Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
68 changes: 68 additions & 0 deletions proplet/Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 4 additions & 0 deletions proplet/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -42,6 +42,10 @@ futures-util = { version = "0.3" }
# ELASTIC TEE HAL — hardware abstraction layer for TEE workloads
elastic-tee-hal = { git = "https://github.com/elasticproject-eu/wasmhal", default-features = false, features = ["amd-sev"] }

[dev-dependencies]
wiremock = "0.6"
tokio = { version = "1.42", features = ["full"] }

[features]
default = []

Expand Down
135 changes: 135 additions & 0 deletions proplet/src/service.rs
Original file line number Diff line number Diff line change
@@ -1,11 +1,14 @@
use crate::config::PropletConfig;

const WASM_FETCH_MAX_BYTES: usize = 100 * 1024 * 1024;
use crate::metrics::MetricsCollector;
use crate::monitoring::{system::SystemMonitor, ProcessMonitor};
use crate::mqtt::{build_topic, MqttMessage, PubSub};
use crate::runtime::{Runtime, RuntimeContext, StartConfig};
use crate::types::*;
use anyhow::{Context, Result};
use reqwest::Client as HttpClient;

use std::collections::{BTreeMap, HashMap};
use std::sync::Arc;
use std::time::SystemTime;
Expand Down Expand Up @@ -482,6 +485,18 @@ impl PropletService {
if req.encrypted {
info!("Encrypted workload with image_url: {}", req.image_url);
Vec::new()
} else if req.image_url.starts_with("http://") || req.image_url.starts_with("https://")
{
match self.fetch_wasm_from_http(&req.image_url).await {
Ok(binary) => binary,
Err(e) => {
error!("Failed to fetch wasm for task {}: {}", req.id, e);
self.running_tasks.lock().await.remove(&req.id);
self.publish_result(&req.id, Vec::new(), Some(e.to_string()))
.await?;
return Err(e);
}
}
} else {
info!("Requesting binary from registry: {}", req.image_url);
self.request_binary_from_registry(&req.image_url).await?;
Expand Down Expand Up @@ -977,6 +992,10 @@ impl PropletService {
}
}

async fn fetch_wasm_from_http(&self, url: &str) -> Result<Vec<u8>> {
fetch_wasm_from_http(&self.http_client, url).await
}

async fn try_assemble_chunks(&self, app_name: &str) -> Result<Option<Vec<u8>>> {
let mut assembly = self.chunk_assembly.lock().await;

Expand Down Expand Up @@ -1212,3 +1231,119 @@ fn build_fl_update_envelope(
"metrics": {}
})
}

async fn fetch_wasm_from_http(client: &HttpClient, url: &str) -> Result<Vec<u8>> {
use futures_util::StreamExt;

let response = client
.get(url)
.send()
.await
.with_context(|| format!("Failed to connect to {}", url))?;

let status = response.status();
if status.is_client_error() || status.is_server_error() {
return Err(anyhow::anyhow!(
"HTTP {} fetching wasm from {}",
status,
url
));
}

if let Some(content_length) = response.content_length() {
if content_length as usize > WASM_FETCH_MAX_BYTES {
return Err(anyhow::anyhow!(
"wasm response from {} exceeds size limit ({} > {} bytes)",
url,
content_length,
WASM_FETCH_MAX_BYTES
));
}
}

let mut binary = Vec::new();
let mut stream = response.bytes_stream();
while let Some(chunk) = stream.next().await {
let chunk = chunk.with_context(|| format!("Failed to read response body from {}", url))?;
binary.extend_from_slice(&chunk);
if binary.len() > WASM_FETCH_MAX_BYTES {
return Err(anyhow::anyhow!(
"wasm response from {} exceeds size limit ({} bytes)",
url,
WASM_FETCH_MAX_BYTES
));
}
}

info!("Fetched wasm from {}, size: {} bytes", url, binary.len());
Ok(binary)
}

#[cfg(test)]
mod tests {
use super::*;
use wiremock::matchers::method;
use wiremock::{Mock, MockServer, ResponseTemplate};

fn make_client() -> HttpClient {
HttpClient::new()
}

#[tokio::test]
async fn test_fetch_wasm_200_ok() {
let server = MockServer::start().await;
let wasm_bytes = b"\x00asm\x01\x00\x00\x00";

Mock::given(method("GET"))
.respond_with(ResponseTemplate::new(200).set_body_bytes(wasm_bytes.to_vec()))
.mount(&server)
.await;

let result = fetch_wasm_from_http(&make_client(), &server.uri()).await;
assert!(result.is_ok());
assert_eq!(result.unwrap(), wasm_bytes);
}

#[tokio::test]
async fn test_fetch_wasm_404() {
let server = MockServer::start().await;

Mock::given(method("GET"))
.respond_with(ResponseTemplate::new(404))
.mount(&server)
.await;

let result = fetch_wasm_from_http(&make_client(), &server.uri()).await;
assert!(result.is_err());
assert!(result.unwrap_err().to_string().contains("404"));
}

#[tokio::test]
async fn test_fetch_wasm_500() {
let server = MockServer::start().await;

Mock::given(method("GET"))
.respond_with(ResponseTemplate::new(500))
.mount(&server)
.await;

let result = fetch_wasm_from_http(&make_client(), &server.uri()).await;
assert!(result.is_err());
assert!(result.unwrap_err().to_string().contains("500"));
}

#[tokio::test]
async fn test_fetch_wasm_streaming_exceeds_limit() {
let server = MockServer::start().await;
let over_limit_body = vec![0u8; WASM_FETCH_MAX_BYTES + 1];

Mock::given(method("GET"))
.respond_with(ResponseTemplate::new(200).set_body_bytes(over_limit_body))
.mount(&server)
.await;

let result = fetch_wasm_from_http(&make_client(), &server.uri()).await;
assert!(result.is_err());
assert!(result.unwrap_err().to_string().contains("size limit"));
}
}
71 changes: 71 additions & 0 deletions proplet/src/types.rs
Original file line number Diff line number Diff line change
Expand Up @@ -813,4 +813,75 @@ mod tests {
Some(&"/opt/intel/openvino".to_string())
);
}

#[test]
fn test_start_request_validate_success_with_http_image_url() {
let req = StartRequest {
id: "task-http".to_string(),
cli_args: vec![],
name: "http_func".to_string(),
state: 0,
file: String::new(),
image_url: "http://fileserver/app.wasm".to_string(),
inputs: vec![],
daemon: false,
env: None,
monitoring_profile: None,
encrypted: false,
kbs_resource_path: None,
mode: None,
proplet_id: None,
};

assert!(req.validate().is_ok());
}

#[test]
fn test_start_request_validate_success_with_https_image_url() {
let req = StartRequest {
id: "task-https".to_string(),
cli_args: vec![],
name: "https_func".to_string(),
state: 0,
file: String::new(),
image_url: "https://releases.example.com/app.wasm".to_string(),
inputs: vec![],
daemon: false,
env: None,
monitoring_profile: None,
encrypted: false,
kbs_resource_path: None,
mode: None,
proplet_id: None,
};

assert!(req.validate().is_ok());
}

#[test]
fn test_start_request_validate_no_source() {
let req = StartRequest {
id: "task-nosource".to_string(),
cli_args: vec![],
name: "func".to_string(),
state: 0,
file: String::new(),
image_url: String::new(),
inputs: vec![],
daemon: false,
env: None,
monitoring_profile: None,
encrypted: false,
kbs_resource_path: None,
mode: None,
proplet_id: None,
};

let result = req.validate();
assert!(result.is_err());
assert_eq!(
result.unwrap_err().to_string(),
"either file or image_url must be provided"
);
}
}