You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
yowl fb4f4cd300
Add initial support for DWARF Fission (#8055)
7 months ago
.github Add initial support for DWARF Fission (#8055) 7 months ago
benches Remove type information from dynamic component funcs (#8070) 8 months ago
ci Update nightly used in CI and fix warnings (#8416) 7 months ago
cranelift cranelift/riscv64: Idiomatic AMode operand collection (#8454) 7 months ago
crates Add initial support for DWARF Fission (#8055) 7 months ago
docs Use `--locked` on all `cargo install` in CI, also remove non-locked example (#8369) 7 months ago
examples Fix use-after-free in externref example (#8410) 7 months ago
fuzz Add a fuzzer for async wasm (#8440) 7 months ago
scripts Remove the wasmtime-cranelift-shared crate (#8222) 8 months ago
src wasmtime-wasi-http collection of small refactors (#8332) 7 months ago
supply-chain Update some dependencies with security advisories (#8417) 7 months ago
tests Add initial support for DWARF Fission (#8055) 7 months ago
winch/codegen x64: Swap operand order of `cmp` in internal representation (#8408) 7 months ago
.gitattributes `generated-code.rs` is not itself generated code (#5571) 2 years ago
.gitignore Async support in the C API (#7106) 1 year ago
.gitmodules Remove wasm-c-api submodule (#8170) 8 months ago
ADOPTERS.md Update ADOPTERS.md (#7887) 9 months ago
CODEOWNERS Use GitHub teams as code owners (#6114) 2 years ago
CODE_OF_CONDUCT.md Rename the `master` branch to `main` (#1924) 4 years ago
CONTRIBUTING.md Merge the CONTRIBUTING.md files 5 years ago
Cargo.lock Add a fuzzer for async wasm (#8440) 7 months ago
Cargo.toml deps: Update the wasm-tools family of crates to 1.205.0 (#8412) 7 months ago
LICENSE Adjust whitespace to match the upstream exception text. 6 years ago
ORG_CODE_OF_CONDUCT.md Make it a Bytecode Alliance project (#549) 5 years ago
README.md docs: add Perl's Wasm package to PL list (#6880) 1 year ago
RELEASES.md Update release date of Wasmtime 20.0.0 (#8419) 7 months ago
SECURITY.md Add link to what-is-a-security-bug to SECURITY.md (#8290) 7 months ago
build.rs Enable all function references spec tests (#8348) 7 months ago
deny.toml Update itertools to 0.12 in cranelift_wasm (#7875) 9 months ago

README.md

wasmtime

A standalone runtime for WebAssembly

A Bytecode Alliance project

build status zulip chat supported rustc stable Documentation Status

Guide | Contributing | Website | Chat

Installation

The Wasmtime CLI can be installed on Linux and macOS (locally) with a small install script:

curl https://wasmtime.dev/install.sh -sSf | bash

Windows or otherwise interested users can download installers and binaries directly from the GitHub Releases page.

Example

If you've got the Rust compiler installed then you can take some Rust source code:

fn main() {
    println!("Hello, world!");
}

and compile/run it with:

$ rustup target add wasm32-wasi
$ rustc hello.rs --target wasm32-wasi
$ wasmtime hello.wasm
Hello, world!

(Note: make sure you installed Rust using the rustup method in the official instructions above, and do not have a copy of the Rust toolchain installed on your system in some other way as well (e.g. the system package manager). Otherwise, the rustup target add... command may not install the target for the correct copy of Rust.)

Features

  • Fast. Wasmtime is built on the optimizing Cranelift code generator to quickly generate high-quality machine code either at runtime or ahead-of-time. Wasmtime is optimized for efficient instantiation, low-overhead calls between the embedder and wasm, and scalability of concurrent instances.

  • Secure. Wasmtime's development is strongly focused on correctness and security. Building on top of Rust's runtime safety guarantees, each Wasmtime feature goes through careful review and consideration via an RFC process. Once features are designed and implemented, they undergo 24/7 fuzzing donated by Google's OSS Fuzz. As features stabilize they become part of a release, and when things go wrong we have a well-defined security policy in place to quickly mitigate and patch any issues. We follow best practices for defense-in-depth and integrate protections and mitigations for issues like Spectre. Finally, we're working to push the state-of-the-art by collaborating with academic researchers to formally verify critical parts of Wasmtime and Cranelift.

  • Configurable. Wasmtime uses sensible defaults, but can also be configured to provide more fine-grained control over things like CPU and memory consumption. Whether you want to run Wasmtime in a tiny environment or on massive servers with many concurrent instances, we've got you covered.

  • WASI. Wasmtime supports a rich set of APIs for interacting with the host environment through the WASI standard.

  • Standards Compliant. Wasmtime passes the official WebAssembly test suite, implements the official C API of wasm, and implements future proposals to WebAssembly as well. Wasmtime developers are intimately engaged with the WebAssembly standards process all along the way too.

Language Support

You can use Wasmtime from a variety of different languages through embeddings of the implementation.

Languages supported by the Bytecode Alliance:

Languages supported by the community:

Documentation

📚 Read the Wasmtime guide here! 📚

The wasmtime guide is the best starting point to learn about what Wasmtime can do for you or help answer your questions about Wasmtime. If you're curious in contributing to Wasmtime, it can also help you do that!


It's Wasmtime.