wasmer_wasi/state/
mod.rs

1//! WARNING: the API exposed here is unstable and very experimental.  Certain things are not ready
2//! yet and may be broken in patch releases.  If you're using this and have any specific needs,
3//! please [let us know here](https://github.com/wasmerio/wasmer/issues/583) or by filing an issue.
4//!
5//! Wasmer always has a virtual root directory located at `/` at which all pre-opened directories can
6//! be found.  It's possible to traverse between preopened directories this way as well (for example
7//! `preopen-dir1/../preopen-dir2`).
8//!
9//! A preopened directory is a directory or directory + name combination passed into the
10//! `generate_import_object` function.  These are directories that the caller has given
11//! the WASI module permission to access.
12//!
13//! You can implement `VirtualFile` for your own types to get custom behavior and extend WASI, see the
14//! [WASI plugin example](https://github.com/wasmerio/wasmer/blob/master/examples/plugin.rs).
15
16#![allow(clippy::cognitive_complexity, clippy::too_many_arguments)]
17
18mod builder;
19mod guard;
20mod pipe;
21mod socket;
22mod types;
23
24pub use self::builder::*;
25pub use self::guard::*;
26pub use self::pipe::*;
27pub use self::socket::*;
28pub use self::types::*;
29use crate::syscalls::types::*;
30use crate::utils::map_io_err;
31use crate::WasiBusProcessId;
32use crate::WasiThread;
33use crate::WasiThreadId;
34use generational_arena::Arena;
35pub use generational_arena::Index as Inode;
36#[cfg(feature = "enable-serde")]
37use serde::{Deserialize, Serialize};
38use std::borrow::Cow;
39use std::collections::HashMap;
40use std::collections::VecDeque;
41use std::sync::mpsc;
42use std::sync::Arc;
43use std::{
44    borrow::Borrow,
45    io::Write,
46    ops::{Deref, DerefMut},
47    path::{Path, PathBuf},
48    sync::{
49        atomic::{AtomicBool, AtomicU32, AtomicU64, Ordering},
50        Mutex, RwLock, RwLockReadGuard, RwLockWriteGuard,
51    },
52};
53use tracing::{debug, trace};
54use wasmer_vbus::BusSpawnedProcess;
55use wasmer_wasi_types::wasi::{
56    Errno, Fd as WasiFd, Fdflags, Fdstat, Filesize, Filestat, Filetype, Preopentype, Rights,
57};
58use wasmer_wasi_types::wasi::{Prestat, PrestatEnum};
59
60use wasmer_vfs::{FileSystem, FsError, OpenOptions, VirtualFile};
61
62/// the fd value of the virtual root
63pub const VIRTUAL_ROOT_FD: WasiFd = 3;
64/// all the rights enabled
65pub const ALL_RIGHTS: Rights = Rights::all();
66const STDIN_DEFAULT_RIGHTS: Rights = {
67    // This might seem a bit overenineered, but it's the only way I
68    // discovered for getting the values in a const environment
69    Rights::from_bits_truncate(
70        Rights::FD_DATASYNC.bits()
71            | Rights::FD_READ.bits()
72            | Rights::FD_SYNC.bits()
73            | Rights::FD_ADVISE.bits()
74            | Rights::FD_FILESTAT_GET.bits()
75            | Rights::POLL_FD_READWRITE.bits(),
76    )
77};
78const STDOUT_DEFAULT_RIGHTS: Rights = {
79    // This might seem a bit overenineered, but it's the only way I
80    // discovered for getting the values in a const environment
81    Rights::from_bits_truncate(
82        Rights::FD_DATASYNC.bits()
83            | Rights::FD_SYNC.bits()
84            | Rights::FD_WRITE.bits()
85            | Rights::FD_ADVISE.bits()
86            | Rights::FD_FILESTAT_GET.bits()
87            | Rights::POLL_FD_READWRITE.bits(),
88    )
89};
90const STDERR_DEFAULT_RIGHTS: Rights = STDOUT_DEFAULT_RIGHTS;
91
92/// A completely aribtrary "big enough" number used as the upper limit for
93/// the number of symlinks that can be traversed when resolving a path
94pub const MAX_SYMLINKS: u32 = 128;
95
96/// A file that Wasi knows about that may or may not be open
97#[derive(Debug)]
98#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
99pub struct InodeVal {
100    pub stat: RwLock<Filestat>,
101    pub is_preopened: bool,
102    pub name: String,
103    pub kind: RwLock<Kind>,
104}
105
106impl InodeVal {
107    pub fn read(&self) -> RwLockReadGuard<Kind> {
108        self.kind.read().unwrap()
109    }
110
111    pub fn write(&self) -> RwLockWriteGuard<Kind> {
112        self.kind.write().unwrap()
113    }
114}
115
116/// The core of the filesystem abstraction.  Includes directories,
117/// files, and symlinks.
118#[derive(Debug)]
119#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
120pub enum Kind {
121    File {
122        /// The open file, if it's open
123        #[cfg_attr(feature = "enable-serde", serde(skip))]
124        handle: Option<Box<dyn VirtualFile + Send + Sync + 'static>>,
125        /// The path on the host system where the file is located
126        /// This is deprecated and will be removed soon
127        path: PathBuf,
128        /// Marks the file as a special file that only one `fd` can exist for
129        /// This is useful when dealing with host-provided special files that
130        /// should be looked up by path
131        /// TOOD: clarify here?
132        fd: Option<u32>,
133    },
134    #[cfg_attr(feature = "enable-serde", serde(skip))]
135    Socket {
136        /// Represents a networking socket
137        socket: InodeSocket,
138    },
139    #[cfg_attr(feature = "enable-serde", serde(skip))]
140    Pipe {
141        /// Reference to the pipe
142        pipe: WasiPipe,
143    },
144    Dir {
145        /// Parent directory
146        parent: Option<Inode>,
147        /// The path on the host system where the directory is located
148        // TODO: wrap it like VirtualFile
149        path: PathBuf,
150        /// The entries of a directory are lazily filled.
151        entries: HashMap<String, Inode>,
152    },
153    /// The same as Dir but without the irrelevant bits
154    /// The root is immutable after creation; generally the Kind::Root
155    /// branch of whatever code you're writing will be a simpler version of
156    /// your Kind::Dir logic
157    Root {
158        entries: HashMap<String, Inode>,
159    },
160    /// The first two fields are data _about_ the symlink
161    /// the last field is the data _inside_ the symlink
162    ///
163    /// `base_po_dir` should never be the root because:
164    /// - Right now symlinks are not allowed in the immutable root
165    /// - There is always a closer pre-opened dir to the symlink file (by definition of the root being a collection of preopened dirs)
166    Symlink {
167        /// The preopened dir that this symlink file is relative to (via `path_to_symlink`)
168        base_po_dir: WasiFd,
169        /// The path to the symlink from the `base_po_dir`
170        path_to_symlink: PathBuf,
171        /// the value of the symlink as a relative path
172        relative_path: PathBuf,
173    },
174    Buffer {
175        buffer: Vec<u8>,
176    },
177    EventNotifications {
178        /// Used for event notifications by the user application or operating system
179        counter: Arc<AtomicU64>,
180        /// Flag that indicates if this is operating
181        is_semaphore: bool,
182        /// Receiver that wakes sleeping threads
183        #[cfg_attr(feature = "enable-serde", serde(skip))]
184        wakers: Arc<Mutex<VecDeque<mpsc::Sender<()>>>>,
185    },
186}
187
188#[derive(Debug, Clone)]
189#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
190pub struct Fd {
191    pub rights: Rights,
192    pub rights_inheriting: Rights,
193    pub flags: Fdflags,
194    pub offset: u64,
195    /// Flags that determine how the [`Fd`] can be used.
196    ///
197    /// Used when reopening a [`VirtualFile`] during [`WasiState`] deserialization.
198    pub open_flags: u16,
199    pub inode: Inode,
200}
201
202impl Fd {
203    /// This [`Fd`] can be used with read system calls.
204    pub const READ: u16 = 1;
205    /// This [`Fd`] can be used with write system calls.
206    pub const WRITE: u16 = 2;
207    /// This [`Fd`] can append in write system calls. Note that the append
208    /// permission implies the write permission.
209    pub const APPEND: u16 = 4;
210    /// This [`Fd`] will delete everything before writing. Note that truncate
211    /// permissions require the write permission.
212    ///
213    /// This permission is currently unused when deserializing [`WasiState`].
214    pub const TRUNCATE: u16 = 8;
215    /// This [`Fd`] may create a file before writing to it. Note that create
216    /// permissions require write permissions.
217    ///
218    /// This permission is currently unused when deserializing [`WasiState`].
219    pub const CREATE: u16 = 16;
220}
221
222#[derive(Debug)]
223#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
224pub struct WasiInodes {
225    pub arena: Arena<InodeVal>,
226    pub orphan_fds: HashMap<Inode, InodeVal>,
227}
228
229impl WasiInodes {
230    /// gets either a normal inode or an orphaned inode
231    pub fn get_inodeval(&self, inode: generational_arena::Index) -> Result<&InodeVal, Errno> {
232        if let Some(iv) = self.arena.get(inode) {
233            Ok(iv)
234        } else {
235            self.orphan_fds.get(&inode).ok_or(Errno::Badf)
236        }
237    }
238
239    /// gets either a normal inode or an orphaned inode
240    pub fn get_inodeval_mut(
241        &mut self,
242        inode: generational_arena::Index,
243    ) -> Result<&mut InodeVal, Errno> {
244        if let Some(iv) = self.arena.get_mut(inode) {
245            Ok(iv)
246        } else {
247            self.orphan_fds.get_mut(&inode).ok_or(Errno::Badf)
248        }
249    }
250
251    /// Get the `VirtualFile` object at stdout
252    pub(crate) fn stdout(
253        &self,
254        fd_map: &RwLock<HashMap<u32, Fd>>,
255    ) -> Result<InodeValFileReadGuard, FsError> {
256        self.std_dev_get(fd_map, __WASI_STDOUT_FILENO)
257    }
258    /// Get the `VirtualFile` object at stdout mutably
259    pub(crate) fn stdout_mut(
260        &self,
261        fd_map: &RwLock<HashMap<u32, Fd>>,
262    ) -> Result<InodeValFileWriteGuard, FsError> {
263        self.std_dev_get_mut(fd_map, __WASI_STDOUT_FILENO)
264    }
265
266    /// Get the `VirtualFile` object at stderr
267    pub(crate) fn stderr(
268        &self,
269        fd_map: &RwLock<HashMap<u32, Fd>>,
270    ) -> Result<InodeValFileReadGuard, FsError> {
271        self.std_dev_get(fd_map, __WASI_STDERR_FILENO)
272    }
273    /// Get the `VirtualFile` object at stderr mutably
274    pub(crate) fn stderr_mut(
275        &self,
276        fd_map: &RwLock<HashMap<u32, Fd>>,
277    ) -> Result<InodeValFileWriteGuard, FsError> {
278        self.std_dev_get_mut(fd_map, __WASI_STDERR_FILENO)
279    }
280
281    /// Get the `VirtualFile` object at stdin
282    pub(crate) fn stdin(
283        &self,
284        fd_map: &RwLock<HashMap<u32, Fd>>,
285    ) -> Result<InodeValFileReadGuard, FsError> {
286        self.std_dev_get(fd_map, __WASI_STDIN_FILENO)
287    }
288    /// Get the `VirtualFile` object at stdin mutably
289    pub(crate) fn stdin_mut(
290        &self,
291        fd_map: &RwLock<HashMap<u32, Fd>>,
292    ) -> Result<InodeValFileWriteGuard, FsError> {
293        self.std_dev_get_mut(fd_map, __WASI_STDIN_FILENO)
294    }
295
296    /// Internal helper function to get a standard device handle.
297    /// Expects one of `__WASI_STDIN_FILENO`, `__WASI_STDOUT_FILENO`, `__WASI_STDERR_FILENO`.
298    fn std_dev_get<'a>(
299        &'a self,
300        fd_map: &RwLock<HashMap<u32, Fd>>,
301        fd: WasiFd,
302    ) -> Result<InodeValFileReadGuard<'a>, FsError> {
303        if let Some(fd) = fd_map.read().unwrap().get(&fd) {
304            let guard = self.arena[fd.inode].read();
305            if let Kind::File { .. } = guard.deref() {
306                Ok(InodeValFileReadGuard { guard })
307            } else {
308                // Our public API should ensure that this is not possible
309                Err(FsError::NotAFile)
310            }
311        } else {
312            // this should only trigger if we made a mistake in this crate
313            Err(FsError::NoDevice)
314        }
315    }
316    /// Internal helper function to mutably get a standard device handle.
317    /// Expects one of `__WASI_STDIN_FILENO`, `__WASI_STDOUT_FILENO`, `__WASI_STDERR_FILENO`.
318    fn std_dev_get_mut<'a>(
319        &'a self,
320        fd_map: &RwLock<HashMap<u32, Fd>>,
321        fd: WasiFd,
322    ) -> Result<InodeValFileWriteGuard<'a>, FsError> {
323        if let Some(fd) = fd_map.read().unwrap().get(&fd) {
324            let guard = self.arena[fd.inode].write();
325            if let Kind::File { .. } = guard.deref() {
326                Ok(InodeValFileWriteGuard { guard })
327            } else {
328                // Our public API should ensure that this is not possible
329                Err(FsError::NotAFile)
330            }
331        } else {
332            // this should only trigger if we made a mistake in this crate
333            Err(FsError::NoDevice)
334        }
335    }
336}
337
338/// Warning, modifying these fields directly may cause invariants to break and
339/// should be considered unsafe.  These fields may be made private in a future release
340#[derive(Debug)]
341#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
342pub struct WasiFs {
343    //pub repo: Repo,
344    pub preopen_fds: RwLock<Vec<u32>>,
345    pub name_map: HashMap<String, Inode>,
346    pub fd_map: RwLock<HashMap<u32, Fd>>,
347    pub next_fd: AtomicU32,
348    inode_counter: AtomicU64,
349    pub current_dir: Mutex<String>,
350    pub is_wasix: AtomicBool,
351    #[cfg_attr(feature = "enable-serde", serde(skip, default = "default_fs_backing"))]
352    pub fs_backing: Box<dyn FileSystem>,
353}
354
355/// Returns the default filesystem backing
356pub(crate) fn default_fs_backing() -> Box<dyn wasmer_vfs::FileSystem> {
357    cfg_if::cfg_if! {
358        if #[cfg(feature = "host-fs")] {
359            Box::new(wasmer_vfs::host_fs::FileSystem::default())
360        } else if #[cfg(feature = "mem-fs")] {
361            Box::new(wasmer_vfs::mem_fs::FileSystem::default())
362        } else {
363            Box::new(FallbackFileSystem::default())
364        }
365    }
366}
367
368#[derive(Debug, Default)]
369pub struct FallbackFileSystem;
370
371impl FallbackFileSystem {
372    fn fail() -> ! {
373        panic!("No filesystem set for wasmer-wasi, please enable either the `host-fs` or `mem-fs` feature or set your custom filesystem with `WasiStateBuilder::set_fs`");
374    }
375}
376
377impl FileSystem for FallbackFileSystem {
378    fn read_dir(&self, _path: &Path) -> Result<wasmer_vfs::ReadDir, FsError> {
379        Self::fail();
380    }
381    fn create_dir(&self, _path: &Path) -> Result<(), FsError> {
382        Self::fail();
383    }
384    fn remove_dir(&self, _path: &Path) -> Result<(), FsError> {
385        Self::fail();
386    }
387    fn rename(&self, _from: &Path, _to: &Path) -> Result<(), FsError> {
388        Self::fail();
389    }
390    fn metadata(&self, _path: &Path) -> Result<wasmer_vfs::Metadata, FsError> {
391        Self::fail();
392    }
393    fn symlink_metadata(&self, _path: &Path) -> Result<wasmer_vfs::Metadata, FsError> {
394        Self::fail();
395    }
396    fn remove_file(&self, _path: &Path) -> Result<(), FsError> {
397        Self::fail();
398    }
399    fn new_open_options(&self) -> wasmer_vfs::OpenOptions {
400        Self::fail();
401    }
402}
403
404impl WasiFs {
405    /// Created for the builder API. like `new` but with more information
406    pub(crate) fn new_with_preopen(
407        inodes: &mut WasiInodes,
408        preopens: &[PreopenedDir],
409        vfs_preopens: &[String],
410        fs_backing: Box<dyn FileSystem>,
411    ) -> Result<Self, String> {
412        let (wasi_fs, root_inode) = Self::new_init(fs_backing, inodes)?;
413
414        for preopen_name in vfs_preopens {
415            let kind = Kind::Dir {
416                parent: Some(root_inode),
417                path: PathBuf::from(preopen_name),
418                entries: Default::default(),
419            };
420            let rights = Rights::FD_ADVISE
421                | Rights::FD_TELL
422                | Rights::FD_SEEK
423                | Rights::FD_READ
424                | Rights::PATH_OPEN
425                | Rights::FD_READDIR
426                | Rights::PATH_READLINK
427                | Rights::PATH_FILESTAT_GET
428                | Rights::FD_FILESTAT_GET
429                | Rights::PATH_LINK_SOURCE
430                | Rights::PATH_RENAME_SOURCE
431                | Rights::POLL_FD_READWRITE
432                | Rights::SOCK_SHUTDOWN;
433            let inode = wasi_fs
434                .create_inode(inodes, kind, true, preopen_name.clone())
435                .map_err(|e| {
436                    format!(
437                        "Failed to create inode for preopened dir (name `{}`): WASI error code: {}",
438                        preopen_name, e
439                    )
440                })?;
441            let fd_flags = Fd::READ;
442            let fd = wasi_fs
443                .create_fd(rights, rights, Fdflags::empty(), fd_flags, inode)
444                .map_err(|e| format!("Could not open fd for file {:?}: {}", preopen_name, e))?;
445            {
446                let mut guard = inodes.arena[root_inode].write();
447                if let Kind::Root { entries } = guard.deref_mut() {
448                    let existing_entry = entries.insert(preopen_name.clone(), inode);
449                    if existing_entry.is_some() {
450                        return Err(format!(
451                            "Found duplicate entry for alias `{}`",
452                            preopen_name
453                        ));
454                    }
455                    assert!(existing_entry.is_none())
456                }
457            }
458            wasi_fs.preopen_fds.write().unwrap().push(fd);
459        }
460
461        for PreopenedDir {
462            path,
463            alias,
464            read,
465            write,
466            create,
467        } in preopens
468        {
469            debug!(
470                "Attempting to preopen {} with alias {:?}",
471                &path.to_string_lossy(),
472                &alias
473            );
474            let cur_dir_metadata = wasi_fs
475                .fs_backing
476                .metadata(path)
477                .map_err(|e| format!("Could not get metadata for file {:?}: {}", path, e))?;
478
479            let kind = if cur_dir_metadata.is_dir() {
480                Kind::Dir {
481                    parent: Some(root_inode),
482                    path: path.clone(),
483                    entries: Default::default(),
484                }
485            } else {
486                return Err(format!(
487                    "WASI only supports pre-opened directories right now; found \"{}\"",
488                    &path.to_string_lossy()
489                ));
490            };
491
492            let rights = {
493                // TODO: review tell' and fd_readwrite
494                let mut rights = Rights::FD_ADVISE | Rights::FD_TELL | Rights::FD_SEEK;
495                if *read {
496                    rights |= Rights::FD_READ
497                        | Rights::PATH_OPEN
498                        | Rights::FD_READDIR
499                        | Rights::PATH_READLINK
500                        | Rights::PATH_FILESTAT_GET
501                        | Rights::FD_FILESTAT_GET
502                        | Rights::PATH_LINK_SOURCE
503                        | Rights::PATH_RENAME_SOURCE
504                        | Rights::POLL_FD_READWRITE
505                        | Rights::SOCK_SHUTDOWN;
506                }
507                if *write {
508                    rights |= Rights::FD_DATASYNC
509                        | Rights::FD_FDSTAT_SET_FLAGS
510                        | Rights::FD_WRITE
511                        | Rights::FD_SYNC
512                        | Rights::FD_ALLOCATE
513                        | Rights::PATH_OPEN
514                        | Rights::PATH_RENAME_TARGET
515                        | Rights::PATH_FILESTAT_SET_SIZE
516                        | Rights::PATH_FILESTAT_SET_TIMES
517                        | Rights::FD_FILESTAT_SET_SIZE
518                        | Rights::FD_FILESTAT_SET_TIMES
519                        | Rights::PATH_REMOVE_DIRECTORY
520                        | Rights::PATH_UNLINK_FILE
521                        | Rights::POLL_FD_READWRITE
522                        | Rights::SOCK_SHUTDOWN;
523                }
524                if *create {
525                    rights |= Rights::PATH_CREATE_DIRECTORY
526                        | Rights::PATH_CREATE_FILE
527                        | Rights::PATH_LINK_TARGET
528                        | Rights::PATH_OPEN
529                        | Rights::PATH_RENAME_TARGET
530                        | Rights::PATH_SYMLINK;
531                }
532
533                rights
534            };
535            let inode = if let Some(alias) = &alias {
536                wasi_fs.create_inode(inodes, kind, true, alias.clone())
537            } else {
538                wasi_fs.create_inode(inodes, kind, true, path.to_string_lossy().into_owned())
539            }
540            .map_err(|e| {
541                format!(
542                    "Failed to create inode for preopened dir: WASI error code: {}",
543                    e
544                )
545            })?;
546            let fd_flags = {
547                let mut fd_flags = 0;
548                if *read {
549                    fd_flags |= Fd::READ;
550                }
551                if *write {
552                    // TODO: introduce API for finer grained control
553                    fd_flags |= Fd::WRITE | Fd::APPEND | Fd::TRUNCATE;
554                }
555                if *create {
556                    fd_flags |= Fd::CREATE;
557                }
558                fd_flags
559            };
560            let fd = wasi_fs
561                .create_fd(rights, rights, Fdflags::empty(), fd_flags, inode)
562                .map_err(|e| format!("Could not open fd for file {:?}: {}", path, e))?;
563            {
564                let mut guard = inodes.arena[root_inode].write();
565                if let Kind::Root { entries } = guard.deref_mut() {
566                    let key = if let Some(alias) = &alias {
567                        alias.clone()
568                    } else {
569                        path.to_string_lossy().into_owned()
570                    };
571                    let existing_entry = entries.insert(key.clone(), inode);
572                    if existing_entry.is_some() {
573                        return Err(format!("Found duplicate entry for alias `{}`", key));
574                    }
575                    assert!(existing_entry.is_none())
576                }
577            }
578            wasi_fs.preopen_fds.write().unwrap().push(fd);
579        }
580
581        Ok(wasi_fs)
582    }
583
584    /// Private helper function to init the filesystem, called in `new` and
585    /// `new_with_preopen`
586    fn new_init(
587        fs_backing: Box<dyn FileSystem>,
588        inodes: &mut WasiInodes,
589    ) -> Result<(Self, Inode), String> {
590        debug!("Initializing WASI filesystem");
591        let wasi_fs = Self {
592            preopen_fds: RwLock::new(vec![]),
593            name_map: HashMap::new(),
594            fd_map: RwLock::new(HashMap::new()),
595            next_fd: AtomicU32::new(3),
596            inode_counter: AtomicU64::new(1024),
597            current_dir: Mutex::new("/".to_string()),
598            is_wasix: AtomicBool::new(false),
599            fs_backing,
600        };
601        wasi_fs.create_stdin(inodes);
602        wasi_fs.create_stdout(inodes);
603        wasi_fs.create_stderr(inodes);
604
605        // create virtual root
606        let root_inode = {
607            let all_rights = ALL_RIGHTS;
608            // TODO: make this a list of positive rigths instead of negative ones
609            // root gets all right for now
610            let root_rights = all_rights
611                /*
612                & (!Rights::FD_WRITE)
613                & (!Rights::FD_ALLOCATE)
614                & (!Rights::PATH_CREATE_DIRECTORY)
615                & (!Rights::PATH_CREATE_FILE)
616                & (!Rights::PATH_LINK_SOURCE)
617                & (!Rights::PATH_RENAME_SOURCE)
618                & (!Rights::PATH_RENAME_TARGET)
619                & (!Rights::PATH_FILESTAT_SET_SIZE)
620                & (!Rights::PATH_FILESTAT_SET_TIMES)
621                & (!Rights::FD_FILESTAT_SET_SIZE)
622                & (!Rights::FD_FILESTAT_SET_TIMES)
623                & (!Rights::PATH_SYMLINK)
624                & (!Rights::PATH_UNLINK_FILE)
625                & (!Rights::PATH_REMOVE_DIRECTORY)
626                */;
627            let inode = wasi_fs.create_virtual_root(inodes);
628            let fd = wasi_fs
629                .create_fd(root_rights, root_rights, Fdflags::empty(), Fd::READ, inode)
630                .map_err(|e| format!("Could not create root fd: {}", e))?;
631            wasi_fs.preopen_fds.write().unwrap().push(fd);
632            inode
633        };
634
635        Ok((wasi_fs, root_inode))
636    }
637
638    /// Returns the next available inode index for creating a new inode.
639    fn get_next_inode_index(&self) -> u64 {
640        self.inode_counter.fetch_add(1, Ordering::AcqRel)
641    }
642
643    /// This function is like create dir all, but it also opens it.
644    /// Function is unsafe because it may break invariants and hasn't been tested.
645    /// This is an experimental function and may be removed
646    ///
647    /// # Safety
648    /// - Virtual directories created with this function must not conflict with
649    ///   the standard operation of the WASI filesystem.  This is vague and
650    ///   unlikely in pratice.  [Join the discussion](https://github.com/wasmerio/wasmer/issues/1219)
651    ///   for what the newer, safer WASI FS APIs should look like.
652    #[allow(dead_code)]
653    pub unsafe fn open_dir_all(
654        &mut self,
655        inodes: &mut WasiInodes,
656        base: WasiFd,
657        name: String,
658        rights: Rights,
659        rights_inheriting: Rights,
660        flags: Fdflags,
661    ) -> Result<WasiFd, FsError> {
662        // TODO: check permissions here? probably not, but this should be
663        // an explicit choice, so justify it in a comment when we remove this one
664        let mut cur_inode = self.get_fd_inode(base).map_err(fs_error_from_wasi_err)?;
665
666        let path: &Path = Path::new(&name);
667        //let n_components = path.components().count();
668        for c in path.components() {
669            let segment_name = c.as_os_str().to_string_lossy().to_string();
670            let guard = inodes.arena[cur_inode].read();
671            let deref = guard.deref();
672            match deref {
673                Kind::Dir { ref entries, .. } | Kind::Root { ref entries } => {
674                    if let Some(_entry) = entries.get(&segment_name) {
675                        // TODO: this should be fixed
676                        return Err(FsError::AlreadyExists);
677                    }
678
679                    let kind = Kind::Dir {
680                        parent: Some(cur_inode),
681                        path: PathBuf::from(""),
682                        entries: HashMap::new(),
683                    };
684
685                    drop(guard);
686                    let inode = self.create_inode_with_default_stat(
687                        inodes,
688                        kind,
689                        false,
690                        segment_name.clone(),
691                    );
692
693                    // reborrow to insert
694                    {
695                        let mut guard = inodes.arena[cur_inode].write();
696                        let deref_mut = guard.deref_mut();
697                        match deref_mut {
698                            Kind::Dir {
699                                ref mut entries, ..
700                            }
701                            | Kind::Root { ref mut entries } => {
702                                entries.insert(segment_name, inode);
703                            }
704                            _ => unreachable!("Dir or Root became not Dir or Root"),
705                        }
706                    }
707                    cur_inode = inode;
708                }
709                _ => return Err(FsError::BaseNotDirectory),
710            }
711        }
712
713        // TODO: review open flags (read, write); they were added without consideration
714        self.create_fd(
715            rights,
716            rights_inheriting,
717            flags,
718            Fd::READ | Fd::WRITE,
719            cur_inode,
720        )
721        .map_err(fs_error_from_wasi_err)
722    }
723
724    /// Opens a user-supplied file in the directory specified with the
725    /// name and flags given
726    // dead code because this is an API for external use
727    #[allow(dead_code)]
728    pub fn open_file_at(
729        &mut self,
730        inodes: &mut WasiInodes,
731        base: WasiFd,
732        file: Box<dyn VirtualFile + Send + Sync + 'static>,
733        open_flags: u16,
734        name: String,
735        rights: Rights,
736        rights_inheriting: Rights,
737        flags: Fdflags,
738    ) -> Result<WasiFd, FsError> {
739        // TODO: check permissions here? probably not, but this should be
740        // an explicit choice, so justify it in a comment when we remove this one
741        let base_inode = self.get_fd_inode(base).map_err(fs_error_from_wasi_err)?;
742
743        let guard = inodes.arena[base_inode].read();
744        let deref = guard.deref();
745        match deref {
746            Kind::Dir { ref entries, .. } | Kind::Root { ref entries } => {
747                if let Some(_entry) = entries.get(&name) {
748                    // TODO: eventually change the logic here to allow overwrites
749                    return Err(FsError::AlreadyExists);
750                }
751
752                let kind = Kind::File {
753                    handle: Some(file),
754                    path: PathBuf::from(""),
755                    fd: Some(self.next_fd.load(Ordering::Acquire)),
756                };
757
758                drop(guard);
759                let inode = self
760                    .create_inode(inodes, kind, false, name.clone())
761                    .map_err(|_| FsError::IOError)?;
762
763                {
764                    let mut guard = inodes.arena[base_inode].write();
765                    let deref_mut = guard.deref_mut();
766                    match deref_mut {
767                        Kind::Dir {
768                            ref mut entries, ..
769                        }
770                        | Kind::Root { ref mut entries } => {
771                            entries.insert(name, inode);
772                        }
773                        _ => unreachable!("Dir or Root became not Dir or Root"),
774                    }
775                }
776
777                self.create_fd(rights, rights_inheriting, flags, open_flags, inode)
778                    .map_err(fs_error_from_wasi_err)
779            }
780            _ => Err(FsError::BaseNotDirectory),
781        }
782    }
783
784    /// Change the backing of a given file descriptor
785    /// Returns the old backing
786    /// TODO: add examples
787    #[allow(dead_code)]
788    pub fn swap_file(
789        &self,
790        inodes: &WasiInodes,
791        fd: WasiFd,
792        file: Box<dyn VirtualFile + Send + Sync + 'static>,
793    ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
794        let mut ret = Some(file);
795        match fd {
796            __WASI_STDIN_FILENO => {
797                let mut target = inodes.stdin_mut(&self.fd_map)?;
798                std::mem::swap(target.deref_mut(), &mut ret);
799            }
800            __WASI_STDOUT_FILENO => {
801                let mut target = inodes.stdout_mut(&self.fd_map)?;
802                std::mem::swap(target.deref_mut(), &mut ret);
803            }
804            __WASI_STDERR_FILENO => {
805                let mut target = inodes.stderr_mut(&self.fd_map)?;
806                std::mem::swap(target.deref_mut(), &mut ret);
807            }
808            _ => {
809                let base_inode = self.get_fd_inode(fd).map_err(fs_error_from_wasi_err)?;
810                let mut guard = inodes.arena[base_inode].write();
811                let deref_mut = guard.deref_mut();
812                match deref_mut {
813                    Kind::File { ref mut handle, .. } => {
814                        std::mem::swap(handle, &mut ret);
815                    }
816                    _ => return Err(FsError::NotAFile),
817                }
818            }
819        }
820
821        Ok(ret)
822    }
823
824    /// refresh size from filesystem
825    pub(crate) fn filestat_resync_size(
826        &self,
827        inodes: &WasiInodes,
828        fd: WasiFd,
829    ) -> Result<Filesize, Errno> {
830        let inode = self.get_fd_inode(fd)?;
831        let mut guard = inodes.arena[inode].write();
832        let deref_mut = guard.deref_mut();
833        match deref_mut {
834            Kind::File { handle, .. } => {
835                if let Some(h) = handle {
836                    let new_size = h.size();
837                    drop(guard);
838
839                    inodes.arena[inode].stat.write().unwrap().st_size = new_size;
840                    Ok(new_size as Filesize)
841                } else {
842                    Err(Errno::Badf)
843                }
844            }
845            Kind::Dir { .. } | Kind::Root { .. } => Err(Errno::Isdir),
846            _ => Err(Errno::Inval),
847        }
848    }
849
850    /// Changes the current directory
851    pub fn set_current_dir(&self, path: &str) {
852        let mut guard = self.current_dir.lock().unwrap();
853        *guard = path.to_string();
854    }
855
856    /// Gets the current directory
857    pub fn get_current_dir(
858        &self,
859        inodes: &mut WasiInodes,
860        base: WasiFd,
861    ) -> Result<(Inode, String), Errno> {
862        self.get_current_dir_inner(inodes, base, 0)
863    }
864
865    pub(crate) fn get_current_dir_inner(
866        &self,
867        inodes: &mut WasiInodes,
868        base: WasiFd,
869        symlink_count: u32,
870    ) -> Result<(Inode, String), Errno> {
871        let current_dir = {
872            let guard = self.current_dir.lock().unwrap();
873            guard.clone()
874        };
875        let cur_inode = self.get_fd_inode(base)?;
876        let inode = self.get_inode_at_path_inner(
877            inodes,
878            cur_inode,
879            current_dir.as_str(),
880            symlink_count,
881            true,
882        )?;
883        Ok((inode, current_dir))
884    }
885
886    /// Internal part of the core path resolution function which implements path
887    /// traversal logic such as resolving relative path segments (such as
888    /// `.` and `..`) and resolving symlinks (while preventing infinite
889    /// loops/stack overflows).
890    ///
891    /// TODO: expand upon exactly what the state of the returned value is,
892    /// explaining lazy-loading from the real file system and synchronizing
893    /// between them.
894    ///
895    /// This is where a lot of the magic happens, be very careful when editing
896    /// this code.
897    ///
898    /// TODO: write more tests for this code
899    fn get_inode_at_path_inner(
900        &self,
901        inodes: &mut WasiInodes,
902        mut cur_inode: generational_arena::Index,
903        path: &str,
904        mut symlink_count: u32,
905        follow_symlinks: bool,
906    ) -> Result<Inode, Errno> {
907        if symlink_count > MAX_SYMLINKS {
908            return Err(Errno::Mlink);
909        }
910
911        let path: &Path = Path::new(path);
912        let n_components = path.components().count();
913
914        // TODO: rights checks
915        'path_iter: for (i, component) in path.components().enumerate() {
916            // used to terminate symlink resolution properly
917            let last_component = i + 1 == n_components;
918            // for each component traverse file structure
919            // loading inodes as necessary
920            'symlink_resolution: while symlink_count < MAX_SYMLINKS {
921                let mut guard = inodes.arena[cur_inode].write();
922                let deref_mut = guard.deref_mut();
923                match deref_mut {
924                    Kind::Buffer { .. } => unimplemented!("state::get_inode_at_path for buffers"),
925                    Kind::Dir {
926                        ref mut entries,
927                        ref path,
928                        ref parent,
929                        ..
930                    } => {
931                        match component.as_os_str().to_string_lossy().borrow() {
932                            ".." => {
933                                if let Some(p) = parent {
934                                    cur_inode = *p;
935                                    continue 'path_iter;
936                                } else {
937                                    return Err(Errno::Access);
938                                }
939                            }
940                            "." => continue 'path_iter,
941                            _ => (),
942                        }
943                        // used for full resolution of symlinks
944                        let mut loop_for_symlink = false;
945                        if let Some(entry) =
946                            entries.get(component.as_os_str().to_string_lossy().as_ref())
947                        {
948                            cur_inode = *entry;
949                        } else {
950                            let file = {
951                                let mut cd = path.clone();
952                                cd.push(component);
953                                cd
954                            };
955                            let metadata = self
956                                .fs_backing
957                                .symlink_metadata(&file)
958                                .ok()
959                                .ok_or(Errno::Noent)?;
960                            let file_type = metadata.file_type();
961                            // we want to insert newly opened dirs and files, but not transient symlinks
962                            // TODO: explain why (think about this deeply when well rested)
963                            let should_insert;
964
965                            let kind = if file_type.is_dir() {
966                                should_insert = true;
967                                // load DIR
968                                Kind::Dir {
969                                    parent: Some(cur_inode),
970                                    path: file.clone(),
971                                    entries: Default::default(),
972                                }
973                            } else if file_type.is_file() {
974                                should_insert = true;
975                                // load file
976                                Kind::File {
977                                    handle: None,
978                                    path: file.clone(),
979                                    fd: None,
980                                }
981                            } else if file_type.is_symlink() {
982                                should_insert = false;
983                                let link_value = file.read_link().map_err(map_io_err)?;
984                                debug!("attempting to decompose path {:?}", link_value);
985
986                                let (pre_open_dir_fd, relative_path) = if link_value.is_relative() {
987                                    self.path_into_pre_open_and_relative_path(inodes, &file)?
988                                } else {
989                                    unimplemented!("Absolute symlinks are not yet supported");
990                                };
991                                loop_for_symlink = true;
992                                symlink_count += 1;
993                                Kind::Symlink {
994                                    base_po_dir: pre_open_dir_fd,
995                                    path_to_symlink: relative_path.to_owned(),
996                                    relative_path: link_value,
997                                }
998                            } else {
999                                #[cfg(unix)]
1000                                {
1001                                    //use std::os::unix::fs::FileTypeExt;
1002                                    let file_type: Filetype = if file_type.is_char_device() {
1003                                        Filetype::CharacterDevice
1004                                    } else if file_type.is_block_device() {
1005                                        Filetype::BlockDevice
1006                                    } else if file_type.is_fifo() {
1007                                        // FIFO doesn't seem to fit any other type, so unknown
1008                                        Filetype::Unknown
1009                                    } else if file_type.is_socket() {
1010                                        // TODO: how do we know if it's a `SocketStream` or
1011                                        // a `SocketDgram`?
1012                                        Filetype::SocketStream
1013                                    } else {
1014                                        unimplemented!("state::get_inode_at_path unknown file type: not file, directory, symlink, char device, block device, fifo, or socket");
1015                                    };
1016
1017                                    let kind = Kind::File {
1018                                        handle: None,
1019                                        path: file.clone(),
1020                                        fd: None,
1021                                    };
1022                                    drop(guard);
1023                                    let new_inode = self.create_inode_with_stat(
1024                                        inodes,
1025                                        kind,
1026                                        false,
1027                                        file.to_string_lossy().to_string(),
1028                                        Filestat {
1029                                            st_filetype: file_type,
1030                                            ..Filestat::default()
1031                                        },
1032                                    );
1033
1034                                    let mut guard = inodes.arena[cur_inode].write();
1035                                    if let Kind::Dir {
1036                                        ref mut entries, ..
1037                                    } = guard.deref_mut()
1038                                    {
1039                                        entries.insert(
1040                                            component.as_os_str().to_string_lossy().to_string(),
1041                                            new_inode,
1042                                        );
1043                                    } else {
1044                                        unreachable!(
1045                                            "Attempted to insert special device into non-directory"
1046                                        );
1047                                    }
1048                                    // perhaps just continue with symlink resolution and return at the end
1049                                    return Ok(new_inode);
1050                                }
1051                                #[cfg(not(unix))]
1052                                unimplemented!("state::get_inode_at_path unknown file type: not file, directory, or symlink");
1053                            };
1054
1055                            drop(guard);
1056                            let new_inode = self.create_inode(
1057                                inodes,
1058                                kind,
1059                                false,
1060                                file.to_string_lossy().to_string(),
1061                            )?;
1062                            if should_insert {
1063                                let mut guard = inodes.arena[cur_inode].write();
1064                                if let Kind::Dir {
1065                                    ref mut entries, ..
1066                                } = guard.deref_mut()
1067                                {
1068                                    entries.insert(
1069                                        component.as_os_str().to_string_lossy().to_string(),
1070                                        new_inode,
1071                                    );
1072                                }
1073                            }
1074                            cur_inode = new_inode;
1075
1076                            if loop_for_symlink && follow_symlinks {
1077                                debug!("Following symlink to {:?}", cur_inode);
1078                                continue 'symlink_resolution;
1079                            }
1080                        }
1081                    }
1082                    Kind::Root { entries } => {
1083                        match component.as_os_str().to_string_lossy().borrow() {
1084                            // the root's parent is the root
1085                            ".." => continue 'path_iter,
1086                            // the root's current directory is the root
1087                            "." => continue 'path_iter,
1088                            _ => (),
1089                        }
1090
1091                        if let Some(entry) =
1092                            entries.get(component.as_os_str().to_string_lossy().as_ref())
1093                        {
1094                            cur_inode = *entry;
1095                        } else {
1096                            // Root is not capable of having something other then preopenned folders
1097                            return Err(Errno::Notcapable);
1098                        }
1099                    }
1100                    Kind::File { .. }
1101                    | Kind::Socket { .. }
1102                    | Kind::Pipe { .. }
1103                    | Kind::EventNotifications { .. } => {
1104                        return Err(Errno::Notdir);
1105                    }
1106                    Kind::Symlink {
1107                        base_po_dir,
1108                        path_to_symlink,
1109                        relative_path,
1110                    } => {
1111                        let new_base_dir = *base_po_dir;
1112                        let new_base_inode = self.get_fd_inode(new_base_dir)?;
1113
1114                        // allocate to reborrow mutabily to recur
1115                        let new_path = {
1116                            /*if let Kind::Root { .. } = self.inodes[base_po_dir].kind {
1117                                assert!(false, "symlinks should never be relative to the root");
1118                            }*/
1119                            let mut base = path_to_symlink.clone();
1120                            // remove the symlink file itself from the path, leaving just the path from the base
1121                            // to the dir containing the symlink
1122                            base.pop();
1123                            base.push(relative_path);
1124                            base.to_string_lossy().to_string()
1125                        };
1126                        debug!("Following symlink recursively");
1127                        drop(guard);
1128                        let symlink_inode = self.get_inode_at_path_inner(
1129                            inodes,
1130                            new_base_inode,
1131                            &new_path,
1132                            symlink_count + 1,
1133                            follow_symlinks,
1134                        )?;
1135                        cur_inode = symlink_inode;
1136                        // if we're at the very end and we found a file, then we're done
1137                        // TODO: figure out if this should also happen for directories?
1138                        let guard = inodes.arena[cur_inode].read();
1139                        if let Kind::File { .. } = guard.deref() {
1140                            // check if on last step
1141                            if last_component {
1142                                break 'symlink_resolution;
1143                            }
1144                        }
1145                        continue 'symlink_resolution;
1146                    }
1147                }
1148                break 'symlink_resolution;
1149            }
1150        }
1151
1152        Ok(cur_inode)
1153    }
1154
1155    /// Finds the preopened directory that is the "best match" for the given path and
1156    /// returns a path relative to this preopened directory.
1157    ///
1158    /// The "best match" is the preopened directory that has the longest prefix of the
1159    /// given path. For example, given preopened directories [`a`, `a/b`, `a/c`] and
1160    /// the path `a/b/c/file`, we will return the fd corresponding to the preopened
1161    /// directory, `a/b` and the relative path `c/file`.
1162    ///
1163    /// In the case of a tie, the later preopened fd is preferred.
1164    fn path_into_pre_open_and_relative_path<'path>(
1165        &self,
1166        inodes: &WasiInodes,
1167        path: &'path Path,
1168    ) -> Result<(WasiFd, &'path Path), Errno> {
1169        enum BaseFdAndRelPath<'a> {
1170            None,
1171            BestMatch {
1172                fd: WasiFd,
1173                rel_path: &'a Path,
1174                max_seen: usize,
1175            },
1176        }
1177
1178        impl<'a> BaseFdAndRelPath<'a> {
1179            const fn max_seen(&self) -> usize {
1180                match self {
1181                    Self::None => 0,
1182                    Self::BestMatch { max_seen, .. } => *max_seen,
1183                }
1184            }
1185        }
1186        let mut res = BaseFdAndRelPath::None;
1187        // for each preopened directory
1188        let preopen_fds = self.preopen_fds.read().unwrap();
1189        let deref = preopen_fds.deref();
1190        for po_fd in deref {
1191            let po_inode = self.fd_map.read().unwrap()[po_fd].inode;
1192            let guard = inodes.arena[po_inode].read();
1193            let deref = guard.deref();
1194            let po_path = match deref {
1195                Kind::Dir { path, .. } => &**path,
1196                Kind::Root { .. } => Path::new("/"),
1197                _ => unreachable!("Preopened FD that's not a directory or the root"),
1198            };
1199            // stem path based on it
1200            if let Ok(stripped_path) = path.strip_prefix(po_path) {
1201                // find the max
1202                let new_prefix_len = po_path.as_os_str().len();
1203                // we use >= to favor later preopens because we iterate in order
1204                // whereas WASI libc iterates in reverse to get this behavior.
1205                if new_prefix_len >= res.max_seen() {
1206                    res = BaseFdAndRelPath::BestMatch {
1207                        fd: *po_fd,
1208                        rel_path: stripped_path,
1209                        max_seen: new_prefix_len,
1210                    };
1211                }
1212            }
1213        }
1214        match res {
1215            // this error may not make sense depending on where it's called
1216            BaseFdAndRelPath::None => Err(Errno::Inval),
1217            BaseFdAndRelPath::BestMatch { fd, rel_path, .. } => Ok((fd, rel_path)),
1218        }
1219    }
1220
1221    /// finds the number of directories between the fd and the inode if they're connected
1222    /// expects inode to point to a directory
1223    pub(crate) fn path_depth_from_fd(
1224        &self,
1225        inodes: &WasiInodes,
1226        fd: WasiFd,
1227        inode: Inode,
1228    ) -> Result<usize, Errno> {
1229        let mut counter = 0;
1230        let base_inode = self.get_fd_inode(fd)?;
1231        let mut cur_inode = inode;
1232
1233        while cur_inode != base_inode {
1234            counter += 1;
1235            let guard = inodes.arena[cur_inode].read();
1236            let deref = guard.deref();
1237            match deref {
1238                Kind::Dir { parent, .. } => {
1239                    if let Some(p) = parent {
1240                        cur_inode = *p;
1241                    }
1242                }
1243                _ => return Err(Errno::Inval),
1244            }
1245        }
1246
1247        Ok(counter)
1248    }
1249
1250    /// gets a host file from a base directory and a path
1251    /// this function ensures the fs remains sandboxed
1252    // NOTE: follow symlinks is super weird right now
1253    // even if it's false, it still follows symlinks, just not the last
1254    // symlink so
1255    // This will be resolved when we have tests asserting the correct behavior
1256    pub(crate) fn get_inode_at_path(
1257        &self,
1258        inodes: &mut WasiInodes,
1259        base: WasiFd,
1260        path: &str,
1261        follow_symlinks: bool,
1262    ) -> Result<Inode, Errno> {
1263        let start_inode = if !path.starts_with('/') && self.is_wasix.load(Ordering::Acquire) {
1264            let (cur_inode, _) = self.get_current_dir(inodes, base)?;
1265            cur_inode
1266        } else {
1267            self.get_fd_inode(base)?
1268        };
1269
1270        self.get_inode_at_path_inner(inodes, start_inode, path, 0, follow_symlinks)
1271    }
1272
1273    /// Returns the parent Dir or Root that the file at a given path is in and the file name
1274    /// stripped off
1275    pub(crate) fn get_parent_inode_at_path(
1276        &self,
1277        inodes: &mut WasiInodes,
1278        base: WasiFd,
1279        path: &Path,
1280        follow_symlinks: bool,
1281    ) -> Result<(Inode, String), Errno> {
1282        let mut parent_dir = std::path::PathBuf::new();
1283        let mut components = path.components().rev();
1284        let new_entity_name = components
1285            .next()
1286            .ok_or(Errno::Inval)?
1287            .as_os_str()
1288            .to_string_lossy()
1289            .to_string();
1290        for comp in components.rev() {
1291            parent_dir.push(comp);
1292        }
1293        self.get_inode_at_path(inodes, base, &parent_dir.to_string_lossy(), follow_symlinks)
1294            .map(|v| (v, new_entity_name))
1295    }
1296
1297    pub fn get_fd(&self, fd: WasiFd) -> Result<Fd, Errno> {
1298        self.fd_map
1299            .read()
1300            .unwrap()
1301            .get(&fd)
1302            .ok_or(Errno::Badf)
1303            .map(|a| a.clone())
1304    }
1305
1306    pub fn get_fd_inode(&self, fd: WasiFd) -> Result<generational_arena::Index, Errno> {
1307        self.fd_map
1308            .read()
1309            .unwrap()
1310            .get(&fd)
1311            .ok_or(Errno::Badf)
1312            .map(|a| a.inode)
1313    }
1314
1315    pub fn filestat_fd(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<Filestat, Errno> {
1316        let inode = self.get_fd_inode(fd)?;
1317        Ok(*inodes.arena[inode].stat.read().unwrap().deref())
1318    }
1319
1320    pub fn fdstat(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<Fdstat, Errno> {
1321        match fd {
1322            __WASI_STDIN_FILENO => {
1323                return Ok(Fdstat {
1324                    fs_filetype: Filetype::CharacterDevice,
1325                    fs_flags: Fdflags::empty(),
1326                    fs_rights_base: STDIN_DEFAULT_RIGHTS,
1327                    fs_rights_inheriting: Rights::empty(),
1328                })
1329            }
1330            __WASI_STDOUT_FILENO => {
1331                return Ok(Fdstat {
1332                    fs_filetype: Filetype::CharacterDevice,
1333                    fs_flags: Fdflags::APPEND,
1334                    fs_rights_base: STDOUT_DEFAULT_RIGHTS,
1335                    fs_rights_inheriting: Rights::empty(),
1336                })
1337            }
1338            __WASI_STDERR_FILENO => {
1339                return Ok(Fdstat {
1340                    fs_filetype: Filetype::CharacterDevice,
1341                    fs_flags: Fdflags::APPEND,
1342                    fs_rights_base: STDERR_DEFAULT_RIGHTS,
1343                    fs_rights_inheriting: Rights::empty(),
1344                })
1345            }
1346            VIRTUAL_ROOT_FD => {
1347                return Ok(Fdstat {
1348                    fs_filetype: Filetype::Directory,
1349                    fs_flags: Fdflags::empty(),
1350                    // TODO: fix this
1351                    fs_rights_base: ALL_RIGHTS,
1352                    fs_rights_inheriting: ALL_RIGHTS,
1353                });
1354            }
1355            _ => (),
1356        }
1357        let fd = self.get_fd(fd)?;
1358        debug!("fdstat: {:?}", fd);
1359
1360        let guard = inodes.arena[fd.inode].read();
1361        let deref = guard.deref();
1362        Ok(Fdstat {
1363            fs_filetype: match deref {
1364                Kind::File { .. } => Filetype::RegularFile,
1365                Kind::Dir { .. } => Filetype::Directory,
1366                Kind::Symlink { .. } => Filetype::SymbolicLink,
1367                _ => Filetype::Unknown,
1368            },
1369            fs_flags: fd.flags,
1370            fs_rights_base: fd.rights,
1371            fs_rights_inheriting: fd.rights_inheriting, // TODO(lachlan): Is this right?
1372        })
1373    }
1374
1375    pub fn prestat_fd(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<Prestat, Errno> {
1376        let inode = self.get_fd_inode(fd)?;
1377        trace!("in prestat_fd {:?}", self.get_fd(fd)?);
1378
1379        let inode_val = &inodes.arena[inode];
1380
1381        if inode_val.is_preopened {
1382            Ok(self.prestat_fd_inner(inode_val))
1383        } else {
1384            Err(Errno::Badf)
1385        }
1386    }
1387
1388    pub(crate) fn prestat_fd_inner(&self, inode_val: &InodeVal) -> Prestat {
1389        Prestat {
1390            pr_type: Preopentype::Dir,
1391            u: PrestatEnum::Dir {
1392                // REVIEW:
1393                pr_name_len: inode_val.name.len() as u32, // no need for +1, because there is no 0 end-of-string marker
1394            }
1395            .untagged(),
1396        }
1397    }
1398
1399    pub fn flush(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<(), Errno> {
1400        match fd {
1401            __WASI_STDIN_FILENO => (),
1402            __WASI_STDOUT_FILENO => inodes
1403                .stdout_mut(&self.fd_map)
1404                .map_err(fs_error_into_wasi_err)?
1405                .as_mut()
1406                .map(|f| f.flush().map_err(map_io_err))
1407                .unwrap_or_else(|| Err(Errno::Io))?,
1408            __WASI_STDERR_FILENO => inodes
1409                .stderr_mut(&self.fd_map)
1410                .map_err(fs_error_into_wasi_err)?
1411                .as_mut()
1412                .and_then(|f| f.flush().ok())
1413                .ok_or(Errno::Io)?,
1414            _ => {
1415                let fd = self.get_fd(fd)?;
1416                if !fd.rights.contains(Rights::FD_DATASYNC) {
1417                    return Err(Errno::Access);
1418                }
1419
1420                let mut guard = inodes.arena[fd.inode].write();
1421                let deref_mut = guard.deref_mut();
1422                match deref_mut {
1423                    Kind::File {
1424                        handle: Some(file), ..
1425                    } => file.flush().map_err(|_| Errno::Io)?,
1426                    // TODO: verify this behavior
1427                    Kind::Dir { .. } => return Err(Errno::Isdir),
1428                    Kind::Symlink { .. } => unimplemented!("WasiFs::flush Kind::Symlink"),
1429                    Kind::Buffer { .. } => (),
1430                    _ => return Err(Errno::Io),
1431                }
1432            }
1433        }
1434        Ok(())
1435    }
1436
1437    /// Creates an inode and inserts it given a Kind and some extra data
1438    pub(crate) fn create_inode(
1439        &self,
1440        inodes: &mut WasiInodes,
1441        kind: Kind,
1442        is_preopened: bool,
1443        name: String,
1444    ) -> Result<Inode, Errno> {
1445        let stat = self.get_stat_for_kind(inodes, &kind)?;
1446        Ok(self.create_inode_with_stat(inodes, kind, is_preopened, name, stat))
1447    }
1448
1449    /// Creates an inode and inserts it given a Kind, does not assume the file exists.
1450    pub(crate) fn create_inode_with_default_stat(
1451        &self,
1452        inodes: &mut WasiInodes,
1453        kind: Kind,
1454        is_preopened: bool,
1455        name: String,
1456    ) -> Inode {
1457        let stat = Filestat::default();
1458        self.create_inode_with_stat(inodes, kind, is_preopened, name, stat)
1459    }
1460
1461    /// Creates an inode with the given filestat and inserts it.
1462    pub(crate) fn create_inode_with_stat(
1463        &self,
1464        inodes: &mut WasiInodes,
1465        kind: Kind,
1466        is_preopened: bool,
1467        name: String,
1468        mut stat: Filestat,
1469    ) -> Inode {
1470        stat.st_ino = self.get_next_inode_index();
1471
1472        inodes.arena.insert(InodeVal {
1473            stat: RwLock::new(stat),
1474            is_preopened,
1475            name,
1476            kind: RwLock::new(kind),
1477        })
1478    }
1479
1480    pub fn create_fd(
1481        &self,
1482        rights: Rights,
1483        rights_inheriting: Rights,
1484        flags: Fdflags,
1485        open_flags: u16,
1486        inode: Inode,
1487    ) -> Result<WasiFd, Errno> {
1488        let idx = self.next_fd.fetch_add(1, Ordering::AcqRel);
1489        self.fd_map.write().unwrap().insert(
1490            idx,
1491            Fd {
1492                rights,
1493                rights_inheriting,
1494                flags,
1495                offset: 0,
1496                open_flags,
1497                inode,
1498            },
1499        );
1500        Ok(idx)
1501    }
1502
1503    pub fn clone_fd(&self, fd: WasiFd) -> Result<WasiFd, Errno> {
1504        let fd = self.get_fd(fd)?;
1505        let idx = self.next_fd.fetch_add(1, Ordering::AcqRel);
1506        self.fd_map.write().unwrap().insert(
1507            idx,
1508            Fd {
1509                rights: fd.rights,
1510                rights_inheriting: fd.rights_inheriting,
1511                flags: fd.flags,
1512                offset: fd.offset,
1513                open_flags: fd.open_flags,
1514                inode: fd.inode,
1515            },
1516        );
1517        Ok(idx)
1518    }
1519
1520    /// Low level function to remove an inode, that is it deletes the WASI FS's
1521    /// knowledge of a file.
1522    ///
1523    /// This function returns the inode if it existed and was removed.
1524    ///
1525    /// # Safety
1526    /// - The caller must ensure that all references to the specified inode have
1527    ///   been removed from the filesystem.
1528    pub unsafe fn remove_inode(&self, inodes: &mut WasiInodes, inode: Inode) -> Option<InodeVal> {
1529        inodes.arena.remove(inode)
1530    }
1531
1532    fn create_virtual_root(&self, inodes: &mut WasiInodes) -> Inode {
1533        let stat = Filestat {
1534            st_filetype: Filetype::Directory,
1535            st_ino: self.get_next_inode_index(),
1536            ..Filestat::default()
1537        };
1538        let root_kind = Kind::Root {
1539            entries: HashMap::new(),
1540        };
1541
1542        inodes.arena.insert(InodeVal {
1543            stat: RwLock::new(stat),
1544            is_preopened: true,
1545            name: "/".to_string(),
1546            kind: RwLock::new(root_kind),
1547        })
1548    }
1549
1550    fn create_stdout(&self, inodes: &mut WasiInodes) {
1551        self.create_std_dev_inner(
1552            inodes,
1553            Box::new(Stdout::default()),
1554            "stdout",
1555            __WASI_STDOUT_FILENO,
1556            STDOUT_DEFAULT_RIGHTS,
1557            Fdflags::APPEND,
1558        );
1559    }
1560    fn create_stdin(&self, inodes: &mut WasiInodes) {
1561        self.create_std_dev_inner(
1562            inodes,
1563            Box::new(Stdin::default()),
1564            "stdin",
1565            __WASI_STDIN_FILENO,
1566            STDIN_DEFAULT_RIGHTS,
1567            Fdflags::empty(),
1568        );
1569    }
1570    fn create_stderr(&self, inodes: &mut WasiInodes) {
1571        self.create_std_dev_inner(
1572            inodes,
1573            Box::new(Stderr::default()),
1574            "stderr",
1575            __WASI_STDERR_FILENO,
1576            STDERR_DEFAULT_RIGHTS,
1577            Fdflags::APPEND,
1578        );
1579    }
1580
1581    fn create_std_dev_inner(
1582        &self,
1583        inodes: &mut WasiInodes,
1584        handle: Box<dyn VirtualFile + Send + Sync + 'static>,
1585        name: &'static str,
1586        raw_fd: WasiFd,
1587        rights: Rights,
1588        fd_flags: Fdflags,
1589    ) {
1590        let stat = Filestat {
1591            st_filetype: Filetype::CharacterDevice,
1592            st_ino: self.get_next_inode_index(),
1593            ..Filestat::default()
1594        };
1595        let kind = Kind::File {
1596            fd: Some(raw_fd),
1597            handle: Some(handle),
1598            path: "".into(),
1599        };
1600        let inode = {
1601            inodes.arena.insert(InodeVal {
1602                stat: RwLock::new(stat),
1603                is_preopened: true,
1604                name: name.to_string(),
1605                kind: RwLock::new(kind),
1606            })
1607        };
1608        self.fd_map.write().unwrap().insert(
1609            raw_fd,
1610            Fd {
1611                rights,
1612                rights_inheriting: Rights::empty(),
1613                flags: fd_flags,
1614                // since we're not calling open on this, we don't need open flags
1615                open_flags: 0,
1616                offset: 0,
1617                inode,
1618            },
1619        );
1620    }
1621
1622    pub fn get_stat_for_kind(&self, inodes: &WasiInodes, kind: &Kind) -> Result<Filestat, Errno> {
1623        let md = match kind {
1624            Kind::File { handle, path, .. } => match handle {
1625                Some(wf) => {
1626                    return Ok(Filestat {
1627                        st_filetype: Filetype::RegularFile,
1628                        st_size: wf.size(),
1629                        st_atim: wf.last_accessed(),
1630                        st_mtim: wf.last_modified(),
1631                        st_ctim: wf.created_time(),
1632
1633                        ..Filestat::default()
1634                    })
1635                }
1636                None => self
1637                    .fs_backing
1638                    .metadata(path)
1639                    .map_err(fs_error_into_wasi_err)?,
1640            },
1641            Kind::Dir { path, .. } => self
1642                .fs_backing
1643                .metadata(path)
1644                .map_err(fs_error_into_wasi_err)?,
1645            Kind::Symlink {
1646                base_po_dir,
1647                path_to_symlink,
1648                ..
1649            } => {
1650                let base_po_inode = &self.fd_map.read().unwrap()[base_po_dir].inode;
1651                let base_po_inode_v = &inodes.arena[*base_po_inode];
1652                let guard = base_po_inode_v.read();
1653                let deref = guard.deref();
1654                match deref {
1655                    Kind::Root { .. } => {
1656                        self.fs_backing.symlink_metadata(path_to_symlink).map_err(fs_error_into_wasi_err)?
1657                    }
1658                    Kind::Dir { path, .. } => {
1659                        let mut real_path = path.clone();
1660                        // PHASE 1: ignore all possible symlinks in `relative_path`
1661                        // TODO: walk the segments of `relative_path` via the entries of the Dir
1662                        //       use helper function to avoid duplicating this logic (walking this will require
1663                        //       &self to be &mut sel
1664                        // TODO: adjust size of symlink, too
1665                        //      for all paths adjusted think about this
1666                        real_path.push(path_to_symlink);
1667                        self.fs_backing.symlink_metadata(&real_path).map_err(fs_error_into_wasi_err)?
1668                    }
1669                    // if this triggers, there's a bug in the symlink code
1670                    _ => unreachable!("Symlink pointing to something that's not a directory as its base preopened directory"),
1671                }
1672            }
1673            _ => return Err(Errno::Io),
1674        };
1675        Ok(Filestat {
1676            st_filetype: virtual_file_type_to_wasi_file_type(md.file_type()),
1677            st_size: md.len(),
1678            st_atim: md.accessed(),
1679            st_mtim: md.modified(),
1680            st_ctim: md.created(),
1681            ..Filestat::default()
1682        })
1683    }
1684
1685    /// Closes an open FD, handling all details such as FD being preopen
1686    pub(crate) fn close_fd(&self, inodes: &WasiInodes, fd: WasiFd) -> Result<(), Errno> {
1687        let inode = self.get_fd_inode(fd)?;
1688        let inodeval = inodes.get_inodeval(inode)?;
1689        let is_preopened = inodeval.is_preopened;
1690
1691        let mut guard = inodeval.write();
1692        let deref_mut = guard.deref_mut();
1693        match deref_mut {
1694            Kind::File { ref mut handle, .. } => {
1695                let mut empty_handle = None;
1696                std::mem::swap(handle, &mut empty_handle);
1697            }
1698            Kind::Socket { ref mut socket, .. } => {
1699                let mut closed_socket = InodeSocket::new(InodeSocketKind::Closed);
1700                std::mem::swap(socket, &mut closed_socket);
1701            }
1702            Kind::Pipe { ref mut pipe } => {
1703                pipe.close();
1704            }
1705            Kind::Dir { parent, path, .. } => {
1706                debug!("Closing dir {:?}", &path);
1707                let key = path
1708                    .file_name()
1709                    .ok_or(Errno::Inval)?
1710                    .to_string_lossy()
1711                    .to_string();
1712                if let Some(p) = *parent {
1713                    drop(guard);
1714                    let mut guard = inodes.arena[p].write();
1715                    let deref_mut = guard.deref_mut();
1716                    match deref_mut {
1717                        Kind::Dir { entries, .. } | Kind::Root { entries } => {
1718                            self.fd_map.write().unwrap().remove(&fd).unwrap();
1719                            if is_preopened {
1720                                let mut idx = None;
1721                                {
1722                                    let preopen_fds = self.preopen_fds.read().unwrap();
1723                                    let preopen_fds_iter = preopen_fds.iter().enumerate();
1724                                    for (i, po_fd) in preopen_fds_iter {
1725                                        if *po_fd == fd {
1726                                            idx = Some(i);
1727                                            break;
1728                                        }
1729                                    }
1730                                }
1731                                if let Some(i) = idx {
1732                                    // only remove entry properly if this is the original preopen FD
1733                                    // calling `path_open` can give you an fd to the same inode as a preopen fd
1734                                    entries.remove(&key);
1735                                    self.preopen_fds.write().unwrap().remove(i);
1736                                    // Maybe recursively closes fds if original preopen?
1737                                }
1738                            }
1739                        }
1740                        _ => unreachable!(
1741                            "Fatal internal logic error, directory's parent is not a directory"
1742                        ),
1743                    }
1744                } else {
1745                    // this shouldn't be possible anymore due to Root
1746                    debug!("HIT UNREACHABLE CODE! Non-root directory does not have a parent");
1747                    return Err(Errno::Inval);
1748                }
1749            }
1750            Kind::EventNotifications { .. } => {}
1751            Kind::Root { .. } => return Err(Errno::Access),
1752            Kind::Symlink { .. } | Kind::Buffer { .. } => return Err(Errno::Inval),
1753        }
1754
1755        Ok(())
1756    }
1757}
1758
1759// Implementations of direct to FS calls so that we can easily change their implementation
1760impl WasiState {
1761    pub(crate) fn fs_read_dir<P: AsRef<Path>>(
1762        &self,
1763        path: P,
1764    ) -> Result<wasmer_vfs::ReadDir, Errno> {
1765        self.fs
1766            .fs_backing
1767            .read_dir(path.as_ref())
1768            .map_err(fs_error_into_wasi_err)
1769    }
1770
1771    pub(crate) fn fs_create_dir<P: AsRef<Path>>(&self, path: P) -> Result<(), Errno> {
1772        self.fs
1773            .fs_backing
1774            .create_dir(path.as_ref())
1775            .map_err(fs_error_into_wasi_err)
1776    }
1777
1778    pub(crate) fn fs_remove_dir<P: AsRef<Path>>(&self, path: P) -> Result<(), Errno> {
1779        self.fs
1780            .fs_backing
1781            .remove_dir(path.as_ref())
1782            .map_err(fs_error_into_wasi_err)
1783    }
1784
1785    pub(crate) fn fs_rename<P: AsRef<Path>, Q: AsRef<Path>>(
1786        &self,
1787        from: P,
1788        to: Q,
1789    ) -> Result<(), Errno> {
1790        self.fs
1791            .fs_backing
1792            .rename(from.as_ref(), to.as_ref())
1793            .map_err(fs_error_into_wasi_err)
1794    }
1795
1796    pub(crate) fn fs_remove_file<P: AsRef<Path>>(&self, path: P) -> Result<(), Errno> {
1797        self.fs
1798            .fs_backing
1799            .remove_file(path.as_ref())
1800            .map_err(fs_error_into_wasi_err)
1801    }
1802
1803    pub(crate) fn fs_new_open_options(&self) -> OpenOptions {
1804        self.fs.fs_backing.new_open_options()
1805    }
1806}
1807
1808/// Structures used for the threading and sub-processes
1809///
1810/// These internal implementation details are hidden away from the
1811/// consumer who should instead implement the vbus trait on the runtime
1812#[derive(Debug, Default)]
1813#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
1814pub(crate) struct WasiStateThreading {
1815    #[cfg_attr(feature = "enable-serde", serde(skip))]
1816    pub threads: HashMap<WasiThreadId, WasiThread>,
1817    pub thread_seed: u32,
1818    #[cfg_attr(feature = "enable-serde", serde(skip))]
1819    pub processes: HashMap<WasiBusProcessId, BusSpawnedProcess>,
1820    #[cfg_attr(feature = "enable-serde", serde(skip))]
1821    pub process_reuse: HashMap<Cow<'static, str>, WasiBusProcessId>,
1822    pub process_seed: u32,
1823}
1824
1825/// Top level data type containing all* the state with which WASI can
1826/// interact.
1827///
1828/// * The contents of files are not stored and may be modified by
1829/// other, concurrently running programs.  Data such as the contents
1830/// of directories are lazily loaded.
1831///
1832/// Usage:
1833///
1834/// ```no_run
1835/// # use wasmer_wasi::{WasiState, WasiStateCreationError};
1836/// # fn main() -> Result<(), WasiStateCreationError> {
1837/// WasiState::new("program_name")
1838///    .env(b"HOME", "/home/home".to_string())
1839///    .arg("--help")
1840///    .envs({
1841///        let mut hm = std::collections::HashMap::new();
1842///        hm.insert("COLOR_OUTPUT", "TRUE");
1843///        hm.insert("PATH", "/usr/bin");
1844///        hm
1845///    })
1846///    .args(&["--verbose", "list"])
1847///    .preopen(|p| p.directory("src").read(true).write(true).create(true))?
1848///    .preopen(|p| p.directory(".").alias("dot").read(true))?
1849///    .build()?;
1850/// # Ok(())
1851/// # }
1852/// ```
1853#[derive(Debug)]
1854#[cfg_attr(feature = "enable-serde", derive(Serialize, Deserialize))]
1855pub struct WasiState {
1856    pub fs: WasiFs,
1857    pub inodes: Arc<RwLock<WasiInodes>>,
1858    pub(crate) threading: Mutex<WasiStateThreading>,
1859    pub args: Vec<Vec<u8>>,
1860    pub envs: Vec<Vec<u8>>,
1861}
1862
1863impl WasiState {
1864    /// Create a [`WasiStateBuilder`] to construct a validated instance of
1865    /// [`WasiState`].
1866    #[allow(clippy::new_ret_no_self)]
1867    pub fn new(program_name: impl AsRef<str>) -> WasiStateBuilder {
1868        create_wasi_state(program_name.as_ref())
1869    }
1870
1871    /// Turn the WasiState into bytes
1872    #[cfg(feature = "enable-serde")]
1873    pub fn freeze(&self) -> Option<Vec<u8>> {
1874        bincode::serialize(self).ok()
1875    }
1876
1877    /// Get a WasiState from bytes
1878    #[cfg(feature = "enable-serde")]
1879    pub fn unfreeze(bytes: &[u8]) -> Option<Self> {
1880        bincode::deserialize(bytes).ok()
1881    }
1882
1883    /// Get the `VirtualFile` object at stdout
1884    pub fn stdout(&self) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1885        self.std_dev_get(__WASI_STDOUT_FILENO)
1886    }
1887
1888    #[deprecated(
1889        since = "3.0.0",
1890        note = "stdout_mut() is no longer needed - just use stdout() instead"
1891    )]
1892    pub fn stdout_mut(
1893        &self,
1894    ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1895        self.stdout()
1896    }
1897
1898    /// Get the `VirtualFile` object at stderr
1899    pub fn stderr(&self) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1900        self.std_dev_get(__WASI_STDERR_FILENO)
1901    }
1902
1903    #[deprecated(
1904        since = "3.0.0",
1905        note = "stderr_mut() is no longer needed - just use stderr() instead"
1906    )]
1907    pub fn stderr_mut(
1908        &self,
1909    ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1910        self.stderr()
1911    }
1912
1913    /// Get the `VirtualFile` object at stdin
1914    pub fn stdin(&self) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1915        self.std_dev_get(__WASI_STDIN_FILENO)
1916    }
1917
1918    #[deprecated(
1919        since = "3.0.0",
1920        note = "stdin_mut() is no longer needed - just use stdin() instead"
1921    )]
1922    pub fn stdin_mut(
1923        &self,
1924    ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1925        self.stdin()
1926    }
1927
1928    /// Internal helper function to get a standard device handle.
1929    /// Expects one of `__WASI_STDIN_FILENO`, `__WASI_STDOUT_FILENO`, `__WASI_STDERR_FILENO`.
1930    fn std_dev_get(
1931        &self,
1932        fd: WasiFd,
1933    ) -> Result<Option<Box<dyn VirtualFile + Send + Sync + 'static>>, FsError> {
1934        let ret = WasiStateFileGuard::new(self, fd)?.map(|a| {
1935            let ret = Box::new(a);
1936            let ret: Box<dyn VirtualFile + Send + Sync + 'static> = ret;
1937            ret
1938        });
1939        Ok(ret)
1940    }
1941}
1942
1943pub fn virtual_file_type_to_wasi_file_type(file_type: wasmer_vfs::FileType) -> Filetype {
1944    // TODO: handle other file types
1945    if file_type.is_dir() {
1946        Filetype::Directory
1947    } else if file_type.is_file() {
1948        Filetype::RegularFile
1949    } else if file_type.is_symlink() {
1950        Filetype::SymbolicLink
1951    } else {
1952        Filetype::Unknown
1953    }
1954}