ChanServ changed the topic of #sandstorm to: Welcome to #sandstorm: home of all things Sandstorm and Cap'n Proto. Say hi! | Have a question but no one is here? Try asking in the discussion group: https://groups.google.com/group/sandstorm-dev | Channel logs available at https://libera.irclog.whitequark.org/sandstorm
falsifian has joined #sandstorm
<humanetech> Anyone here in-the-loop on the fascinating developments around "WASM on the server"? One thing I find highly confusing is that e.g. WASI (WebAssembly System Interface) has "capabilities-based security", not really well explained. And then when I look at the Linux Foundation (actor-based) [wasmCloud](https://wasmcloud.com/) project, it describes the Capability Model as:
<humanetech> > A capability is an abstraction or representation of a non-functional requirement.
<Ryuno-KiAndrJaen> Keyoxide is exploring it
TMM_ has quit [Quit: https://quassel-irc.org - Chat comfortably. Anywhere.]
TMM_ has joined #sandstorm
xet7 has quit [Remote host closed the connection]
xet7 has joined #sandstorm
tian2992 has quit [Ping timeout: 256 seconds]
<fr33domlover> humanetech: Capability-based security and wasmCloud's "capabilities" are possibly not the exact same thing but Idk: https://cosmonic.com/docs/category/capabilities
<humanetech> Yes, I found that Cosmonic thing too. It is quite new. And I think that one (or all?) of wasmCloud's maintainers is from Cosmonic (who have this [Concordance](https://cosmonic.com/docs/category/concordance) event sourcing app, which interests me). WASI write [this](https://github.com/WebAssembly/WASI#capability-based-security) on capability-based security.
<humanetech> I've got to investigate more, but it might be that this higher level representation translate to how the end-user developer experience it. Wasm modules are sandboxed, principle of least authority, have access to nothing by default. You see mentions of "trustless computing" and references of other common security models to which it is (claimed to be) superior.
<humanetech> But on the whole spectrum of this technical development, I find it way more intriguing than when it originally caught my eye. With Docker supporting it in beta ("if we had WASM in 2008 we wouldn't need Docker"), and things like "the last plugin framework you'll ever need" and "write once, run anywhere.. promise of the JVM finally delivered". Now, I of course realize that we are seeing a hype cycle, but there's big names all over the place
<humanetech> WASM.
<humanetech> Btw, VMWare have collaborated with SQLite team to bring [WASI support](https://news.ycombinator.com/item?id=36054521) to the DB.
<humanetech> Yes, looks to be different. Here's [SpiderLightning](https://github.com/deislabs/spiderlightning/blob/main/docs/primer.md), a project that collects WIT definitions (the IDL used to specify WASM component interfaces, in a concept called 'Worlds').
<humanetech> From [WebAssembly for the Server Side: A New Way to NGINX](https://thenewstack.io/webassembly-for-the-server-side-a-new-way-to-nginx/):
<humanetech> > Perhaps most importantly, role-based access control and attribute-based access control, and other authorization and access control technologies, can introduce complex external systems that must be synchronized with the plugin as well as the underlying server-side technology. In contrast, Wasm access control capabilities are often built directly into the runtime engines, reducing the complexities and simplifying the development process.
<humanetech> Ow, got an answer by Kenton: https://news.ycombinator.com/item?id=36056311
<humanetech> And [Spritely going WASM](https://spritely.institute/news/guile-on-web-assembly-project-underway.html) too, starting with Guile..
<humanetech> > Once Guile -> WASM is complete, the next project will be to move Goblins (our distributed programming core) into that environment so we can build out the other core features and UI required to support our "Agency" software: a framework for rich and secure decentralized applications.
xet7 has quit [Ping timeout: 264 seconds]
xet7 has joined #sandstorm
<isd> historically, WASI is heavily based on https://github.com/NuxiNL/cloudabi
<isd> ...which is basically a 'taming' of the posix API -- no global open(), instead you need to use openat(), that kind of thing.
<humanetech> Ah, I see, yes. In WASI and Component Model which it is based on, things are still in a kind of 'tech preview' status. There's quite a lot of proposals of stuff to add to WASI, in various stages of elaboration. But, besides the reference implementations (runtimes, tooling), there's early adopters working working on products that give an idea of what's to come. A lot is around dev experience, and productivity to create solutions. I like the
<humanetech> couple times today, that our current infra is looking like Rube Goldberg machines, that with their countless dependencies and complexity are like utterly crazy.
<humanetech> s/working//
<humanetech> With "our" I mean the cloud vendor solutions that go for high scalability and all the jazz.
<humanetech> The general IT landscape now is so much more complex than it was some time ago.
TMM_ has quit [Quit: https://quassel-irc.org - Chat comfortably. Anywhere.]
TMM_ has joined #sandstorm