-
Notifications
You must be signed in to change notification settings - Fork 29.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Request: mark WASI as stable #46254
Comments
For me the question is, what potential breaking changes might we want to make to this API after making it stable? Only the support of the next WASI version? So if we make the desired WASI version a required part of the constructor, would that cover us? As for the maintenance aspect, that’s a general question we should probably address separately: is it better to have an API in core that’s essentially unmaintained, versus not having it there at all. I don’t know, but I don’t think it’s specific to this. We have plenty of unmaintained APIs in core already, both experimental and stable. |
I don't think we've shipped any breaking changes thus far - everything has been semver minor or bug fixes IIRC. I think the biggest unknown there is how WASI itself evolves. For example, they recently added a new API to an existing snapshot version without any type of version change. They could theoretically remove an API too. |
I have the same issue with JSON modules / import assertions. We unflagged that feature a long time ago (years?) and I want to mark it stable, but the TC39 proposal is sitting at Stage 3. Since the proposal/syntax itself could theoretically still change, I feel like I can’t mark our implementation of it as stable until then. On the other hand, it’s not that once something becomes stable it can never get breaking changes; they just have to come as part of a semver-major, which happens annually. So maybe we shouldn’t be scared off by perpetually experimental specs and just go ahead and mark our features as stable, and if the spec changes then we’ll ship those changes in the next major. In the WASI case if the constructor can be used as a way to essentially request a particular spec version, that sounds like a great solution that I wish I had for import assertions, and WASI going stable seems especially low risk. |
I'm +1 for marking it stable. I'm also ok in unflagging it and keep it experimental with or without a warning. |
Okay, so some proposed next steps:
I think that’s it? |
+1 from me on that as well |
Having uvwasi be actively maintained is something @ospencer and I are really interested in, both for nodejs and WAMR support (they currently have it marked as experimental too). Please let us know how we can help. |
Refs: nodejs#46254 - add version to options when creating WASI object - add convenience function to return importObject Signed-off-by: Michael Dawson <mdawson@devrus.com>
Link for doodle to discuss contributing to uvwasi - https://doodle.com/meeting/participate/id/e36JQMOd If there are others interested in contributing to uvwasi as well please feel to join as well. |
@mhdawson sorry to be an inconvenience, but I'll be traveling next week. Could we aim for the week after? |
@cjihrig ack doodle updated to be for times the week after - https://doodle.com/meeting/participate/id/e36JQMOd @ospencer, @phated if you already voted please look and vote again. |
All set; thanks for organizing @mhdawson! |
Ditto! |
Refs: #46254 - add version to options when creating WASI object - add convenience function to return importObject Signed-off-by: Michael Dawson <mdawson@devrus.com> PR-URL: #46469 Reviewed-By: Guy Bedford <guybedford@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
I have a question about Node.js WASI API when I use it in |
@tniessen in terms of
I don't think wasi.start() is blocking in the sense of it waiting until the WebAssembly execution is complete. @cjihrig do I have that wrong? |
I think @tniessen is correct. Right now, It probably makes sense to make |
Refs: #46254 - add version to options when creating WASI object - add convenience function to return importObject Signed-off-by: Michael Dawson <mdawson@devrus.com> PR-URL: #46469 Reviewed-By: Guy Bedford <guybedford@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
I've heard that there is a suggestion that we cut off all changes on April 1 so we may need to make a decision in the next week or so. @cjihrig |
After the last few Node WASI team meetings we've had, my personal opinion is that we should not mark things as stable at this time. I'm not going to block it if other people feel differently though. I also have limited availability this week, so if something needs to happen quickly, you don't need to wait to hear back from me. |
As an intermediate step, could we drop the flag and emit a warning on use instead? |
During the last uvwasi meeting, I suggested as an intermediate goal to mark |
This seems like a good opportunity to start labeling things using the more detailed experimental stages outlined in #46100. That PR hasn't been released yet (it's just in |
IIRC it was decided that these hypothetical experimental stages should not correspond to flags/warnings, so I am not sure how that helps. What I meant is that only some features could be marked as experimental, not the entire module. See the Web Crypto: Algorithm matrix, for example. |
This seems like an resonable next step. If people agree that is a good idea I'd be willing to put together a PR. |
PR to remove need for command line flag - #47286. WASI is still documented as experimental. |
It looks like the linked PR was merged, and I can't see |
No, WASI remains experimental until the API is finalized. |
There has been no activity on this feature request for 5 months and it is unlikely to be implemented. It will be closed 6 months after the last non-automated comment. For more information on how the project manages feature requests, please consult the feature request management document. |
It's worth noting that Deno has deprecated their WASI implementation "due to low usage and minimal feedback from the community." |
We added WASI support to WebContainers (same code as Node.js) now and it's really essential for running native code and already powers our experimental Python support. Wanted to add an extra data point. I think WASI is going to get some traction as it stablized and it hits 1.0. WASI is already used quite a bunch on the Edge, e.g. Cloudflare has announced WASI support for Cloudflare Workers so I'd personally not like to see WASI being deprecated for Node.js. |
I'm not sure what you mean by "same code as Node.js" but you could implement WASI as a compiled addon or try something like jco. There is a pretty big difference between what WASI was in snapshot 1 and its direction now, and I don't believe it makes sense to have it in core anymore (I'm not sure of any JS runtime working on anything beyond snapshot 1). We also have the problem of maintaining WASI in core. There is such little interest in maintaining it that the project recently marked its WASI implementation as insecure rather than fix a small to medium sized bug. |
To try to fill in some of the blanks here on stability:
I'm actively working on the preview2 support in userland via the jco project for Node.js currently, and hope to use this implementation experience to feed back some suggestions for preview2 support in core. Having support in core will allow optimization opportunities not otherwise possible in userland, so I think that would be very worthwhile and I'm actively interested in working on these directions myself. If anyone else is interested in working on WASI from the security properties to preview2 support designs, the @nodejs/wasi team is active and has meetings every two weeks, with the next on 22 November. Agendas for the meetings are posted in https://github.com/nodejs/uvwasi/issues a few days before. |
@guybedford I would be interested in working on WASI because we have interest in this at StackBlitz and I think it'd be really nice if we could keep WASI in the core of Node.js. It just allows for a handful of optimizations, as Guy pointed out, that wouldn't be possible otherwise. Furthermore, I see it as another battery included in Node.js and from a DX perspective it's much nicer if you didn't have to rely on a separate project. |
I'm genuinely curious what the optimizations are.
Technically, no changes to libuv are required. The I also have a few questions:
|
Certainly
There's high-level and low-level bindgen, and we are doing high-level bindgen currently in the name of correctness and because it should always be supported to directly call to WASI from JS (since that is what high-level bindgen is). Anything upstreamed into Node.js would be based on performance-optimized low-level bindgen that uses the direct core component model ABIs. We might need something like a That would then be somewhat analogous to WebAssembly function imports, where the JS function wrapper is a high-level JS function that is passed from JS into Wasm instantiation, but when passing that import to a Wasm core module, it instead reads out and attaches to the direct low-level function not the high-level JS function wrapper. |
What is the problem this feature will solve?
WASI support has been in Node for a few years now, but still requires a CLI flag to use. Node's WASM/WASI story appears to be pretty competitive, but people call out the fact that it requires a flag to use (https://00f.net/2023/01/04/webassembly-benchmark-2023/). From what I understand, some other projects such as Kotlin are currently using Node's WASI implementation, and Grain is planning to as well.
What is the feature you are proposing to solve the problem?
A few people (@mcollina, @guybedford) have suggested that we should unflag it at this point. I support this, but there are a few things that we would need to address:
WASI
constructor, instead of specifying it from the command line (new WASI({ version: 'preview1' })
). The uvwasi changes would be more in depth, which brings me to the next point.What alternatives have you considered?
Leaving things as they are.
The text was updated successfully, but these errors were encountered: