
//! calling the wasm VM.
|
|
//!
|
|
//! Examples of possible use-cases for this library are not limited to the following:
|
|
//!
|
|
//! - implementing smart-contract runtimes that use wasm for contract code
|
|
//! - executing a wasm substrate runtime inside of a wasm parachain
|
|
|
|
#![warn(missing_docs)]
|
|
#![cfg_attr(not(feature = "std"), no_std)]
|
|
|
|
extern crate alloc;
|
|
|
|
pub mod embedded_executor;
|
|
pub mod env;
|
|
#[cfg(not(feature = "std"))]
|
|
pub mod host_executor;
|
|
|
|
use sp_core::RuntimeDebug;
|
|
use sp_std::prelude::*;
|
|
|
|
pub use sp_wasm_interface::{ReturnValue, Value};
|
|
|
|
#[cfg(not(all(feature = "wasmer-sandbox", not(feature = "std"))))]
|
|
pub use self::embedded_executor as default_executor;
|
|
pub use self::env::HostError;
|
|
#[cfg(all(feature = "wasmer-sandbox", not(feature = "std")))]
|
|
pub use self::host_executor as default_executor;
|
|
|
|
/// The target used for logging.
|
|
const TARGET: &str = "runtime::sandbox";
|
|
|
|
/// Error that can occur while using this crate.
|
|
#[derive(RuntimeDebug)]
|
|
pub enum Error {
|
|
/// Module is not valid, couldn't be instantiated.
|
|
Module,
|
|
|
|
/// Access to a memory or table was made with an address or an index which is out of bounds.
|
|
///
|
|
/// Note that if wasm module makes an out-of-bounds access then trap will occur.
|
|
OutOfBounds,
|
|
|
|
/// Failed to invoke the start function or an exported function for some reason.
|
|
Execution,
|
|
}
|
|
|
|
impl From<Error> for HostError {
|
|
fn from(_e: Error) -> HostError {
|
|
HostError
|
|
}
|
|
}
|
|
|
|
/// Function pointer for specifying functions by the
|
|
/// supervisor in [`EnvironmentDefinitionBuilder`].
|
|
///
|
|
/// [`EnvironmentDefinitionBuilder`]: struct.EnvironmentDefinitionBuilder.html
|
|
pub type HostFuncType<T> = fn(&mut T, &[Value]) -> Result<ReturnValue, HostError>;
|
|
|
|
/// Reference to a sandboxed linear memory, that
|
|
/// will be used by the guest module.
|
|
///
|
|
/// The memory can't be directly accessed by supervisor, but only
|
|
/// through designated functions [`get`](SandboxMemory::get) and [`set`](SandboxMemory::set).
|
|
pub trait SandboxMemory: Sized + Clone {
|
|
/// Construct a new linear memory instance.
|
|
///
|
|
/// The memory allocated with initial number of pages specified by `initial`.
|
|
/// Minimal possible value for `initial` is 0 and maximum possible is `65536`.
|
|
/// (Since maximum addressable memory is 2<sup>32</sup> = 4GiB = 65536 * 64KiB).
|
|
///
|
|
/// It is possible to limit maximum number of pages this memory instance can have by specifying
|
|
/// `maximum`. If not specified, this memory instance would be able to allocate up to 4GiB.
|
|
///
|
|
/// Allocated memory is always zeroed.
|
|
fn new(initial: u32, maximum: Option<u32>) -> Result<Self, Error>;
|
|
|
|
/// Read a memory area at the address `ptr` with the size of the provided slice `buf`.
|
|
///
|
|
/// Returns `Err` if the range is out-of-bounds.
|
|
fn get(&self, ptr: u32, buf: &mut [u8]) -> Result<(), Error>;
|
|
|
|
/// Write a memory area at the address `ptr` with contents of the provided slice `buf`.
|
|
///
|
|
/// Returns `Err` if the range is out-of-bounds.
|
|
fn set(&self, ptr: u32, value: &[u8]) -> Result<(), Error>;
|
|
}
|
|
|
|
/// Struct that can be used for defining an environment for a sandboxed module.
|
|
///
|
|
/// The sandboxed module can access only the entities which were defined and passed
|
|
/// to the module at the instantiation time.
|
|
pub trait SandboxEnvironmentBuilder<State, Memory>: Sized {
|
|
/// Construct a new `EnvironmentDefinitionBuilder`.
|
|
fn new() -> Self;
|
|
|
|
/// Register a host function in this environment definition.
|
|
///
|
|
/// NOTE that there is no constraints on type of this function. An instance
|
|
/// can import function passed here with any signature it wants. It can even import
|
|
/// the same function (i.e. with same `module` and `field`) several times. It's up to
|
|
/// the user code to check or constrain the types of signatures.
|
|
fn add_host_func<N1, N2>(&mut self, module: N1, field: N2, f: HostFuncType<State>)
|
|
where
|
|
N1: Into<Vec<u8>>,
|
|
N2: Into<Vec<u8>>;
|
|
|
|
/// Register a memory in this environment definition.
|
|
fn add_memory<N1, N2>(&mut self, module: N1, field: N2, mem: Memory)
|
|
where
|
|
N1: Into<Vec<u8>>,
|
|
N2: Into<Vec<u8>>;
|
|
}
|
|
|
|
/// Sandboxed instance of a wasm module.
|
|
///
|
|
/// This instance can be used for invoking exported functions.
|
|
pub trait SandboxInstance<State>: Sized {
|
|
/// The memory type used for this sandbox.
|
|
type Memory: SandboxMemory;
|
|
|
|
/// The environment builder used to construct this sandbox.
|
|
type EnvironmentBuilder: SandboxEnvironmentBuilder<State, Self::Memory>;
|
|
|
|
/// Instantiate a module with the given [`EnvironmentDefinitionBuilder`]. It will
|
|
/// run the `start` function (if it is present in the module) with the given `state`.
|
|
///
|
|
/// Returns `Err(Error::Module)` if this module can't be instantiated with the given
|
|
/// environment. If execution of `start` function generated a trap, then `Err(Error::Execution)`
|
|
/// will be returned.
|
|
///
|
|
/// [`EnvironmentDefinitionBuilder`]: struct.EnvironmentDefinitionBuilder.html
|
|
fn new(
|
|
code: &[u8],
|
|
env_def_builder: &Self::EnvironmentBuilder,
|
|
state: &mut State,
|
|
) -> Result<Self, Error>;
|
|
|
|
/// Invoke an exported function with the given name.
|
|
///
|
|
/// # Errors
|
|
///
|
|
/// Returns `Err(Error::Execution)` if:
|
|
///
|
|
/// - An export function name isn't a proper utf8 byte sequence,
|
|
/// - This module doesn't have an exported function with the given name,
|
|
/// - If types of the arguments passed to the function doesn't match function signature then
|
|
/// trap occurs (as if the exported function was called via call_indirect),
|
|
/// - Trap occurred at the execution time.
|
|
fn invoke(
|
|
&mut self,
|
|
name: &str,
|
|
args: &[Value],
|
|
state: &mut State,
|
|
) -> Result<ReturnValue, Error>;
|
|
|
|
/// Get the value from a global with the given `name`.
|
|
///
|
|
/// Returns `Some(_)` if the global could be found.
|
|
fn get_global_val(&self, name: &str) -> Option<Value>;
|
|
}
|