#crypto #hash

warg-crypto

A collection of cryptographic primitives for Warg registries

4 releases (breaking)

0.3.0 Feb 7, 2024
0.2.0 Oct 20, 2023
0.1.0 Sep 27, 2023
0.0.0 Jan 31, 2023

#98 in Cryptography

Download history 400/week @ 2023-10-26 283/week @ 2023-11-02 164/week @ 2023-11-09 152/week @ 2023-11-16 159/week @ 2023-11-23 123/week @ 2023-11-30 111/week @ 2023-12-07 121/week @ 2023-12-14 229/week @ 2023-12-21 106/week @ 2023-12-28 154/week @ 2024-01-04 217/week @ 2024-01-11 184/week @ 2024-01-18 393/week @ 2024-01-25 485/week @ 2024-02-01 267/week @ 2024-02-08

1,350 downloads per month
Used in 10 crates

Apache-2.0 WITH LLVM-exception

37KB
1K SLoC

WebAssembly Registry (Warg)

A Bytecode Alliance project

The reference implementation of the Warg protocol, client, and server for distributing WebAssembly components and interfaces as well as core modules.

build status Crates.io version Download docs.rs docs

Overview

This repository contains the reference implementation of the Warg protocol, a client, server, and CLI.

A Warg client and server can be used to distribute WebAssembly components to various component tooling.

See the introduction for the design decisions and scope.

Prerequisites

Installation

To install warg, first you'll want to install the latest stable Rust and then you'll execute to install the subcommand:

cargo install --git https://github.com/bytecodealliance/registry

The currently published crate on crates.io is a nonfunctional placeholder and these instructions will be updated to install the crates.io package once a proper release is made.

Getting Started

Running the server

Before running the server, set the WARG_OPERATOR_KEY environment variable:

export WARG_OPERATOR_KEY="ecdsa-p256:I+UlDo0HxyBBFeelhPPWmD+LnklOpqZDkrFP5VduASk="

WARG_OPERATOR_KEY is the private key of the server operator.

Currently this is sourced through an environment variable, but soon this will be sourced via command line arguments or integration with system key rings.

Use cargo to run the server:

mkdir content
cargo run -p warg-server -- --content-dir content

The content directory created here is where the server will store package contents.

Note: currently the server stores its state only in memory, so it will be lost when the server is restarted. A persistence layer will be added in the near future.

Setting up the client

Start by configuring the client to use the local server's URL:

warg config --registry http://127.0.0.1:8090

This creates a $CONFIG_DIR/warg/config.json configuration file; the configuration file will specify the default registry URL to use so that the --registry option does not need to be specified for every command.

Data downloaded by the client is stored in $CACHE_DIR/warg by default.

Next, create a new signing key to publish packages with:

warg key new 127.0.0.1:8090

The new signing key will be stored in your operating system's key store and used to sign package log entries when publishing to the registry.

Publishing a package

A new package can be initialized by running:

warg publish init example:hello

This creates a new package in the example namespace with the name hello.

A version of the package can be published by running:

warg publish release --name example:hello --version 0.1.0 hello.wasm

This publishes a package named example:hello with version 0.1.0 and content from hello.wasm.

Alternatively, the above can be batched into a single publish operation:

warg publish start example:hello
warg publish init example:hello
warg publish release --name example:hello --version 0.1.0 hello.wasm
warg publish submit

Here the records created from initializing the package and releasing version 0.1.0 are made as part of the same transaction.

Use warg publish abort to abort a pending publish operation.

Managing package permissions

Note: The package permissions system is a work in progress.

You can grant permissions to another public key with the warg publish grant subcommand:

warg publish grant --name example:hello ecdsa-p256:ABC...

You can get your own public key with the warg key info subcommand.

By default, both publish and yank permissions are granted. This can be modified with the --permission flag.

Similarly, permissions may be revoked via warg publish revoke. Note that keys are identified by ID (fingerprint) for revocation:

warg publish revoke --name example:hello sha256:abc...

Running a package

For demonstration purposes, the run command in warg will download and run a package using Wasmtime.

The package is expected to be a Wasm module implementing a WASI command.

A demo module that implements a simple "grep" tool is available in demo/simple-grep-1.0.0.wasm.

To publish the demo module:

warg publish start demo:simple-grep
warg publish init demo:simple-grep
warg publish release --name demo:simple-grep --version 1.0.0 demo/simple-grep-1.0.0.wasm
warg publish submit

To run the demo package:

echo 'hello world' | warg run demo:simple-grep hello

This should download and run the package, and print out the line hello world as it matches the pattern hello.

Resetting and clearing local data

To reset local data for the default registry:

warg reset

To reset local data for a specific registry, such as registry.example.com:

warg reset --registry registry.example.com

To reset local data for all registries:

warg reset --all

To clear local content for all registries:

warg clear

Contributing

This is a Bytecode Alliance project, and follows the Bytecode Alliance's Code of Conduct and Organizational Code of Conduct.

Getting the Code

You'll clone the code via git:

git clone https://github.com/bytecodealliance/registry

Testing Changes

Ideally, there should be tests written for all changes. Test can be run via:

cargo test --all

Testing with Containers

See the local infra documentation on how to develop and test with locally running containers.

Submitting Changes

Changes to this repository are managed through pull requests (PRs). Everyone is welcome to submit a pull request! We'll try to get to reviewing it or responding to it in at most a few days.

Code Formatting

Code is required to be formatted with the current Rust stable's cargo fmt command. This is checked on CI.

Continuous Integration

The CI for the repository is relatively significant. It tests changes on Windows, macOS, and Linux.

Dependencies

~3.5MB
~79K SLoC