Compare commits
378 Commits
Author | SHA1 | Date |
---|---|---|
|
341b572157 | |
|
ad17b051e2 | |
|
612342a7d5 | |
|
77a9076701 | |
|
956b590d1d | |
|
aa62de7da3 | |
|
e6b7eb6266 | |
|
14146be3fb | |
|
d5ad21b1d1 | |
|
d2a8f5def5 | |
|
3d66199c20 | |
|
f366f93c16 | |
|
2722e67473 | |
|
390d219a4a | |
|
1c79541976 | |
|
297b55b22c | |
|
016635f87f | |
|
7277fc9e82 | |
|
9eda7d869c | |
|
725dcf27d0 | |
|
7f3df16352 | |
|
326387b458 | |
|
219a3e5b6e | |
|
238d1fdd81 | |
|
6e5086a9b0 | |
|
97d109a367 | |
|
07fef60f94 | |
|
b59107a0f5 | |
|
743165d933 | |
|
6997939d9c | |
|
1eacd333d9 | |
|
9b7ed7025e | |
|
fdd95dd973 | |
|
1df92e24af | |
|
5d8fdca821 | |
|
0b1df9a424 | |
|
087c634831 | |
|
5f8abcc5dc | |
|
092d9779e3 | |
|
2e08155cb0 | |
|
ba721c3547 | |
|
5945f3a64c | |
|
a1c5330926 | |
|
1279afd390 | |
|
7c00da080a | |
|
a3925d612b | |
|
5c896b1c75 | |
|
126a99b76b | |
|
fea50f4997 | |
|
3633363a59 | |
|
cf1eed3e6d | |
|
9ee5859bb6 | |
|
2da5fab2b6 | |
|
ba7f79b19f | |
|
5641bd60ee | |
|
9a5047b94b | |
|
9e6dca81b4 | |
|
508fb749db | |
|
a170df233e | |
|
4c7df39332 | |
|
5be1cafdbe | |
|
45c4f60cfc | |
|
b82fe94867 | |
|
f0777208d8 | |
|
00c7e79f2f | |
|
ad1f711146 | |
|
95714547c7 | |
|
b74bee6de5 | |
|
038bac2744 | |
|
634870ffe7 | |
|
487563ec35 | |
|
11e44ed58a | |
|
f07543ce3e | |
|
0bc919d1af | |
|
8e3e286051 | |
|
a7da4a43cc | |
|
8276af82a8 | |
|
8ea62ad5b7 | |
|
a6610e6bb2 | |
|
712dd3a5da | |
|
80466fd774 | |
|
9763327cb0 | |
|
c12a122672 | |
|
0f094fc0ba | |
|
cd9e5b30b6 | |
|
4f6ee10e09 | |
|
4ac18aa4fb | |
|
e6b6a2e44a | |
|
e828609e05 | |
|
ef81d6a9bf | |
|
318bf04cd5 | |
|
28d558197f | |
|
0753b39d89 | |
|
69ddbd97ae | |
|
bdd6cebd6b | |
|
31c7e6ab08 | |
|
dd7a2f19c7 | |
|
eb850f44d3 | |
|
659d750308 | |
|
509cda9565 | |
|
199130da0d | |
|
a5352dea4e | |
|
b0f3b394df | |
|
cbad2a0e39 | |
|
859270eaab | |
|
522466a960 | |
|
e5cf52a971 | |
|
eacaee856d | |
|
c08c3cda07 | |
|
be7a75ffad | |
|
905e423f9c | |
|
98be2018b9 | |
|
39040064e4 | |
|
54beb96d13 | |
|
0a763761ed | |
|
6a3b6235ce | |
|
9a07a66c98 | |
|
4e3bd32bf5 | |
|
be593e07bf | |
|
8da011bb36 | |
|
7d4894d5d6 | |
|
68188bfe9f | |
|
d54b1f307c | |
|
e2a4d60d8e | |
|
ba598bcf53 | |
|
c697ed7d12 | |
|
ca7496bbd9 | |
|
9f2d7e65a1 | |
|
fb738a4f5f | |
|
db09261782 | |
|
53a49eae72 | |
|
2c7d6f04aa | |
|
78bb75af8b | |
|
4500840b5b | |
|
67451e4a93 | |
|
5075ff1df3 | |
|
1babd00be8 | |
|
344fd254cc | |
|
44b8b59f6a | |
|
0ce54a2a2c | |
|
56573f4059 | |
|
c40e6cec5c | |
|
6f318ca1fe | |
|
9e804b8b0a | |
|
fb7fb6445a | |
|
a0ecbe7c9e | |
|
8599637bfe | |
|
9e7e4acfe1 | |
|
ed32894a64 | |
|
deca8f94cf | |
|
5a0bda9060 | |
|
9f0ca29397 | |
|
ac56bc225a | |
|
c4f5da6456 | |
|
802c27462d | |
|
c00878ece6 | |
|
4f6419543d | |
|
021baffb99 | |
|
f19f1327f0 | |
|
2e36f4aae9 | |
|
8ffafe0ba5 | |
|
07523f1a2e | |
|
835307efe0 | |
|
20cd9553e3 | |
|
1fe1e7b129 | |
|
2602b28259 | |
|
f8b4e5b089 | |
|
c8c6bff9f4 | |
|
6ea3db1a9d | |
|
0fadc3be66 | |
|
56be153a91 | |
|
e187b3a3ba | |
|
2debab8a8e | |
|
246e90f871 | |
|
80be7cda80 | |
|
4e42618a1f | |
|
4d13594d2f | |
|
d8a6ed733b | |
|
2ebbadb676 | |
|
3c1af57d70 | |
|
7afc02d944 | |
|
8ee04d7a3a | |
|
2380025b7d | |
|
6e5617817d | |
|
648bafb35d | |
|
be77d3a397 | |
|
829757e9fa | |
|
584e423d51 | |
|
454eff8fcc | |
|
a3ede2fbeb | |
|
fb1e65f298 | |
|
9fc7aa4e74 | |
|
aef0925d54 | |
|
c092be2930 | |
|
6c81c50341 | |
|
36f6d1f3e3 | |
|
dd28403650 | |
|
be6a21b308 | |
|
5a40723a96 | |
|
34c55a848e | |
|
ee18ba2fda | |
|
197a3a9a3f | |
|
f5ce9266d6 | |
|
da978b4be5 | |
|
dd4c83e445 | |
|
f49ddfba38 | |
|
ac3a37dcb0 | |
|
b91a018e44 | |
|
8795345094 | |
|
53fb00701f | |
|
d86016cdee | |
|
52a89a02ce | |
|
d6415dec5a | |
|
a3b171a372 | |
|
98581a3f6c | |
|
bedfa64889 | |
|
34b74c0912 | |
|
0f3cc06cf1 | |
|
e32462b41d | |
|
a81145809f | |
|
2f205c178a | |
|
1e3bcc291b | |
|
479fd7a4be | |
|
1a8ee642ca | |
|
21a1430c26 | |
|
f93c7d31fc | |
|
4bbc30867f | |
|
42adbd5957 | |
|
85b54fab12 | |
|
d0fd236d6d | |
|
9bfac966f1 | |
|
43caf7a75b | |
|
6b8acdb1a5 | |
|
19f869623f | |
|
fa0af9d712 | |
|
9ccb920ffd | |
|
b8f8a98115 | |
|
4e741b78b6 | |
|
88642c94bb | |
|
aa68c25420 | |
|
adddc98c81 | |
|
a97d2d5df2 | |
|
02d5f454e9 | |
|
53a2e73fcd | |
|
1f41309db1 | |
|
f569d12260 | |
|
697e08e727 | |
|
eea9992a96 | |
|
47b7457336 | |
|
6310fb8a22 | |
|
77e0e281e8 | |
|
1a201c39b9 | |
|
21531e487a | |
|
43c14bf754 | |
|
6c65c74639 | |
|
ca12c178db | |
|
1ce7fdec0c | |
|
c64545e0b6 | |
|
286dc4f229 | |
|
78aaa91806 | |
|
c3e62a7165 | |
|
d2f5517428 | |
|
48c8b612aa | |
|
398f94c1a3 | |
|
7cd04182b2 | |
|
d52c9dfe31 | |
|
7a3c112a46 | |
|
0d140244a8 | |
|
956c3cb725 | |
|
3d9cece2dd | |
|
cddb0c2636 | |
|
193c461390 | |
|
905534820d | |
|
f2ac708701 | |
|
8ba2b53b07 | |
|
9a27596a4a | |
|
fe641ef5b8 | |
|
d26bffae37 | |
|
ebace038e4 | |
|
15adf1c68e | |
|
41db492c51 | |
|
7556415690 | |
|
4414d093cc | |
|
1e71cb1d11 | |
|
4a1ec72a75 | |
|
457ab5ca3d | |
|
bef04bf0e9 | |
|
85ca00d3f9 | |
|
2b6a3434b7 | |
|
79dcde5c32 | |
|
cba16dd59f | |
|
a5394ccdbe | |
|
bb082b4af8 | |
|
c7346ac26c | |
|
521310c233 | |
|
c5f58ad5bf | |
|
c45d07d2e0 | |
|
de995604d0 | |
|
1b42a0765e | |
|
30db09e8a0 | |
|
d40aa5dac6 | |
|
43d7726ea1 | |
|
174c36e069 | |
|
93f655e525 | |
|
88e4c4402a | |
|
770968a160 | |
|
427e4435bb | |
|
d579a8233b | |
|
2a86eb35f9 | |
|
7091cf1ff8 | |
|
9c9e69cec6 | |
|
6d897ad8a5 | |
|
6afb6ac66c | |
|
719f988c7f | |
|
6886def135 | |
|
63762cb938 | |
|
f5094ea95b | |
|
4a2e94cddf | |
|
04fb3e2908 | |
|
1cba044845 | |
|
6a468227e5 | |
|
41fdb16ce3 | |
|
8dba692be2 | |
|
cb332de66c | |
|
1e405e3d01 | |
|
fa15f19f2a | |
|
84cb10b262 | |
|
1923582e0c | |
|
1c42ff501e | |
|
7431c76a45 | |
|
411bbed1cb | |
|
6a3ff7c66d | |
|
80e0630a30 | |
|
f1d7e7fdfa | |
|
71a6a40a67 | |
|
dca98b5db4 | |
|
c4c7b70fd3 | |
|
f3c26fe159 | |
|
a346ace2f9 | |
|
e6776de054 | |
|
cb3de52f77 | |
|
7d8608ee3a | |
|
e20a49eb45 | |
|
23e72d78c7 | |
|
5b0c6c243c | |
|
9efd8bba12 | |
|
2e966a00fb | |
|
ec5085b736 | |
|
e060ab31d7 | |
|
e704570c7c | |
|
32defc46af | |
|
609741842e | |
|
5dbc471177 | |
|
30b8bbdecb | |
|
a55786e446 | |
|
2b496a940d | |
|
802ae4bfa6 | |
|
1ba78b0707 | |
|
2994bc6d20 | |
|
2c7166c2d6 | |
|
ebafe909be | |
|
a93079b395 | |
|
9730588e22 | |
|
b4838f2a3c | |
|
38ee2426fb | |
|
58e01fa7c8 | |
|
be8c615a49 | |
|
6288416cdd | |
|
c6ae7fc99a | |
|
a3f6227f02 | |
|
43a66c1059 | |
|
1b4a7d1bd7 | |
|
ea850c8306 | |
|
cef56b40de | |
|
16940012b1 | |
|
23f970ff21 | |
|
e3de855408 | |
|
882d57711d |
|
@ -1,150 +0,0 @@
|
||||||
version: 2.1
|
|
||||||
jobs:
|
|
||||||
"build-test":
|
|
||||||
docker:
|
|
||||||
- image: alpine:3.16
|
|
||||||
steps:
|
|
||||||
- checkout
|
|
||||||
- setup_remote_docker:
|
|
||||||
version: 20.10.12
|
|
||||||
- run:
|
|
||||||
name: Install deps
|
|
||||||
command: apk add gcc musl-dev make bash git go
|
|
||||||
- run:
|
|
||||||
name: Build
|
|
||||||
command: make build
|
|
||||||
- run:
|
|
||||||
name: Test
|
|
||||||
command: make test
|
|
||||||
- run:
|
|
||||||
name: Integration tests # test cross build too!
|
|
||||||
command: make -e TARGET_TEST_ARCH=* integration_test
|
|
||||||
- run:
|
|
||||||
name: Prepare Artifacts
|
|
||||||
command: |
|
|
||||||
mkdir -p /tmp/build-amd64
|
|
||||||
cp _output/bin/driverkit /tmp/build-amd64/
|
|
||||||
- store_artifacts:
|
|
||||||
path: /tmp/build-amd64/driverkit
|
|
||||||
destination: driverkit_amd64
|
|
||||||
- persist_to_workspace:
|
|
||||||
root: /tmp
|
|
||||||
paths:
|
|
||||||
- build-amd64/
|
|
||||||
"build-test-arm64":
|
|
||||||
machine:
|
|
||||||
enabled: true
|
|
||||||
image: ubuntu-2004:2022.04.1
|
|
||||||
resource_class: arm.medium
|
|
||||||
steps:
|
|
||||||
- checkout:
|
|
||||||
path: /tmp/source
|
|
||||||
- run:
|
|
||||||
name: Prepare project
|
|
||||||
command: |
|
|
||||||
docker run --rm -it -v /tmp/source:/source -v /var/run/docker.sock:/var/run/docker.sock -w /source --name alpine_sh -d alpine:3.16 sh
|
|
||||||
docker exec alpine_sh apk add gcc musl-dev make bash git go docker
|
|
||||||
docker exec alpine_sh git config --global --add safe.directory /source
|
|
||||||
- run:
|
|
||||||
name: Build
|
|
||||||
command: docker exec alpine_sh make build
|
|
||||||
- run:
|
|
||||||
name: Test
|
|
||||||
command: docker exec alpine_sh make test
|
|
||||||
- run:
|
|
||||||
name: Integration tests
|
|
||||||
command: docker exec alpine_sh make integration_test
|
|
||||||
- run:
|
|
||||||
name: Prepare Artifacts
|
|
||||||
command: |
|
|
||||||
mkdir -p /tmp/build-arm64
|
|
||||||
cp /tmp/source/_output/bin/driverkit /tmp/build-arm64/
|
|
||||||
- store_artifacts:
|
|
||||||
path: /tmp/build-arm64/driverkit
|
|
||||||
destination: driverkit_arm64
|
|
||||||
- persist_to_workspace:
|
|
||||||
root: /tmp
|
|
||||||
paths:
|
|
||||||
- build-arm64/
|
|
||||||
"images":
|
|
||||||
docker:
|
|
||||||
- image: cimg/base:stable
|
|
||||||
user: root
|
|
||||||
steps:
|
|
||||||
- attach_workspace:
|
|
||||||
at: /
|
|
||||||
- checkout
|
|
||||||
- setup_remote_docker:
|
|
||||||
version: 20.10.12
|
|
||||||
- run:
|
|
||||||
name: Prepare env
|
|
||||||
command: |
|
|
||||||
docker run --rm --privileged multiarch/qemu-user-static --reset -p yes
|
|
||||||
docker context create dk-env
|
|
||||||
docker buildx create dk-env --driver docker-container --use
|
|
||||||
echo ${DOCKERHUB_SECRET} | docker login -u ${DOCKERHUB_USER} --password-stdin
|
|
||||||
sudo apt update
|
|
||||||
sudo apt install make bash git
|
|
||||||
- run:
|
|
||||||
name: Copy binaries from workspace
|
|
||||||
command: |
|
|
||||||
cp -r /build-* .
|
|
||||||
- run:
|
|
||||||
name: Build and Push all docker images
|
|
||||||
command: |
|
|
||||||
GIT_BRANCH="$CIRCLE_BRANCH" GIT_TAG="$CIRCLE_TAG" make push/all
|
|
||||||
- run:
|
|
||||||
name: Push latest images
|
|
||||||
command: |
|
|
||||||
if [ -n "$CIRCLE_TAG" ]
|
|
||||||
then
|
|
||||||
GIT_BRANCH="$CIRCLE_BRANCH" GIT_TAG="$CIRCLE_TAG" make push/latest
|
|
||||||
else
|
|
||||||
echo "Skipping (no git tag)"
|
|
||||||
fi
|
|
||||||
"release":
|
|
||||||
docker:
|
|
||||||
- image: circleci/golang:1.17
|
|
||||||
steps:
|
|
||||||
- checkout
|
|
||||||
- run:
|
|
||||||
name: Install goreleaser
|
|
||||||
command: |
|
|
||||||
echo 'deb [trusted=yes] https://repo.goreleaser.com/apt/ /' | sudo tee /etc/apt/sources.list.d/goreleaser.list
|
|
||||||
sudo apt update
|
|
||||||
sudo apt install goreleaser
|
|
||||||
- run:
|
|
||||||
name: Release
|
|
||||||
command: GIT_TAG="$CIRCLE_TAG" make release
|
|
||||||
workflows:
|
|
||||||
version: 2.1
|
|
||||||
build:
|
|
||||||
jobs:
|
|
||||||
- "build-test":
|
|
||||||
filters:
|
|
||||||
tags:
|
|
||||||
only: /v[0-9]+(\.[0-9]+)*(-.*)*/
|
|
||||||
- "build-test-arm64":
|
|
||||||
filters:
|
|
||||||
tags:
|
|
||||||
only: /v[0-9]+(\.[0-9]+)*(-.*)*/
|
|
||||||
- "images":
|
|
||||||
context: falco
|
|
||||||
filters:
|
|
||||||
branches:
|
|
||||||
only:
|
|
||||||
- master
|
|
||||||
tags:
|
|
||||||
only: /v[0-9]+(\.[0-9]+)*(-.*)*/
|
|
||||||
requires:
|
|
||||||
- "build-test"
|
|
||||||
- "build-test-arm64"
|
|
||||||
- "release":
|
|
||||||
context: falco
|
|
||||||
filters:
|
|
||||||
branches:
|
|
||||||
ignore: /.*/
|
|
||||||
tags:
|
|
||||||
only: /v[0-9]+(\.[0-9]+)*(-.*)*/
|
|
||||||
requires:
|
|
||||||
- "images"
|
|
|
@ -66,5 +66,5 @@ For example, `action required: change the API interface of the rule engine`.
|
||||||
-->
|
-->
|
||||||
|
|
||||||
```release-note
|
```release-note
|
||||||
|
NONE
|
||||||
```
|
```
|
||||||
|
|
|
@ -0,0 +1,12 @@
|
||||||
|
version: 2
|
||||||
|
updates:
|
||||||
|
- package-ecosystem: "github-actions"
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "weekly"
|
||||||
|
open-pull-requests-limit: 10
|
||||||
|
groups:
|
||||||
|
actions:
|
||||||
|
update-types:
|
||||||
|
- "minor"
|
||||||
|
- "patch"
|
|
@ -0,0 +1,77 @@
|
||||||
|
name: CI Build
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
branches: [master]
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
# Checks if any concurrent jobs under the same pull request or branch are being executed
|
||||||
|
# NOTE: this will cancel every workflow that is being ran against a PR as group is just the github ref (without the workflow name)
|
||||||
|
concurrency:
|
||||||
|
group: ${{ github.head_ref || github.run_id }}
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build-test-dev:
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
arch: [amd64, arm64]
|
||||||
|
uses: ./.github/workflows/reusable_build_test_driverkit.yml
|
||||||
|
with:
|
||||||
|
arch: ${{ matrix.arch }}
|
||||||
|
|
||||||
|
paths-filter:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
outputs:
|
||||||
|
docker_needs_build: ${{ steps.filter.outputs.docker }}
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
- uses: dorny/paths-filter@de90cc6fb38fc0963ad72b210f1f284cd68cea36 # v3.0.2
|
||||||
|
id: filter
|
||||||
|
with:
|
||||||
|
filters: |
|
||||||
|
docker:
|
||||||
|
- 'docker/**'
|
||||||
|
|
||||||
|
build-images-dev:
|
||||||
|
needs: [build-test-dev,paths-filter]
|
||||||
|
if: needs.paths-filter.outputs.docker_needs_build == 'true'
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
arch: [ amd64, arm64 ]
|
||||||
|
uses: ./.github/workflows/reusable_build_push_images.yml
|
||||||
|
with:
|
||||||
|
arch: ${{ matrix.arch }}
|
||||||
|
push: false
|
||||||
|
secrets: inherit
|
||||||
|
|
||||||
|
gomodtidy:
|
||||||
|
name: Enforce go.mod tidiness
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
with:
|
||||||
|
ref: "${{ github.event.pull_request.head.sha }}"
|
||||||
|
repository: ${{github.event.pull_request.head.repo.full_name}}
|
||||||
|
persist-credentials: false
|
||||||
|
|
||||||
|
- name: Setup Go
|
||||||
|
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
|
||||||
|
with:
|
||||||
|
go-version-file: 'go.mod'
|
||||||
|
|
||||||
|
- name: Execute go mod tidy and check the outcome
|
||||||
|
working-directory: ./
|
||||||
|
run: |
|
||||||
|
go mod tidy
|
||||||
|
exit_code=$(git diff --exit-code)
|
||||||
|
exit ${exit_code}
|
||||||
|
|
||||||
|
- name: Print a comment in case of failure
|
||||||
|
run: |
|
||||||
|
echo "The go.mod and/or go.sum files appear not to be correctly tidied.
|
||||||
|
|
||||||
|
Please, rerun go mod tidy to fix the issues."
|
||||||
|
exit 1
|
||||||
|
if: |
|
||||||
|
failure() && github.event.pull_request.head.repo.full_name == github.repository
|
|
@ -0,0 +1,36 @@
|
||||||
|
name: Master CI
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [master]
|
||||||
|
|
||||||
|
# Checks if any concurrent jobs is running for master CI and eventually cancel it
|
||||||
|
concurrency:
|
||||||
|
group: ci-master
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build-test-master:
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
arch: [amd64, arm64]
|
||||||
|
uses: ./.github/workflows/reusable_build_test_driverkit.yml
|
||||||
|
with:
|
||||||
|
arch: ${{ matrix.arch }}
|
||||||
|
|
||||||
|
push-images-master:
|
||||||
|
needs: build-test-master
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
arch: [amd64, arm64]
|
||||||
|
uses: ./.github/workflows/reusable_build_push_images.yml
|
||||||
|
with:
|
||||||
|
arch: ${{ matrix.arch }}
|
||||||
|
push: true
|
||||||
|
secrets: inherit
|
||||||
|
|
||||||
|
images-master:
|
||||||
|
needs: push-images-master
|
||||||
|
uses: ./.github/workflows/reusable_manifest_images.yml
|
||||||
|
secrets: inherit
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,68 @@
|
||||||
|
name: Release
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
tags:
|
||||||
|
- v*
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: write # needed to write releases
|
||||||
|
id-token: write # needed for keyless signing
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build-test-release:
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
arch: [amd64, arm64]
|
||||||
|
uses: ./.github/workflows/reusable_build_test_driverkit.yml
|
||||||
|
with:
|
||||||
|
arch: ${{ matrix.arch }}
|
||||||
|
|
||||||
|
push-images-release:
|
||||||
|
needs: build-test-release
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
arch: [amd64, arm64]
|
||||||
|
uses: ./.github/workflows/reusable_build_push_images.yml
|
||||||
|
with:
|
||||||
|
arch: ${{ matrix.arch }}
|
||||||
|
tag: ${{ github.ref_name }}
|
||||||
|
is_latest: true
|
||||||
|
push: true
|
||||||
|
secrets: inherit
|
||||||
|
|
||||||
|
images-release:
|
||||||
|
needs: push-images-release
|
||||||
|
uses: ./.github/workflows/reusable_manifest_images.yml
|
||||||
|
with:
|
||||||
|
tag: ${{ github.ref_name }}
|
||||||
|
is_latest: true
|
||||||
|
secrets: inherit
|
||||||
|
|
||||||
|
release:
|
||||||
|
needs: images-release
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
with:
|
||||||
|
fetch-depth: 0
|
||||||
|
|
||||||
|
- name: Fetch
|
||||||
|
run: git fetch --prune --force --tags
|
||||||
|
|
||||||
|
- name: Setup Go
|
||||||
|
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
|
||||||
|
with:
|
||||||
|
go-version-file: 'go.mod'
|
||||||
|
|
||||||
|
- name: Install GoReleaser
|
||||||
|
uses: goreleaser/goreleaser-action@9c156ee8a17a598857849441385a2041ef570552 # v6.3.0
|
||||||
|
with:
|
||||||
|
install-only: true
|
||||||
|
|
||||||
|
- name: Release
|
||||||
|
env:
|
||||||
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
GIT_TAG: ${{ github.ref_name }}
|
||||||
|
run: make release
|
|
@ -0,0 +1,72 @@
|
||||||
|
# This is a reusable workflow used by master and release CI
|
||||||
|
on:
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
arch:
|
||||||
|
description: amd64 or arm64
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
branch:
|
||||||
|
description: name of the branch
|
||||||
|
required: false
|
||||||
|
type: string
|
||||||
|
default: 'master'
|
||||||
|
tag:
|
||||||
|
description: The tag to use (e.g. "master" or "0.35.0")
|
||||||
|
required: false
|
||||||
|
type: string
|
||||||
|
default: ''
|
||||||
|
is_latest:
|
||||||
|
description: Update the latest tag with the new image
|
||||||
|
required: false
|
||||||
|
type: boolean
|
||||||
|
default: false
|
||||||
|
push:
|
||||||
|
description: Whether to also push images
|
||||||
|
required: false
|
||||||
|
type: boolean
|
||||||
|
default: false
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build-images:
|
||||||
|
runs-on: ${{ (inputs.arch == 'arm64' && 'ubuntu-22.04-arm') || 'ubuntu-22.04' }}
|
||||||
|
env:
|
||||||
|
GIT_BRANCH: ${{ inputs.branch }}
|
||||||
|
GIT_TAG: ${{ inputs.tag }}
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
|
- name: Create download folder
|
||||||
|
run: mkdir -p build-${{ inputs.arch }}
|
||||||
|
|
||||||
|
- name: Download Driverkit
|
||||||
|
uses: actions/download-artifact@d3f86a106a0bac45b974a628896c90dbdf5c8093 # v4.3.0
|
||||||
|
with:
|
||||||
|
name: driverkit-${{ inputs.arch }}
|
||||||
|
path: build-${{ inputs.arch }}
|
||||||
|
|
||||||
|
- name: Enforce executable bit
|
||||||
|
run: chmod +x build-${{ inputs.arch }}/driverkit
|
||||||
|
|
||||||
|
- name: Set up Docker Buildx
|
||||||
|
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
|
||||||
|
|
||||||
|
- name: Login to Docker Hub
|
||||||
|
if: inputs.push
|
||||||
|
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
|
||||||
|
with:
|
||||||
|
username: ${{ secrets.DOCKERHUB_USER }}
|
||||||
|
password: ${{ secrets.DOCKERHUB_SECRET }}
|
||||||
|
|
||||||
|
- name: Build and Push docker images
|
||||||
|
if: inputs.push
|
||||||
|
run: make push/all
|
||||||
|
|
||||||
|
- name: Build docker images
|
||||||
|
if: inputs.push == false
|
||||||
|
run: make image/all
|
||||||
|
|
||||||
|
- name: Push latest images if needed
|
||||||
|
if: inputs.push && inputs.is_latest
|
||||||
|
run: make push/latest
|
|
@ -0,0 +1,47 @@
|
||||||
|
# This is a reusable workflow used by master and release CI
|
||||||
|
on:
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
arch:
|
||||||
|
description: amd64 or arm64
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
build-test:
|
||||||
|
# See https://github.com/actions/runner/issues/409#issuecomment-1158849936
|
||||||
|
runs-on: ${{ (inputs.arch == 'arm64' && 'ubuntu-22.04-arm') || 'ubuntu-22.04' }}
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
with:
|
||||||
|
fetch-depth: 0
|
||||||
|
|
||||||
|
- name: Setup Go
|
||||||
|
uses: actions/setup-go@d35c59abb061a4a6fb18e82ac0862c26744d6ab5 # v5
|
||||||
|
with:
|
||||||
|
go-version-file: 'go.mod'
|
||||||
|
|
||||||
|
- name: Build
|
||||||
|
run: make build
|
||||||
|
|
||||||
|
- name: Test
|
||||||
|
run: make test
|
||||||
|
|
||||||
|
- name: Set integration tests DRIVERVERSIONS env
|
||||||
|
if: inputs.arch == 'amd64'
|
||||||
|
run: echo "DRIVERVERSIONS=master 6.0.1+driver 2.0.0+driver 17f5df52a7d9ed6bb12d3b1768460def8439936d" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Set integration tests DRIVERVERSIONS env
|
||||||
|
if: inputs.arch == 'arm64'
|
||||||
|
run: echo "DRIVERVERSIONS=master 6.0.1+driver 2.0.0+driver" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Integration tests
|
||||||
|
run: make integration_test
|
||||||
|
|
||||||
|
- name: Upload driverkit
|
||||||
|
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
||||||
|
with:
|
||||||
|
name: driverkit-${{ inputs.arch }}
|
||||||
|
path: |
|
||||||
|
${{ github.workspace }}/_output/bin/driverkit
|
|
@ -0,0 +1,45 @@
|
||||||
|
# This is a reusable workflow used by master and release CI
|
||||||
|
on:
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
branch:
|
||||||
|
description: name of the branch
|
||||||
|
required: false
|
||||||
|
type: string
|
||||||
|
default: 'master'
|
||||||
|
tag:
|
||||||
|
description: The tag to use (e.g. "master" or "0.35.0")
|
||||||
|
required: false
|
||||||
|
type: string
|
||||||
|
default: ''
|
||||||
|
is_latest:
|
||||||
|
description: Update the latest tag with the new image
|
||||||
|
required: false
|
||||||
|
type: boolean
|
||||||
|
default: false
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
push-manifest:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
env:
|
||||||
|
GIT_BRANCH: ${{ inputs.branch }}
|
||||||
|
GIT_TAG: ${{ inputs.tag }}
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
|
- name: Set up Docker Buildx
|
||||||
|
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
|
||||||
|
|
||||||
|
- name: Login to Docker Hub
|
||||||
|
uses: docker/login-action@184bdaa0721073962dff0199f1fb9940f07167d1 # v3.5.0
|
||||||
|
with:
|
||||||
|
username: ${{ secrets.DOCKERHUB_USER }}
|
||||||
|
password: ${{ secrets.DOCKERHUB_SECRET }}
|
||||||
|
|
||||||
|
- name: Build and Push manifest to registry
|
||||||
|
run: make manifest/all
|
||||||
|
|
||||||
|
- name: Push latest manifest if needed
|
||||||
|
if: inputs.is_latest
|
||||||
|
run: make manifest/latest
|
|
@ -1,5 +1,7 @@
|
||||||
_output/
|
_output/
|
||||||
dist/
|
dist/
|
||||||
vendor/
|
vendor/
|
||||||
|
.idea/
|
||||||
|
driverkit
|
||||||
|
|
||||||
driverkit
|
coverage.out
|
||||||
|
|
|
@ -1,6 +1,10 @@
|
||||||
|
version: 2
|
||||||
|
|
||||||
project_name: driverkit
|
project_name: driverkit
|
||||||
builds:
|
builds:
|
||||||
- id: "driverkit"
|
- id: "driverkit"
|
||||||
|
env:
|
||||||
|
- GOEXPERIMENT=loopvar
|
||||||
goos:
|
goos:
|
||||||
- linux
|
- linux
|
||||||
goarch:
|
goarch:
|
||||||
|
@ -9,7 +13,6 @@ builds:
|
||||||
main: .
|
main: .
|
||||||
flags:
|
flags:
|
||||||
- -v
|
- -v
|
||||||
- -buildmode=pie
|
|
||||||
ldflags:
|
ldflags:
|
||||||
- "{{.Env.LDFLAGS}}"
|
- "{{.Env.LDFLAGS}}"
|
||||||
binary: driverkit
|
binary: driverkit
|
||||||
|
|
|
@ -0,0 +1,385 @@
|
||||||
|
# Example Configs
|
||||||
|
|
||||||
|
## aliyun linux 2 (Alibaba Cloud Linux 2)
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 4.19.91-26.al7.x86_64
|
||||||
|
target: alinux
|
||||||
|
output:
|
||||||
|
module: /tmp/falco_alinux_4.19.91-26.al7.x86_64.ko
|
||||||
|
probe: /tmp/falco_alinux_4.19.91-26.al7.x86_64.o
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## aliyun linux 3 (Alibaba Cloud Linux 3)
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 5.10.84-10.4.al8.x86_64
|
||||||
|
target: alinux
|
||||||
|
output:
|
||||||
|
module: /tmp/falco_alinux_4.19.91-26.al7.x86_64.ko
|
||||||
|
probe: /tmp/falco_alinux_4.19.91-26.al7.x86_64.o
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## alma linux
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 5.14.0-162.12.1.el9_1.x86_64
|
||||||
|
target: almalinux
|
||||||
|
output:
|
||||||
|
module: /tmp/falco_almalinux_5.14.0-162.12.1.el9_1.x86_64.ko
|
||||||
|
probe: /tmp/falco_almalinux_5.14.0-162.12.1.el9_1.x86_64.o
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## amazonlinux
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 4.14.26-46.32.amzn1.x86_64
|
||||||
|
target: amazonlinux
|
||||||
|
output:
|
||||||
|
module: /tmp/falco_amazonlinux_4.14.26-46.32.amzn1.x86_64.ko
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## amazonlinux 2
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 4.14.171-136.231.amzn2.x86_64
|
||||||
|
target: amazonlinux2
|
||||||
|
output:
|
||||||
|
module: /tmp/falco_amazonlinux2_4.14.171-136.231.amzn2.x86_64.ko
|
||||||
|
probe: /tmp/falco_amazonlinux2_4.14.171-136.231.amzn2.x86_64.o
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## amazonlinux 2022
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 5.10.96-90.460.amzn2022.x86_64
|
||||||
|
target: amazonlinux2022
|
||||||
|
output:
|
||||||
|
module: /tmp/falco_amazonlinux2022_5.10.96-90.460.amzn2022.x86_64.ko
|
||||||
|
probe: /tmp/falco_amazonlinux2022_5.10.96-90.460.amzn2022.x86_64.o
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## archlinux
|
||||||
|
|
||||||
|
Example configuration file to build both the Kernel module and eBPF probe for Archlinux.
|
||||||
|
Note: archlinux target uses the [Arch Linux Archive](https://wiki.archlinux.org/title/Arch_Linux_Archive) to fetch
|
||||||
|
all ever supported kernel releases.
|
||||||
|
For arm64, it uses an user-provided mirror, as no official mirror is available: http://tardis.tiny-vps.com/aarm/.
|
||||||
|
The mirror has been up and updated since 2015.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelversion: 1
|
||||||
|
kernelrelease: 6.0.6.arch1-1
|
||||||
|
target: arch
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-arch.ko
|
||||||
|
probe: /tmp/falco-arch.o
|
||||||
|
driverversion: master
|
||||||
|
builderimage: ${ARCH_BUILD_IMAGE_HERE}
|
||||||
|
```
|
||||||
|
|
||||||
|
## centos 6
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 2.6.32-754.14.2.el6.x86_64
|
||||||
|
kernelversion: 1
|
||||||
|
target: centos
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-centos6.ko
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## centos 7
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 3.10.0-957.12.2.el7.x86_64
|
||||||
|
kernelversion: 1
|
||||||
|
target: centos
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-centos7.ko
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## centos 8
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 4.18.0-147.5.1.el8_1.x86_64
|
||||||
|
kernelversion: 1
|
||||||
|
target: centos
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-centos8.ko
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## debian
|
||||||
|
|
||||||
|
Example configuration file to build both the Kernel module and eBPF probe for Debian.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 4.19.0-6-amd64
|
||||||
|
kernelversion: 1
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-debian.ko
|
||||||
|
probe: /tmp/falco-debian.o
|
||||||
|
target: debian
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## fedora
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 5.19.16-200.fc36.x86_64
|
||||||
|
kernelversion: 1
|
||||||
|
target: fedora
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-fedora.ko
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## flatcar
|
||||||
|
|
||||||
|
Example configuration file to build both the Kernel module and eBPF probe for Flatcar.
|
||||||
|
The Flatcar release version needs to be provided in the `kernelrelease` field instead of the kernel version;
|
||||||
|
moreover, kernelconfigdata must be provided.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 3185.0.0
|
||||||
|
target: flatcar
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-flatcar-3185.0.0.ko
|
||||||
|
probe: /tmp/falco-flatcar-3185.0.0.o
|
||||||
|
driverversion: master
|
||||||
|
kernelconfigdata: Q09ORklHX0ZBTk9USUZZPXkKQ09ORklHX0t...
|
||||||
|
```
|
||||||
|
|
||||||
|
## minikube
|
||||||
|
Example configuration file to build both the Kernel module and eBPF probe for Minikube.
|
||||||
|
```yaml
|
||||||
|
kernelversion: 1_1.26.0
|
||||||
|
kernelrelease: 5.10.57
|
||||||
|
target: minikube
|
||||||
|
architecture: amd64
|
||||||
|
output:
|
||||||
|
module: /tmp/falco_minikube_5.10.57_1_1.26.0.ko
|
||||||
|
probe: /tmp/falco_minikube_5.10.57_1_1.26.0.o
|
||||||
|
kernelconfigdata: Q09ORklHX0ZBTk9USUZZPXkKQ09ORklHX0t...
|
||||||
|
```
|
||||||
|
|
||||||
|
## oracle linux 8
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 5.4.17-2011.3.2.1.el8uek.x86_64
|
||||||
|
kernelversion: 1
|
||||||
|
target: ol
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-ol8.ko
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## redhat 7
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 3.10.0-1160.66.1.el7.x86_64
|
||||||
|
target: redhat
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-redhat7.ko
|
||||||
|
driverversion: master
|
||||||
|
builderimage: registry.redhat.io/rhel7:rhel7_driverkit
|
||||||
|
```
|
||||||
|
The image used for this build was created with the following command:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker build --build-arg rh_username=<username> --build-arg rh_password=<password> -t registry.redhat.io/rhel7:rhel7_driverkit -f Dockerfile.rhel7 .
|
||||||
|
````
|
||||||
|
| :warning: **Passing user credentials via command line**: Consider using `--secret` option! |
|
||||||
|
|--------------------------------------------------------------------------------------------|
|
||||||
|
|
||||||
|
and Dockerfile.rhel7:
|
||||||
|
```bash
|
||||||
|
FROM registry.redhat.io/rhel7
|
||||||
|
|
||||||
|
ARG rh_username
|
||||||
|
ARG rh_password
|
||||||
|
|
||||||
|
RUN subscription-manager register --username $rh_username --password $rh_password --auto-attach
|
||||||
|
|
||||||
|
RUN yum install gcc elfutils-libelf-devel make -y
|
||||||
|
```
|
||||||
|
| :warning: **Base image requires Redhat subscription to pull**:```docker login registry.redhat.io``` |
|
||||||
|
|-----------------------------------------------------------------------------------------------------|
|
||||||
|
|
||||||
|
## redhat 8
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 4.18.0-372.9.1.el8.x86_64
|
||||||
|
target: redhat
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-redhat8.ko
|
||||||
|
probe: /tmp/falco-redhat8.o
|
||||||
|
driverversion: master
|
||||||
|
builderimage: redhat/ubi8:rhel8_driverkit
|
||||||
|
```
|
||||||
|
|
||||||
|
The image used for this build was created with the following command:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker build --build-arg rh_username=<username> --build-arg rh_password=<password> -t redhat/ubi8:rhel8_driverkit -f Dockerfile.rhel8 .
|
||||||
|
````
|
||||||
|
| :warning: **Passing user credentials via command line**: Consider using `--secret` option! |
|
||||||
|
|--------------------------------------------------------------------------------------------|
|
||||||
|
|
||||||
|
and Dockerfile.rhel8:
|
||||||
|
```bash
|
||||||
|
FROM redhat/ubi8
|
||||||
|
|
||||||
|
ARG rh_username
|
||||||
|
ARG rh_password
|
||||||
|
|
||||||
|
RUN subscription-manager register --username $rh_username --password $rh_password --auto-attach
|
||||||
|
|
||||||
|
RUN yum install gcc curl elfutils-libelf-devel kmod make \
|
||||||
|
llvm-toolset-0:12.0.1-1.module+el8.5.0+11871+08d0eab5.x86_64 cpio -y
|
||||||
|
```
|
||||||
|
|
||||||
|
## redhat 9
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 5.14.0-70.13.1.el9_0.x86_64
|
||||||
|
target: redhat
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-redhat9.ko
|
||||||
|
probe: /tmp/falco-redhat9.o
|
||||||
|
driverversion: master
|
||||||
|
builderimage: docker.io/redhat/ubi9:rhel9_driverkit
|
||||||
|
```
|
||||||
|
The image used for this build was created with the following command:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker build -t docker.io/redhat/ubi9:rhel9_driverkit -f Dockerfile.rhel9 .
|
||||||
|
````
|
||||||
|
|
||||||
|
and Dockerfile.rhel9:
|
||||||
|
```bash
|
||||||
|
FROM docker.io/redhat/ubi9
|
||||||
|
|
||||||
|
RUN yum install gcc elfutils-libelf-devel kmod make cpio llvm-toolset -y
|
||||||
|
RUN ln -s /usr/bin/$(uname -p)-redhat-linux-gcc-11 /usr/bin/gcc-11
|
||||||
|
```
|
||||||
|
The `ln -s /usr/bin/$(uname -p)-redhat-linux-gcc-11 /usr/bin/gcc-11` command creates a symbolic link which makes sure driverkit finds the correct compiler binary.
|
||||||
|
|
||||||
|
| :exclamation: **subscription-manager does not work on RHEL9 containers**: Host must have a valid RHEL subscription. However, if you want to build the Docker image on a host that is not RHEL9, the container will not have access to the required repositories. In that case, the subscription manager can be enabled with some additional adjustments. |
|
||||||
|
|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
|
|
||||||
|
Dockerfile.rhel9.containerSkip:
|
||||||
|
```bash
|
||||||
|
FROM docker.io/redhat/ubi9
|
||||||
|
|
||||||
|
ENV SMDEV_CONTAINER_OFF 1
|
||||||
|
|
||||||
|
ARG REDHAT_USERNAME
|
||||||
|
ARG REDHAT_PASSWORD
|
||||||
|
|
||||||
|
RUN subscription-manager register --username $REDHAT_USERNAME --password $REDHAT_PASSWORD --auto-attach
|
||||||
|
|
||||||
|
RUN yum install gcc elfutils-libelf-devel kmod make cpio llvm-toolset -y
|
||||||
|
RUN ln -s /usr/bin/$(uname -p)-redhat-linux-gcc-11 /usr/bin/gcc-11
|
||||||
|
```
|
||||||
|
|
||||||
|
Setting `SMDEV_CONTAINER_OFF 1` makes sure the container detection is skipped and therefore enables the subscription manager again.
|
||||||
|
|
||||||
|
## rocky linux
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 5.14.0-162.18.1.el9_1.x86_64
|
||||||
|
target: rocky
|
||||||
|
output:
|
||||||
|
module: /tmp/falco_almalinux_5.14.0-162.18.1.el9_1.x86_64.ko
|
||||||
|
probe: /tmp/falco_almalinux_5.14.0-162.18.1.el9_1.x86_64.o
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## ubuntu
|
||||||
|
Example configuration file to build both the Kernel module and eBPF probe for Ubuntu (works with any flavor!).
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 5.0.0-1021-aws-5.0
|
||||||
|
kernelversion: 24~18.04.1
|
||||||
|
target: ubuntu
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-ubuntu-generic.ko
|
||||||
|
probe: /tmp/falco-ubuntu-generic.o
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
## ubuntu-aws
|
||||||
|
|
||||||
|
Example configuration file to build both the Kernel module and eBPF probe for Ubuntu AWS.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 4.15.0-1057-aws
|
||||||
|
kernelversion: 59
|
||||||
|
target: ubuntu-aws
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-ubuntu-aws.ko
|
||||||
|
probe: /tmp/falco-ubuntu-aws.o
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
> **NOTE:** ubuntu-aws exists to retain backward compatibility only,
|
||||||
|
> and should not be used in new configs.
|
||||||
|
|
||||||
|
## ubuntu-generic
|
||||||
|
Example configuration file to build both the Kernel module and eBPF probe for Ubuntu generic.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 4.15.0-72-generic
|
||||||
|
kernelversion: 81
|
||||||
|
target: ubuntu-generic
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-ubuntu-generic.ko
|
||||||
|
probe: /tmp/falco-ubuntu-generic.o
|
||||||
|
driverversion: master
|
||||||
|
```
|
||||||
|
|
||||||
|
> **NOTE:** ubuntu-generic exists to retain backward compatibility only,
|
||||||
|
> and should not be used in new configs.
|
||||||
|
|
||||||
|
## vanilla
|
||||||
|
|
||||||
|
In case of vanilla, you also need to pass the kernel config data in base64 format.
|
||||||
|
|
||||||
|
In most systems you can get `kernelconfigdata` by reading `/proc/config.gz`.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
kernelrelease: 5.5.2
|
||||||
|
kernelversion: 1
|
||||||
|
target: vanilla
|
||||||
|
output:
|
||||||
|
module: /tmp/falco-vanilla.ko
|
||||||
|
probe: /tmp/falco-vanilla.o
|
||||||
|
driverversion: 0de226085cc4603c45ebb6883ca4cacae0bd25b2
|
||||||
|
```
|
||||||
|
|
||||||
|
Now you can add the `kernelconfigdata` to the configuration file, to do so:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
zcat /proc/config.gz| base64 -w0 | awk '{print "kernelconfigdata: " $1;}' >> /tmp/vanilla.yaml
|
||||||
|
```
|
||||||
|
|
||||||
|
The command above assumes that you saved the configuration file at `/tmp/vanilla.yaml`
|
||||||
|
|
||||||
|
### Note
|
||||||
|
|
||||||
|
Usually, building for a `vanilla` target requires more time.
|
||||||
|
|
||||||
|
So, we suggest to increase the `driverkit` timeout (defaults to `60` seconds):
|
||||||
|
|
||||||
|
```bash
|
||||||
|
driverkit docker -c /tmp/vanilla.yaml --timeout=300
|
||||||
|
```
|
65
Makefile
65
Makefile
|
@ -16,23 +16,24 @@ ifeq ($(COMMITS_FROM_GIT_TAG),0)
|
||||||
endif
|
endif
|
||||||
endif
|
endif
|
||||||
|
|
||||||
IMAGE_NAME_BUILDER ?= docker.io/falcosecurity/driverkit-builder
|
DRIVERVERSIONS ?= master
|
||||||
|
|
||||||
IMAGE_NAME_BUILDER_REF := $(IMAGE_NAME_BUILDER):$(GIT_REF)
|
DOCKER_ORG ?= falcosecurity
|
||||||
IMAGE_NAME_BUILDER_COMMIT := $(IMAGE_NAME_BUILDER):$(GIT_COMMIT)
|
|
||||||
IMAGE_NAME_BUILDER_LATEST := $(IMAGE_NAME_BUILDER):latest
|
|
||||||
|
|
||||||
IMAGE_NAME_DRIVERKIT ?= docker.io/falcosecurity/driverkit
|
ARCH := $(shell uname -m)
|
||||||
|
|
||||||
IMAGE_NAME_DRIVERKIT_REF := $(IMAGE_NAME_DRIVERKIT):$(GIT_REF)
|
BUILDERS := $(patsubst docker/builders/builder-%.Dockerfile,%,$(wildcard docker/builders/builder*$(ARCH)*.Dockerfile))
|
||||||
IMAGE_NAME_DRIVERKIT_COMMIT := $(IMAGE_NAME_DRIVERKIT):$(GIT_COMMIT)
|
|
||||||
IMAGE_NAME_DRIVERKIT_LATEST := $(IMAGE_NAME_DRIVERKIT):latest
|
|
||||||
|
|
||||||
LDFLAGS := -X github.com/falcosecurity/driverkit/pkg/version.buildTime=$(shell date +%s) -X github.com/falcosecurity/driverkit/pkg/version.gitCommit=${GIT_COMMIT} -X github.com/falcosecurity/driverkit/pkg/version.gitTag=$(if ${GIT_TAG},${GIT_TAG},v0.0.0) -X github.com/falcosecurity/driverkit/pkg/version.commitsFromGitTag=${COMMITS_FROM_GIT_TAG} -X github.com/falcosecurity/driverkit/pkg/driverbuilder.BuilderBaseImage=${IMAGE_NAME_BUILDER_COMMIT}
|
IMAGE_NAME_BUILDER_BASE ?= docker.io/$(DOCKER_ORG)/driverkit-builder
|
||||||
|
|
||||||
ARCHS := "arm64,amd64"
|
IMAGE_NAME_DRIVERKIT ?= docker.io/$(DOCKER_ORG)/driverkit
|
||||||
|
|
||||||
TARGET_TEST_ARCH ?= $(shell uname -m)
|
IMAGE_NAME_DRIVERKIT_REF := $(IMAGE_NAME_DRIVERKIT):$(GIT_REF)_$(ARCH)
|
||||||
|
IMAGE_NAME_DRIVERKIT_COMMIT := $(IMAGE_NAME_DRIVERKIT):$(GIT_COMMIT)_$(ARCH)
|
||||||
|
IMAGE_NAME_DRIVERKIT_LATEST := $(IMAGE_NAME_DRIVERKIT):latest_$(ARCH)
|
||||||
|
|
||||||
|
LDFLAGS := -X github.com/falcosecurity/driverkit/pkg/version.buildTime=$(shell date +%s) -X github.com/falcosecurity/driverkit/pkg/version.gitCommit=${GIT_COMMIT} -X github.com/falcosecurity/driverkit/pkg/version.gitTag=$(if ${GIT_TAG},${GIT_TAG},v0.0.0) -X github.com/falcosecurity/driverkit/pkg/version.commitsFromGitTag=${COMMITS_FROM_GIT_TAG} -X github.com/falcosecurity/driverkit/pkg/driverbuilder/builder.defaultImageTag=$(GIT_COMMIT)
|
||||||
|
TARGET_TEST_ARCH ?= $(ARCH)
|
||||||
test_configs := $(wildcard test/$(TARGET_TEST_ARCH)/configs/*.yaml)
|
test_configs := $(wildcard test/$(TARGET_TEST_ARCH)/configs/*.yaml)
|
||||||
|
|
||||||
driverkit ?= _output/bin/driverkit
|
driverkit ?= _output/bin/driverkit
|
||||||
|
@ -42,7 +43,7 @@ driverkit_docgen ?= _output/bin/docgen
|
||||||
build: clean ${driverkit}
|
build: clean ${driverkit}
|
||||||
|
|
||||||
${driverkit}:
|
${driverkit}:
|
||||||
CGO_ENABLED=0 go build -v -buildmode=pie -ldflags '${LDFLAGS}' -o $@ .
|
CGO_ENABLED=0 GOEXPERIMENT=loopvar go build -v -ldflags '${LDFLAGS}' -o $@ .
|
||||||
|
|
||||||
.PHONY: release
|
.PHONY: release
|
||||||
release: clean
|
release: clean
|
||||||
|
@ -57,38 +58,58 @@ image/all: image/builder image/driverkit
|
||||||
|
|
||||||
.PHONY: image/builder
|
.PHONY: image/builder
|
||||||
image/builder:
|
image/builder:
|
||||||
$(DOCKER) buildx build --platform $(ARCHS) -o type=image,push="false" -f build/builder.Dockerfile .
|
$(foreach b,$(BUILDERS),\
|
||||||
|
$(DOCKER) buildx build -o type=image,push="false" -f docker/builders/builder-$b.Dockerfile . ; \
|
||||||
|
)
|
||||||
|
|
||||||
.PHONY: image/driverkit
|
.PHONY: image/driverkit
|
||||||
image/driverkit:
|
image/driverkit:
|
||||||
$(DOCKER) buildx build --platform $(ARCHS) -o type=image,push="false" -f build/driverkit.Dockerfile .
|
$(DOCKER) buildx build -o type=image,push="false" -f docker/driverkit.Dockerfile .
|
||||||
|
|
||||||
push/all: push/builder push/driverkit
|
push/all: push/builder push/driverkit
|
||||||
|
|
||||||
.PHONY: push/builder
|
.PHONY: push/builder
|
||||||
push/builder:
|
push/builder:
|
||||||
$(DOCKER) buildx build --push --platform $(ARCHS) -t "$(IMAGE_NAME_BUILDER_REF)" -t "$(IMAGE_NAME_BUILDER_COMMIT)" -f build/builder.Dockerfile .
|
$(foreach b,$(BUILDERS),\
|
||||||
|
$(DOCKER) buildx build --push -t "$(IMAGE_NAME_BUILDER_BASE):$b-$(GIT_REF)" -t "$(IMAGE_NAME_BUILDER_BASE):$b-$(GIT_COMMIT)" -f docker/builders/builder-$b.Dockerfile . ; \
|
||||||
|
)
|
||||||
|
|
||||||
.PHONY: push/driverkit
|
.PHONY: push/driverkit
|
||||||
push/driverkit:
|
push/driverkit:
|
||||||
$(DOCKER) buildx build --push --platform $(ARCHS) -t "$(IMAGE_NAME_DRIVERKIT_REF)" -t "$(IMAGE_NAME_DRIVERKIT_COMMIT)" -f build/driverkit.Dockerfile .
|
$(DOCKER) buildx build --push -t "$(IMAGE_NAME_DRIVERKIT_REF)" -t "$(IMAGE_NAME_DRIVERKIT_COMMIT)" -f docker/driverkit.Dockerfile .
|
||||||
|
|
||||||
.PHONY: push/latest
|
.PHONY: push/latest
|
||||||
push/latest:
|
push/latest:
|
||||||
$(DOCKER) buildx build --push --platform $(ARCHS) -t "$(IMAGE_NAME_BUILDER_LATEST)" -f build/builder.Dockerfile .
|
$(foreach b,$(BUILDERS),\
|
||||||
$(DOCKER) buildx build --push --platform $(ARCHS) -t "$(IMAGE_NAME_DRIVERKIT_LATEST)" -f build/driverkit.Dockerfile .
|
$(DOCKER) buildx build --push -t "$(IMAGE_NAME_BUILDER_BASE):$b-latest" -f docker/builders/builder-$b.Dockerfile . ; \
|
||||||
|
)
|
||||||
|
$(DOCKER) buildx build --push -t "$(IMAGE_NAME_DRIVERKIT_LATEST)" -f docker/driverkit.Dockerfile .
|
||||||
|
|
||||||
|
manifest/all: manifest/driverkit
|
||||||
|
|
||||||
|
.PHONY: manifest/driverkit
|
||||||
|
manifest/driverkit:
|
||||||
|
$(DOCKER) buildx imagetools create -t $(IMAGE_NAME_DRIVERKIT):$(GIT_REF) $(IMAGE_NAME_DRIVERKIT):$(GIT_REF)_x86_64 $(IMAGE_NAME_DRIVERKIT):$(GIT_REF)_aarch64
|
||||||
|
$(DOCKER) buildx imagetools create -t $(IMAGE_NAME_DRIVERKIT):$(GIT_COMMIT) $(IMAGE_NAME_DRIVERKIT):$(GIT_COMMIT)_x86_64 $(IMAGE_NAME_DRIVERKIT):$(GIT_COMMIT)_aarch64
|
||||||
|
|
||||||
|
.PHONY: manifest/latest
|
||||||
|
manifest/latest:
|
||||||
|
$(DOCKER) buildx imagetools create -t $(IMAGE_NAME_DRIVERKIT):latest $(IMAGE_NAME_DRIVERKIT):latest_x86_64 $(IMAGE_NAME_DRIVERKIT):latest_aarch64
|
||||||
|
|
||||||
.PHONY: test
|
.PHONY: test
|
||||||
test:
|
test:
|
||||||
go test -v -race ./...
|
go clean -testcache
|
||||||
go test -v -buildmode=pie ./cmd
|
GOEXPERIMENT=loopvar go test -v -cover -race ./...
|
||||||
|
GOEXPERIMENT=loopvar go test -v -cover ./cmd
|
||||||
|
|
||||||
.PHONY: integration_test
|
.PHONY: integration_test
|
||||||
integration_test: $(test_configs)
|
integration_test: $(test_configs)
|
||||||
|
|
||||||
.PHONY: $(test_configs)
|
.PHONY: $(test_configs)
|
||||||
$(test_configs): ${driverkit}
|
$(test_configs): ${driverkit}
|
||||||
${driverkit} docker -c $@ --builderimage falcosecurity/driverkit-builder:latest -l debug --timeout 600
|
$(foreach d,$(DRIVERVERSIONS),\
|
||||||
|
${driverkit} docker -c $@ --builderimage auto:master -l debug --timeout 600 --driverversion $d; \
|
||||||
|
)
|
||||||
|
|
||||||
.PHONY: ${driverkit_docgen}
|
.PHONY: ${driverkit_docgen}
|
||||||
${driverkit_docgen}: ${PWD}/docgen
|
${driverkit_docgen}: ${PWD}/docgen
|
||||||
|
@ -96,6 +117,6 @@ ${driverkit_docgen}: ${PWD}/docgen
|
||||||
|
|
||||||
.PHONY: docs
|
.PHONY: docs
|
||||||
docs: ${driverkit_docgen}
|
docs: ${driverkit_docgen}
|
||||||
$(RM) -R docs/*
|
$(RM) -R docs/driverkit*
|
||||||
@mkdir -p docs
|
@mkdir -p docs
|
||||||
${driverkit_docgen}
|
${driverkit_docgen}
|
||||||
|
|
10
OWNERS
10
OWNERS
|
@ -1,8 +1,10 @@
|
||||||
approvers:
|
approvers:
|
||||||
- fntlnz
|
|
||||||
- leodido
|
- leodido
|
||||||
- dwindsor
|
- dwindsor
|
||||||
reviewers:
|
- fededp
|
||||||
|
- EXONER4TED
|
||||||
|
- lowaiz
|
||||||
|
- LucaGuerra
|
||||||
|
|
||||||
|
emeritus_approvers:
|
||||||
- fntlnz
|
- fntlnz
|
||||||
- leodido
|
|
||||||
- dwindsor
|
|
||||||
|
|
436
README.md
436
README.md
|
@ -1,11 +1,15 @@
|
||||||
# driverkit
|
# driverkit
|
||||||
|
|
||||||
Status: **Under development**
|
[](https://github.com/falcosecurity/evolution/blob/main/REPOSITORIES.md#ecosystem-scope) [](https://github.com/falcosecurity/evolution/blob/main/REPOSITORIES.md#incubating)
|
||||||
|
|
||||||
A command line tool that can be used to build the Falco kernel module and eBPF probe.
|
[](https://github.com/falcosecurity/driverkit/releases/latest)
|
||||||
|

|
||||||
|
[](https://goreportcard.com/report/github.com/falcosecurity/driverkit)
|
||||||
|
[](https://hub.docker.com/r/falcosecurity/driverkit)
|
||||||
|
|
||||||
|
A command line tool that can be used to build the [Falco](https://github.com/falcosecurity/falco) kernel module and eBPF probe.
|
||||||
|
|
||||||
## Usage
|
## Glossary
|
||||||
|
|
||||||
When you meet `kernelversion` that refers to the version you get executing `uname -v`:
|
When you meet `kernelversion` that refers to the version you get executing `uname -v`:
|
||||||
|
|
||||||
|
@ -23,6 +27,42 @@ uname -r
|
||||||
4.15.0-1057-aws
|
4.15.0-1057-aws
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Help
|
||||||
|
|
||||||
|
By checking driverkit help, you can quickly discover info about:
|
||||||
|
* Supported options
|
||||||
|
* Supported commands
|
||||||
|
* Supported architectures
|
||||||
|
* Supported targets
|
||||||
|
* Default options
|
||||||
|
|
||||||
|
```
|
||||||
|
driverkit help
|
||||||
|
```
|
||||||
|
|
||||||
|
## Architecture
|
||||||
|
|
||||||
|
The target architecture is taken from runtime environment, but it can be overridden through `architecture` config.
|
||||||
|
Driverkit also supports cross building for arm64 using qemu from an x86_64 host.
|
||||||
|
|
||||||
|
> **NOTE:** we could not automatically fetch correct architecture given a kernelrelease,
|
||||||
|
> because some kernel names do not have any architecture suffix, namely Ubuntu ones.
|
||||||
|
|
||||||
|
## Headers
|
||||||
|
|
||||||
|
Driverkit has an internal logic to retrieve headers urls given a target and desired kernelrelease/kernelversion.
|
||||||
|
Unfortunately, the logic is quite hard to implement correctly for every supported target.
|
||||||
|
As of today, the preferred method is to instead use the `kernelurls` configuration param,
|
||||||
|
that allows to specify a list of headers.
|
||||||
|
|
||||||
|
> **NOTE:** the internal headers fetching logic should be considered a fallback that will be, sooner or later, deprecated.
|
||||||
|
|
||||||
|
A solution to crawl all supported kernels by multiple distro was recently developed,
|
||||||
|
and it provides a json output with aforementioned `kernelheaders`: https://github.com/falcosecurity/kernel-crawler.
|
||||||
|
Json for supported architectures can be found at https://falcosecurity.github.io/kernel-crawler/.
|
||||||
|
|
||||||
|
## How to use
|
||||||
|
|
||||||
### Against a Kubernetes cluster
|
### Against a Kubernetes cluster
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
|
@ -35,7 +75,6 @@ driverkit kubernetes --output-module /tmp/falco.ko --kernelversion=81 --kernelre
|
||||||
driverkit docker --output-module /tmp/falco.ko --kernelversion=81 --kernelrelease=4.15.0-72-generic --driverversion=master --target=ubuntu-generic
|
driverkit docker --output-module /tmp/falco.ko --kernelversion=81 --kernelrelease=4.15.0-72-generic --driverversion=master --target=ubuntu-generic
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
### Build using a configuration file
|
### Build using a configuration file
|
||||||
|
|
||||||
Create a file named `ubuntu-aws.yaml` containing the following content:
|
Create a file named `ubuntu-aws.yaml` containing the following content:
|
||||||
|
@ -61,396 +100,21 @@ driverkit docker -c ubuntu-aws.yaml
|
||||||
It is possible to customize the kernel module name that is produced by Driverkit with the `moduledevicename` and `moduledrivername` options.
|
It is possible to customize the kernel module name that is produced by Driverkit with the `moduledevicename` and `moduledrivername` options.
|
||||||
In this context, the _device name_ is the prefix used for the devices in `/dev/`, while the _driver name_ is the kernel module name as reported by `modinfo` or `lsmod` once the module is loaded.
|
In this context, the _device name_ is the prefix used for the devices in `/dev/`, while the _driver name_ is the kernel module name as reported by `modinfo` or `lsmod` once the module is loaded.
|
||||||
|
|
||||||
## Supported architectures
|
## Examples
|
||||||
|
|
||||||
At the moment, driverkit supports:
|
For a comprehensive list of examples, heads to [example configs](Example_configs.md)!
|
||||||
* amd64 (x86_64)
|
|
||||||
* arm64 (aarch64)
|
|
||||||
|
|
||||||
The architecture is taken from runtime environment, but it can be overridden through `architecture` config.
|
## Support a new target
|
||||||
Driverkit also supports cross building for arm64 using qemu from an x86_64 host.
|
|
||||||
|
|
||||||
Note: we could not automatically fetch correct architecture because some kernel names do not have the `-$arch`, namely Ubuntu ones.
|
To add support for a new target, a new builder must be added.
|
||||||
|
For more info, you can find specific docs in [docs/builder.md](docs/builder.md) file.
|
||||||
|
|
||||||
## Supported targets
|
## Support a new builder image
|
||||||
|
|
||||||
### ubuntu-generic
|
To add support for a new builder image, follow the doc at [docs/builder_images.md](docs/builder_images.md) file.
|
||||||
Example configuration file to build both the Kernel module and eBPF probe for Ubuntu generic.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 4.15.0-72-generic
|
|
||||||
kernelversion: 81
|
|
||||||
target: ubuntu-generic
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-ubuntu-generic.ko
|
|
||||||
probe: /tmp/falco-ubuntu-generic.o
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### ubuntu-aws
|
|
||||||
|
|
||||||
Example configuration file to build both the Kernel module and eBPF probe for Ubuntu AWS.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 4.15.0-1057-aws
|
|
||||||
kernelversion: 59
|
|
||||||
target: ubuntu-aws
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-ubuntu-aws.ko
|
|
||||||
probe: /tmp/falco-ubuntu-aws.o
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### centos 6
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 2.6.32-754.14.2.el6.x86_64
|
|
||||||
kernelversion: 1
|
|
||||||
target: centos
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-centos6.ko
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### centos 7
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 3.10.0-957.12.2.el7.x86_64
|
|
||||||
kernelversion: 1
|
|
||||||
target: centos
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-centos7.ko
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### centos 8
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 4.18.0-147.5.1.el8_1.x86_64
|
|
||||||
kernelversion: 1
|
|
||||||
target: centos
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-centos8.ko
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### amazonlinux
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 4.14.26-46.32.amzn1.x86_64
|
|
||||||
target: amazonlinux
|
|
||||||
output:
|
|
||||||
module: /tmp/falco_amazonlinux_4.14.26-46.32.amzn1.x86_64.ko
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### amazonlinux 2
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 4.14.171-136.231.amzn2.x86_64
|
|
||||||
target: amazonlinux2
|
|
||||||
output:
|
|
||||||
module: /tmp/falco_amazonlinux2_4.14.171-136.231.amzn2.x86_64.ko
|
|
||||||
probe: /tmp/falco_amazonlinux2_4.14.171-136.231.amzn2.x86_64.o
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### amazonlinux 2022
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 5.10.96-90.460.amzn2022.x86_64
|
|
||||||
target: amazonlinux2022
|
|
||||||
output:
|
|
||||||
module: /tmp/falco_amazonlinux2022_5.10.96-90.460.amzn2022.x86_64.ko
|
|
||||||
probe: /tmp/falco_amazonlinux2022_5.10.96-90.460.amzn2022.x86_64.o
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### debian
|
|
||||||
|
|
||||||
Example configuration file to build both the Kernel module and eBPF probe for Debian.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 4.19.0-6-amd64
|
|
||||||
kernelversion: 1
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-debian.ko
|
|
||||||
probe: /tmp/falco-debian.o
|
|
||||||
target: debian
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### flatcar
|
|
||||||
|
|
||||||
Example configuration file to build both the Kernel module and eBPF probe for Flatcar.
|
|
||||||
The Flatcar release version needs to be provided in the `kernelrelease` field instead of the kernel version.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 3185.0.0
|
|
||||||
target: flatcar
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-flatcar-3185.0.0.ko
|
|
||||||
probe: /tmp/falco-flatcar-3185.0.0.o
|
|
||||||
driverversion: master
|
|
||||||
```
|
|
||||||
|
|
||||||
### redhat 7
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 3.10.0-1160.66.1.el7.x86_64
|
|
||||||
target: redhat
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-redhat7.ko
|
|
||||||
driverversion: master
|
|
||||||
builderimage: registry.redhat.io/rhel7:rhel7_driverkit
|
|
||||||
```
|
|
||||||
The image used for this build was created with the following command:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
docker build --build-arg rh_username=<username> --build-arg rh_password=<password> -t registry.redhat.io/rhel7:rhel7_driverkit -f Dockerfile.rhel7 .
|
|
||||||
````
|
|
||||||
| :warning: **Passing user credentials via command line**: Consider using `--secret` option! |
|
|
||||||
|--------------------------------------------------------------------------------------------|
|
|
||||||
|
|
||||||
and Dockerfile.rhel7:
|
|
||||||
```bash
|
|
||||||
FROM registry.redhat.io/rhel7
|
|
||||||
|
|
||||||
ARG rh_username
|
|
||||||
ARG rh_password
|
|
||||||
|
|
||||||
RUN subscription-manager register --username $rh_username --password $rh_password --auto-attach
|
|
||||||
|
|
||||||
RUN yum install gcc elfutils-libelf-devel make -y
|
|
||||||
```
|
|
||||||
| :warning: **Base image requires Redhat subscription to pull**:```docker login registry.redhat.io``` |
|
|
||||||
|-----------------------------------------------------------------------------------------------------|
|
|
||||||
### redhat 8
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 4.18.0-372.9.1.el8.x86_64
|
|
||||||
target: redhat
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-redhat8.ko
|
|
||||||
probe: /tmp/falco-redhat8.o
|
|
||||||
driverversion: master
|
|
||||||
builderimage: redhat/ubi8:rhel8_driverkit
|
|
||||||
```
|
|
||||||
|
|
||||||
The image used for this build was created with the following command:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
docker build --build-arg rh_username=<username> --build-arg rh_password=<password> -t redhat/ubi8:rhel8_driverkit -f Dockerfile.rhel8 .
|
|
||||||
````
|
|
||||||
| :warning: **Passing user credentials via command line**: Consider using `--secret` option! |
|
|
||||||
|--------------------------------------------------------------------------------------------|
|
|
||||||
|
|
||||||
and Dockerfile.rhel8:
|
|
||||||
```bash
|
|
||||||
FROM redhat/ubi8
|
|
||||||
|
|
||||||
ARG rh_username
|
|
||||||
ARG rh_password
|
|
||||||
|
|
||||||
RUN subscription-manager register --username $rh_username --password $rh_password --auto-attach
|
|
||||||
|
|
||||||
RUN yum install gcc curl elfutils-libelf-devel kmod make \
|
|
||||||
llvm-toolset-0:12.0.1-1.module+el8.5.0+11871+08d0eab5.x86_64 cpio -y
|
|
||||||
```
|
|
||||||
|
|
||||||
### redhat 9
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 5.14.0-70.13.1.el9_0.x86_64
|
|
||||||
target: redhat
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-redhat9.ko
|
|
||||||
probe: /tmp/falco-redhat9.o
|
|
||||||
driverversion: master
|
|
||||||
builderimage: docker.io/redhat/ubi9:rhel9_driverkit
|
|
||||||
```
|
|
||||||
The image used for this build was created with the following command:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
docker build -t docker.io/redhat/ubi9:rhel9_driverkit -f Dockerfile.rhel9 .
|
|
||||||
````
|
|
||||||
|
|
||||||
and Dockerfile.rhel9:
|
|
||||||
```bash
|
|
||||||
FROM docker.io/redhat/ubi9
|
|
||||||
|
|
||||||
RUN yum install gcc elfutils-libelf-devel kmod make cpio llvm-toolset -y
|
|
||||||
```
|
|
||||||
| :exclamation: **subscription-manager does not work on RHEL9 containers**: Host must have a valid RHEL subscription |
|
|
||||||
|--------------------------------------------------------------------------------------------------------------------|
|
|
||||||
|
|
||||||
### vanilla
|
|
||||||
|
|
||||||
In case of vanilla, you also need to pass the kernel config data in base64 format.
|
|
||||||
|
|
||||||
In most systems you can get `kernelconfigdata` by reading `/proc/config.gz`.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
kernelrelease: 5.5.2
|
|
||||||
kernelversion: 1
|
|
||||||
target: vanilla
|
|
||||||
output:
|
|
||||||
module: /tmp/falco-vanilla.ko
|
|
||||||
probe: /tmp/falco-vanilla.o
|
|
||||||
driverversion: 0de226085cc4603c45ebb6883ca4cacae0bd25b2
|
|
||||||
```
|
|
||||||
|
|
||||||
Now you can add the `kernelconfigdata` to the configuration file, to do so:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
zcat /proc/config.gz| base64 -w0 | awk '{print "kernelconfigdata: " $1;}' >> /tmp/vanilla.yaml
|
|
||||||
```
|
|
||||||
|
|
||||||
The command above assumes that you saved the configuration file at `/tmp/vanilla.yaml`
|
|
||||||
|
|
||||||
#### Note
|
|
||||||
|
|
||||||
Usually, building for a `vanilla` target requires more time.
|
|
||||||
|
|
||||||
So, we suggest to increase the `driverkit` timeout (defaults to `60` seconds):
|
|
||||||
|
|
||||||
```bash
|
|
||||||
driverkit docker -c /tmp/vanilla.yaml --timeout=300
|
|
||||||
```
|
|
||||||
|
|
||||||
## Goals
|
|
||||||
|
|
||||||
- [x] Have a package that can build the Falco kernel module in k8s
|
|
||||||
- [x] Have a package that can build the Falco kernel module in docker
|
|
||||||
- [x] Have a package that can build the Falco eBPF probe in k8s
|
|
||||||
- [x] Have a package that can build the Falco eBPF probe in docker
|
|
||||||
- [x] Support the top distributions in our [Survey](http://bit.ly/driverkit-survey-vote) and the Vanilla Kernel
|
|
||||||
- [x] Ubuntu (`ubuntu-aws`, `ubuntu-generic`)
|
|
||||||
- [x] CentOS 8
|
|
||||||
- [x] CentOS 7
|
|
||||||
- [x] CentOS 6
|
|
||||||
- [x] AmazonLinux (`amazonlinux`, `amazonlinux2`)
|
|
||||||
- [x] Debian
|
|
||||||
- [x] Vanilla kernel (`vanilla`)
|
|
||||||
|
|
||||||
## Survey
|
## Survey
|
||||||
|
|
||||||
We are conducting a [survey](http://bit.ly/driverkit-survey-vote) to know what is the most interesting set of Operating Systems we must support first in driverkit.
|
We are conducting a [survey](http://bit.ly/driverkit-survey-vote) to know what is the most interesting set of Operating Systems we must support first in driverkit.
|
||||||
|
|
||||||
You can find the results of the survey [here](http://bit.ly/driverkit-survey-results)
|
You can find the results of the survey [here](http://bit.ly/driverkit-survey-results)
|
||||||
|
|
||||||
## Creating a new Builder
|
|
||||||
|
|
||||||
You probably came here because you want to tell the [Falco Drivers Build Grid](https://github.com/falcosecurity/test-infra/tree/master/driverkit) to
|
|
||||||
build drivers for a specific distro you care about.
|
|
||||||
|
|
||||||
If that distribution is not supported by driverkit, the Falco Drivers Build Grid will not be able to just build it as it does for other distros.
|
|
||||||
|
|
||||||
To add a new supported distribution, you need to create a specific file implementing the `builder.Builder` interface.
|
|
||||||
|
|
||||||
You can find the specific distribution files into the [pkg/driverbuilder/builder](/pkg/driverbuilder/builder) folder.
|
|
||||||
|
|
||||||
Here's the [Ubuntu](/pkg/driverbuilder/builder/ubuntu.go) one for reference.
|
|
||||||
|
|
||||||
Following this simple set of instructions should help you while you implement a new `builder.Builder`.
|
|
||||||
|
|
||||||
|
|
||||||
### 1. Builder file
|
|
||||||
Create a file, named with the name of the distro you want to add in the `pkg/driverbuilder/builder` folder.
|
|
||||||
|
|
||||||
```bash
|
|
||||||
touch pkg/driverbuilder/builder/archlinux.go
|
|
||||||
```
|
|
||||||
|
|
||||||
### 2. Target name
|
|
||||||
|
|
||||||
Your builder will need a constant for the target it implements. Usually that constant
|
|
||||||
can just be the name of the distribution you are implementing. A builder can implement
|
|
||||||
more than one target at time. For example, the Ubuntu builder implements both `ubuntu-generic` and `ubuntu-aws`
|
|
||||||
to reflect the organization that the distro itself has.
|
|
||||||
|
|
||||||
Once you have the constant, you will need to add it to the `BuilderByTarget` map.
|
|
||||||
|
|
||||||
|
|
||||||
Open your file and you will need to have something like this:
|
|
||||||
|
|
||||||
```go
|
|
||||||
// TargetTypeArchLinux identifies the Arch Linux target.
|
|
||||||
const TargetTypeArchLinux Type = "archlinux"
|
|
||||||
|
|
||||||
type archLinux struct {
|
|
||||||
}
|
|
||||||
|
|
||||||
func init() {
|
|
||||||
BuilderByTarget[TargetTypeArchLinux] = &archLinux{}
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
Now, you can implement the `builder.Builder` interface for the `archlinux` struct
|
|
||||||
you just registered.
|
|
||||||
|
|
||||||
Here's a very minimalistic example.
|
|
||||||
|
|
||||||
|
|
||||||
```go
|
|
||||||
func (v archLinux) Script(c Config) (string, error) {
|
|
||||||
return "echo 'hello world'", nil
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
Essentially, the `Script` function that you are implementing will need to return a string containing
|
|
||||||
a `bash` script that will be executed by driverkit at build time.
|
|
||||||
|
|
||||||
Under `pkg/driverbuilder/builder/templates` folder, you can find all the template scripts for the supported builders.
|
|
||||||
Adding a new template there and using `go:embed` to include it in your builder, allows leaner code
|
|
||||||
without mixing up templates and builder logic.
|
|
||||||
For example:
|
|
||||||
|
|
||||||
```go
|
|
||||||
//go:embed templates/archlinux.sh
|
|
||||||
var archlinuxTemplate string
|
|
||||||
```
|
|
||||||
|
|
||||||
Depending on how the distro works, the script will need to fetch the kernel headers for it at the specific kernel version specified
|
|
||||||
in the `Config` struct at `c.Build.KernelVersion`.
|
|
||||||
Once you have those, based on what that kernel can do and based on what was configured
|
|
||||||
by the user you will need to build the kernel module driver and/or the eBPF probe driver.
|
|
||||||
|
|
||||||
How does this work?
|
|
||||||
|
|
||||||
If the user specifies:
|
|
||||||
|
|
||||||
- `c.Build.ModuleFilePath` you will need to build the kernel module and save it in /tmp/driver/falco.ko`
|
|
||||||
- `c.Build.ProbeFilePath` you will need to build the eBPF probe and save it in /tmp/driver/probe.o`
|
|
||||||
|
|
||||||
The `/tmp/driver` MUST be interpolated from the `DriverDirectory` constant from [`builders.go`](/pkg/driverbuilder/builder/builders.go).
|
|
||||||
|
|
||||||
If you look at the various builder implemented, you will see that the task of creating a new builder
|
|
||||||
can be easy or difficult depending on how the distribution ships their artifacts.
|
|
||||||
|
|
||||||
### 3. Customize GCC version
|
|
||||||
|
|
||||||
Driverkit builder image supports 4 gcc versions:
|
|
||||||
* GCC-8
|
|
||||||
* GCC-6.3.0
|
|
||||||
* GCC-5.5.0
|
|
||||||
* GCC-4.8.4
|
|
||||||
|
|
||||||
You can dynamically choose the one you prefer, likely switching on the kernel version.
|
|
||||||
For an example, you can check out Ubuntu builder, namely: `ubuntuGCCVersionFromKernelRelease`.
|
|
||||||
|
|
||||||
### 4. Customize llvm version
|
|
||||||
|
|
||||||
Driverkit builder image supports 2 llvm versions:
|
|
||||||
* llvm-7
|
|
||||||
* llvm-12
|
|
||||||
|
|
||||||
You can dynamically choose the one you prefer, likely switching on the kernel version.
|
|
||||||
For an example, you can check out Debian builder, namely: `debianLLVMVersionFromKernelRelease`.
|
|
||||||
|
|
||||||
### 5. kernel-crawler
|
|
||||||
|
|
||||||
When creating a new builder, it is recommended to check that [kernel-crawler](https://github.com/falcosecurity/kernel-crawler)
|
|
||||||
can also support collecting the new builders kernel versions and header package URLs. This will make sure that the latest drivers
|
|
||||||
for the new builder are automatically built by [test-infra](https://github.com/falcosecurity/test-infra). If required, add a feature request
|
|
||||||
for support for the new builder on the [kernel-crawler](https://github.com/falcosecurity/kernel-crawler) repository.
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Release Process
|
# Release Process
|
||||||
|
|
||||||
Our release process is based upon [CircleCI](https://app.circleci.com/pipelines/github/falcosecurity/driverkit) and [goreleaser](https://github.com/goreleaser/goreleaser) tool for artifacts.
|
Our release process is fully automated using [Github actions](.github/workflows/release.yml) and [goreleaser](https://github.com/goreleaser/goreleaser) tool for artifacts.
|
||||||
|
|
||||||
When we release we do the following process:
|
When we release we do the following process:
|
||||||
|
|
||||||
|
|
278
cmd/cli_test.go
278
cmd/cli_test.go
|
@ -1,26 +1,42 @@
|
||||||
//go:build !race
|
//go:build !race
|
||||||
// +build !race
|
// +build !race
|
||||||
|
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package cmd
|
package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"fmt"
|
|
||||||
"io/ioutil"
|
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"runtime"
|
"runtime"
|
||||||
|
"sort"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
"text/template"
|
||||||
|
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
|
||||||
"github.com/acarl005/stripansi"
|
"github.com/acarl005/stripansi"
|
||||||
"gotest.tools/assert"
|
"gotest.tools/assert"
|
||||||
)
|
)
|
||||||
|
|
||||||
type expect struct {
|
type expect struct {
|
||||||
err string
|
err string
|
||||||
out string
|
out string
|
||||||
fmtRuntimeArch bool
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type testCase struct {
|
type testCase struct {
|
||||||
|
@ -34,32 +50,28 @@ var tests = []testCase{
|
||||||
{
|
{
|
||||||
args: []string{"help"},
|
args: []string{"help"},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/help.txt",
|
out: "testdata/help.txt",
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
args: []string{"-h"},
|
args: []string{"-h"},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/help-flag.txt",
|
out: "testdata/help-flag.txt",
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
descr: "empty",
|
descr: "empty",
|
||||||
args: []string{},
|
args: []string{},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/autohelp.txt",
|
out: "testdata/autohelp.txt",
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
descr: "invalid/processor",
|
descr: "invalid/processor",
|
||||||
args: []string{"abc"},
|
args: []string{"abc"},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/non-existent-processor.txt",
|
out: "testdata/non-existent-processor.txt",
|
||||||
err: `invalid argument "abc" for "driverkit"`,
|
err: `invalid argument "abc" for "driverkit"`,
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -69,9 +81,8 @@ var tests = []testCase{
|
||||||
"wrong",
|
"wrong",
|
||||||
},
|
},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/invalid-proxyconfig.txt",
|
out: "testdata/invalid-proxyconfig.txt",
|
||||||
err: "exiting for validation errors",
|
err: "exiting for validation errors",
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -99,9 +110,8 @@ var tests = []testCase{
|
||||||
descr: "docker/empty",
|
descr: "docker/empty",
|
||||||
args: []string{"docker"},
|
args: []string{"docker"},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
err: "exiting for validation errors",
|
err: "exiting for validation errors",
|
||||||
out: "testdata/dockernoopts.txt",
|
out: "testdata/dockernoopts.txt",
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -120,12 +130,13 @@ var tests = []testCase{
|
||||||
"ubuntu-aws",
|
"ubuntu-aws",
|
||||||
"--output-module",
|
"--output-module",
|
||||||
"/tmp/falco-ubuntu-aws.ko",
|
"/tmp/falco-ubuntu-aws.ko",
|
||||||
|
"--output-probe",
|
||||||
|
"/tmp/falco-ubuntu-aws.o",
|
||||||
"--loglevel",
|
"--loglevel",
|
||||||
"debug",
|
"debug",
|
||||||
},
|
},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/docker-with-flags-debug.txt",
|
out: "testdata/docker-with-flags-debug.txt",
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -133,6 +144,7 @@ var tests = []testCase{
|
||||||
env: map[string]string{
|
env: map[string]string{
|
||||||
"DRIVERKIT_KERNELVERSION": "59",
|
"DRIVERKIT_KERNELVERSION": "59",
|
||||||
"DRIVERKIT_OUTPUT_MODULE": "/tmp/falco-ubuntu-aws.ko",
|
"DRIVERKIT_OUTPUT_MODULE": "/tmp/falco-ubuntu-aws.ko",
|
||||||
|
"DRIVERKIT_OUTPUT_PROBE": "/tmp/falco-ubuntu-aws.o",
|
||||||
},
|
},
|
||||||
args: []string{
|
args: []string{
|
||||||
"docker",
|
"docker",
|
||||||
|
@ -148,8 +160,7 @@ var tests = []testCase{
|
||||||
"debug",
|
"debug",
|
||||||
},
|
},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/docker-with-flags-debug.txt",
|
out: "testdata/docker-with-flags-debug.txt",
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -162,24 +173,22 @@ var tests = []testCase{
|
||||||
"debug",
|
"debug",
|
||||||
},
|
},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/docker-from-config-debug.txt",
|
out: "testdata/docker-from-config-debug.txt",
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
descr: "docker/from-config-file-using-urls",
|
descr: "docker/from-config-file-using-urls",
|
||||||
args: []string{
|
args: []string{
|
||||||
"docker",
|
"docker",
|
||||||
"-c",
|
"-c",
|
||||||
"testdata/configs/2.yaml",
|
"testdata/configs/2.yaml",
|
||||||
"--loglevel",
|
"--loglevel",
|
||||||
"debug",
|
"debug",
|
||||||
},
|
},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/docker-override-urls-from-config-debug.txt",
|
out: "testdata/docker-override-urls-from-config-debug.txt",
|
||||||
fmtRuntimeArch: true,
|
},
|
||||||
},
|
},
|
||||||
},
|
|
||||||
{
|
{
|
||||||
descr: "docker/override-from-config-file",
|
descr: "docker/override-from-config-file",
|
||||||
env: map[string]string{
|
env: map[string]string{
|
||||||
|
@ -194,53 +203,50 @@ var tests = []testCase{
|
||||||
"debug",
|
"debug",
|
||||||
},
|
},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/docker-override-from-config-debug.txt",
|
out: "testdata/docker-override-from-config-debug.txt",
|
||||||
fmtRuntimeArch: true,
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
descr: "docker/build-related-target-azure",
|
descr: "docker/build-related-target-azure",
|
||||||
args: []string{
|
args: []string{
|
||||||
"docker",
|
"docker",
|
||||||
"--kernelrelease",
|
"--kernelrelease",
|
||||||
"4.15.0-1057-azure",
|
"4.15.0-1057-azure",
|
||||||
"--kernelversion",
|
"--kernelversion",
|
||||||
"62",
|
"62",
|
||||||
"--kernelurls",
|
"--kernelurls",
|
||||||
"http://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-azure/linux-azure-headers-4.15.0-1057_4.15.0-1057.62_all.deb",
|
"http://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-azure/linux-azure-headers-4.15.0-1057_4.15.0-1057.62_all.deb",
|
||||||
"--kernelurls",
|
"--kernelurls",
|
||||||
"http://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-azure/linux-headers-4.15.0-1057-azure_4.15.0-1057.62_amd64.deb",
|
"http://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-azure/linux-headers-4.15.0-1057-azure_4.15.0-1057.62_amd64.deb",
|
||||||
"--target",
|
"--target",
|
||||||
"ubuntu-aws",
|
"ubuntu-azure",
|
||||||
"--output-module",
|
"--output-module",
|
||||||
"/tmp/falco-ubuntu-azure.ko",
|
"/tmp/falco-ubuntu-azure.ko",
|
||||||
"--loglevel",
|
"--loglevel",
|
||||||
"debug",
|
"debug",
|
||||||
},
|
},
|
||||||
expect: expect{
|
expect: expect{
|
||||||
out: "testdata/docker-related-target-debug.txt",
|
out: "testdata/docker-related-target-debug.txt",
|
||||||
fmtRuntimeArch: true,
|
},
|
||||||
},
|
},
|
||||||
},
|
{
|
||||||
{
|
descr: "docker/build-target-check-validation-redhat",
|
||||||
descr: "docker/build-target-check-validation-redhat",
|
args: []string{
|
||||||
args: []string{
|
"docker",
|
||||||
"docker",
|
"--kernelrelease",
|
||||||
"--kernelrelease",
|
"4.18.0-348.el8.x86_64",
|
||||||
"4.18.0-348.el8.x86_64",
|
"--target",
|
||||||
"--target",
|
"redhat",
|
||||||
"redhat",
|
"--output-module",
|
||||||
"--output-module",
|
"/tmp/falco-redhat.ko",
|
||||||
"/tmp/falco-redhat.ko",
|
"--loglevel",
|
||||||
"--loglevel",
|
"debug",
|
||||||
"debug",
|
},
|
||||||
},
|
expect: expect{
|
||||||
expect: expect{
|
out: "testdata/docker-target-redhat-validation-error-debug.txt",
|
||||||
out: "testdata/docker-target-redhat-validation-error-debug.txt",
|
err: "exiting for validation errors",
|
||||||
err: "exiting for validation errors",
|
},
|
||||||
fmtRuntimeArch: true,
|
},
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
descr: "complete/docker/targets",
|
descr: "complete/docker/targets",
|
||||||
args: []string{
|
args: []string{
|
||||||
|
@ -310,9 +316,14 @@ var tests = []testCase{
|
||||||
|
|
||||||
func run(t *testing.T, test testCase) {
|
func run(t *testing.T, test testCase) {
|
||||||
// Setup
|
// Setup
|
||||||
c := NewRootCmd()
|
configOpts, err := NewConfigOptions()
|
||||||
b := bytes.NewBufferString("")
|
assert.NilError(t, err)
|
||||||
c.SetOutput(b)
|
rootOpts, err := NewRootOptions()
|
||||||
|
assert.NilError(t, err)
|
||||||
|
var buf bytes.Buffer
|
||||||
|
configOpts.setOutput(&buf, true)
|
||||||
|
c := NewRootCmd(configOpts, rootOpts)
|
||||||
|
c.SetOutput(&buf)
|
||||||
if len(test.args) == 0 || (test.args[0] != "__complete" && test.args[0] != "__completeNoDesc" && test.args[0] != "help" && test.args[0] != "completion") {
|
if len(test.args) == 0 || (test.args[0] != "__complete" && test.args[0] != "__completeNoDesc" && test.args[0] != "help" && test.args[0] != "completion") {
|
||||||
test.args = append(test.args, "--dryrun")
|
test.args = append(test.args, "--dryrun")
|
||||||
}
|
}
|
||||||
|
@ -323,19 +334,18 @@ func run(t *testing.T, test testCase) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// Test
|
// Test
|
||||||
err := c.Execute()
|
err = c.Execute()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
if test.expect.err == "" {
|
if test.expect.err == "" {
|
||||||
t.Fatalf("error executing CLI: %v", err)
|
t.Fatalf("error executing CLI: %v", err)
|
||||||
} else {
|
} else {
|
||||||
assert.Error(t, err, test.expect.err)
|
assert.Error(t, err, test.expect.err)
|
||||||
}
|
}
|
||||||
|
// Exactly same behavior as rootCmd.Start(), but here we use ERROR instead of FATAL to avoid leaving
|
||||||
|
configOpts.Printer.Logger.Error("error executing driverkit", configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
}
|
}
|
||||||
out, err := ioutil.ReadAll(b)
|
out := buf.String()
|
||||||
if err != nil {
|
res := stripansi.Strip(out)
|
||||||
t.Fatalf("error reading CLI output: %v", err)
|
|
||||||
}
|
|
||||||
res := stripansi.Strip(string(out))
|
|
||||||
assert.Equal(t, test.expect.out, res)
|
assert.Equal(t, test.expect.out, res)
|
||||||
// Teardown
|
// Teardown
|
||||||
for k := range test.env {
|
for k := range test.env {
|
||||||
|
@ -345,6 +355,81 @@ func run(t *testing.T, test testCase) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Simple explanation:
|
||||||
|
// basically we leverage text.template to execute templates for test data.
|
||||||
|
// testTemplateData is the actual template structure used to fill the test requested output.
|
||||||
|
// It internally stores all the help text, split in section { Desc, Usage, Commands, Flags, Info }
|
||||||
|
// plus the flagsTemplateData (that is the template data used to fill Flags fields basically).
|
||||||
|
type testTemplateData struct {
|
||||||
|
Desc string
|
||||||
|
Usage string
|
||||||
|
Commands string
|
||||||
|
Flags string
|
||||||
|
Info string
|
||||||
|
flagsTemplateData
|
||||||
|
}
|
||||||
|
|
||||||
|
func readTemplateFile(t *testing.T, s string) string {
|
||||||
|
out, err := os.ReadFile("testdata/templates/" + s)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
return string(out)
|
||||||
|
}
|
||||||
|
|
||||||
|
func initTestTemplateData(t *testing.T, args []string) testTemplateData {
|
||||||
|
td := initFlagsTemplateData(args)
|
||||||
|
return testTemplateData{
|
||||||
|
Usage: readTemplateFile(t, "usage.txt"),
|
||||||
|
Commands: readTemplateFile(t, "commands.txt"),
|
||||||
|
Flags: runTemplate(t, readTemplateFile(t, "flags.txt"), td),
|
||||||
|
Desc: readTemplateFile(t, "desc.txt"),
|
||||||
|
Info: readTemplateFile(t, "info.txt"),
|
||||||
|
flagsTemplateData: td,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type flagsTemplateData struct {
|
||||||
|
Targets string
|
||||||
|
CurrentArch string
|
||||||
|
Architectures string
|
||||||
|
TargetsVerticalList string
|
||||||
|
|
||||||
|
// It is the subcmd being called, ie: driverkit (root) or docker,kubernetes.
|
||||||
|
// It is automatically fetched by args passed to each test case
|
||||||
|
Cmd string
|
||||||
|
}
|
||||||
|
|
||||||
|
func initFlagsTemplateData(args []string) flagsTemplateData {
|
||||||
|
targets := builder.Targets()
|
||||||
|
sort.Strings(targets)
|
||||||
|
|
||||||
|
cmd := "driverkit"
|
||||||
|
if len(args) > 0 {
|
||||||
|
if args[0] == "docker" {
|
||||||
|
cmd = "docker"
|
||||||
|
} else if args[0] == "kubernetes" {
|
||||||
|
cmd = "kubernetes"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return flagsTemplateData{
|
||||||
|
Targets: "[" + strings.Join(targets, ",") + "]",
|
||||||
|
CurrentArch: runtime.GOARCH,
|
||||||
|
Architectures: kernelrelease.SupportedArchs.String(),
|
||||||
|
TargetsVerticalList: strings.Join(targets, "\n"),
|
||||||
|
Cmd: cmd,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func runTemplate(t *testing.T, f string, td interface{}) string {
|
||||||
|
tplate := template.New("test")
|
||||||
|
parsed, err := tplate.Parse(f)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
buf := bytes.NewBuffer(nil)
|
||||||
|
err = parsed.Execute(buf, td)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
return buf.String()
|
||||||
|
}
|
||||||
|
|
||||||
func TestCLI(t *testing.T) {
|
func TestCLI(t *testing.T) {
|
||||||
for _, test := range tests {
|
for _, test := range tests {
|
||||||
descr := test.descr
|
descr := test.descr
|
||||||
|
@ -355,15 +440,12 @@ func TestCLI(t *testing.T) {
|
||||||
test.descr = strings.TrimSuffix(filepath.Base(test.expect.out), ".txt")
|
test.descr = strings.TrimSuffix(filepath.Base(test.expect.out), ".txt")
|
||||||
}
|
}
|
||||||
if test.expect.out != "" {
|
if test.expect.out != "" {
|
||||||
out, err := ioutil.ReadFile(test.expect.out)
|
out, err := os.ReadFile(test.expect.out)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("output fixture not found: %v", err)
|
t.Fatalf("output fixture not found: %v", err)
|
||||||
}
|
}
|
||||||
if !test.expect.fmtRuntimeArch {
|
td := initTestTemplateData(t, test.args)
|
||||||
test.expect.out = string(out)
|
test.expect.out = runTemplate(t, string(out), td)
|
||||||
} else {
|
|
||||||
test.expect.out = fmt.Sprintf(string(out), runtime.GOARCH)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
t.Run(test.descr, func(t *testing.T) {
|
t.Run(test.descr, func(t *testing.T) {
|
||||||
|
|
|
@ -1,8 +1,23 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package cmd
|
package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"github.com/spf13/pflag"
|
||||||
"os"
|
"os"
|
||||||
"strings"
|
"strings"
|
||||||
"text/template"
|
"text/template"
|
||||||
|
@ -32,12 +47,12 @@ func validateArgs() cobra.PositionalArgs {
|
||||||
if len(args) == 0 {
|
if len(args) == 0 {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
return cobra.ExactValidArgs(1)(c, args)
|
return cobra.MatchAll(cobra.ExactArgs(1), cobra.OnlyValidArgs)(c, args)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCompletionCmd ...
|
// NewCompletionCmd ...
|
||||||
func NewCompletionCmd() *cobra.Command {
|
func NewCompletionCmd(_ *ConfigOptions, _ *RootOptions, _ *pflag.FlagSet) *cobra.Command {
|
||||||
var long bytes.Buffer
|
var long bytes.Buffer
|
||||||
tmpl := template.Must(template.New("long").Parse(longUsageTemplate))
|
tmpl := template.Must(template.New("long").Parse(longUsageTemplate))
|
||||||
tmpl.Execute(&long, map[string]interface{}{
|
tmpl.Execute(&long, map[string]interface{}{
|
||||||
|
@ -51,25 +66,23 @@ func NewCompletionCmd() *cobra.Command {
|
||||||
Args: validateArgs(),
|
Args: validateArgs(),
|
||||||
ValidArgs: cmdArgs,
|
ValidArgs: cmdArgs,
|
||||||
DisableAutoGenTag: true,
|
DisableAutoGenTag: true,
|
||||||
Run: func(c *cobra.Command, args []string) {
|
RunE: func(c *cobra.Command, args []string) error {
|
||||||
if len(args) == 0 {
|
if len(args) == 0 {
|
||||||
c.Help()
|
return c.Help()
|
||||||
return
|
|
||||||
}
|
}
|
||||||
|
|
||||||
arg := args[0]
|
arg := args[0]
|
||||||
switch arg {
|
switch arg {
|
||||||
case "bash":
|
case "bash":
|
||||||
c.Root().GenBashCompletion(os.Stdout)
|
return c.Root().GenBashCompletion(os.Stdout)
|
||||||
break
|
|
||||||
case "zsh":
|
case "zsh":
|
||||||
c.Root().GenZshCompletion(os.Stdout)
|
return c.Root().GenZshCompletion(os.Stdout)
|
||||||
break
|
|
||||||
case "fish":
|
case "fish":
|
||||||
c.Root().GenFishCompletion(os.Stdout, true)
|
return c.Root().GenFishCompletion(os.Stdout, true)
|
||||||
case "help":
|
case "help":
|
||||||
c.Help()
|
return c.Help()
|
||||||
}
|
}
|
||||||
|
return nil
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,49 +1,155 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package cmd
|
package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"errors"
|
||||||
|
"github.com/falcosecurity/falcoctl/pkg/output"
|
||||||
|
"github.com/mitchellh/go-homedir"
|
||||||
|
"github.com/spf13/pflag"
|
||||||
|
"github.com/spf13/viper"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"github.com/creasty/defaults"
|
"github.com/creasty/defaults"
|
||||||
"github.com/falcosecurity/driverkit/validate"
|
"github.com/falcosecurity/driverkit/validate"
|
||||||
"github.com/go-playground/validator/v10"
|
"github.com/go-playground/validator/v10"
|
||||||
logger "github.com/sirupsen/logrus"
|
"github.com/pterm/pterm"
|
||||||
)
|
)
|
||||||
|
|
||||||
var validProcessors = []string{"docker", "kubernetes"}
|
var validProcessors = []string{"docker", "kubernetes", "kubernetes-in-cluster", "local"}
|
||||||
var aliasProcessors = []string{"docker", "k8s"}
|
var aliasProcessors = []string{"docker", "k8s", "k8s-ic"}
|
||||||
var configOptions *ConfigOptions
|
|
||||||
|
|
||||||
// ConfigOptions represent the persistent configuration flags of driverkit.
|
// ConfigOptions represent the persistent configuration flags of driverkit.
|
||||||
type ConfigOptions struct {
|
type ConfigOptions struct {
|
||||||
ConfigFile string
|
configFile string
|
||||||
LogLevel string `validate:"logrus" name:"log level" default:"info"`
|
|
||||||
Timeout int `validate:"number,min=30" default:"120" name:"timeout"`
|
Timeout int `validate:"number,min=30" default:"120" name:"timeout"`
|
||||||
ProxyURL string `validate:"omitempty,proxy" name:"proxy url"`
|
ProxyURL string `validate:"omitempty,proxy" name:"proxy url"`
|
||||||
DryRun bool
|
dryRun bool
|
||||||
|
|
||||||
configErrors bool
|
// Printer used by all commands to output messages.
|
||||||
|
Printer *output.Printer
|
||||||
|
// writer is used to write the output of the printer.
|
||||||
|
writer io.Writer
|
||||||
|
logLevel *output.LogLevel
|
||||||
|
disableStyling bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func (co *ConfigOptions) initPrinter() {
|
||||||
|
// DisableStyling is only enforced by tests.
|
||||||
|
if co.disableStyling {
|
||||||
|
pterm.DisableStyling()
|
||||||
|
}
|
||||||
|
co.Printer = output.NewPrinter(co.logLevel.ToPtermLogLevel(), pterm.LogFormatterColorful, co.writer)
|
||||||
|
if co.disableStyling {
|
||||||
|
// Disable time print for tests
|
||||||
|
co.Printer.Logger = co.Printer.Logger.WithTime(false)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Called by tests to disable styling and set bytes buffer as output
|
||||||
|
func (co *ConfigOptions) setOutput(writer io.Writer, disableStyling bool) {
|
||||||
|
co.writer = writer
|
||||||
|
co.disableStyling = disableStyling
|
||||||
|
co.initPrinter()
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewConfigOptions creates an instance of ConfigOptions.
|
// NewConfigOptions creates an instance of ConfigOptions.
|
||||||
func NewConfigOptions() *ConfigOptions {
|
func NewConfigOptions() (*ConfigOptions, error) {
|
||||||
o := &ConfigOptions{}
|
o := &ConfigOptions{
|
||||||
if err := defaults.Set(o); err != nil {
|
writer: os.Stdout,
|
||||||
logger.WithError(err).WithField("options", "ConfigOptions").Fatal("error setting driverkit options defaults")
|
logLevel: output.NewLogLevel(),
|
||||||
|
disableStyling: false,
|
||||||
}
|
}
|
||||||
return o
|
o.initPrinter()
|
||||||
|
if err := defaults.Set(o); err != nil {
|
||||||
|
// Return ConfigOptions anyway because we need the logger
|
||||||
|
return o, err
|
||||||
|
}
|
||||||
|
return o, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Validate validates the ConfigOptions fields.
|
// Validate validates the ConfigOptions fields.
|
||||||
func (co *ConfigOptions) Validate() []error {
|
func (co *ConfigOptions) validate() []error {
|
||||||
if err := validate.V.Struct(co); err != nil {
|
if err := validate.V.Struct(co); err != nil {
|
||||||
errors := err.(validator.ValidationErrors)
|
var errs validator.ValidationErrors
|
||||||
errArr := []error{}
|
errors.As(err, &errs)
|
||||||
for _, e := range errors {
|
var errArr []error
|
||||||
|
for _, e := range errs {
|
||||||
// Translate each error one at a time
|
// Translate each error one at a time
|
||||||
errArr = append(errArr, fmt.Errorf(e.Translate(validate.T)))
|
errArr = append(errArr, errors.New(e.Translate(validate.T)))
|
||||||
}
|
}
|
||||||
co.configErrors = true
|
|
||||||
return errArr
|
return errArr
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// AddFlags registers the common flags.
|
||||||
|
func (co *ConfigOptions) AddFlags(flags *pflag.FlagSet) {
|
||||||
|
flags.StringVarP(&co.configFile, "config", "c", co.configFile, "config file path (default $HOME/.driverkit.yaml if exists)")
|
||||||
|
flags.VarP(co.logLevel, "loglevel", "l", "set level for logs "+co.logLevel.Allowed())
|
||||||
|
flags.IntVar(&co.Timeout, "timeout", co.Timeout, "timeout in seconds")
|
||||||
|
flags.StringVar(&co.ProxyURL, "proxy", co.ProxyURL, "the proxy to use to download data")
|
||||||
|
flags.BoolVar(&co.dryRun, "dryrun", co.dryRun, "do not actually perform the action")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Init reads in config file and ENV variables if set.
|
||||||
|
func (co *ConfigOptions) Init() bool {
|
||||||
|
configErr := false
|
||||||
|
if errs := co.validate(); errs != nil {
|
||||||
|
for _, err := range errs {
|
||||||
|
co.Printer.Logger.Error("error validating config options",
|
||||||
|
co.Printer.Logger.Args("err", err.Error()))
|
||||||
|
}
|
||||||
|
configErr = true
|
||||||
|
}
|
||||||
|
if co.configFile != "" {
|
||||||
|
viper.SetConfigFile(co.configFile)
|
||||||
|
} else {
|
||||||
|
// Find home directory.
|
||||||
|
home, err := homedir.Dir()
|
||||||
|
if err != nil {
|
||||||
|
co.Printer.Logger.Error("error getting the home directory",
|
||||||
|
co.Printer.Logger.Args("err", err.Error()))
|
||||||
|
// not setting configErr = true because we fallback to `$HOME/.driverkit.yaml` and try with it
|
||||||
|
}
|
||||||
|
|
||||||
|
viper.AddConfigPath(home)
|
||||||
|
viper.SetConfigName(".driverkit")
|
||||||
|
}
|
||||||
|
|
||||||
|
viper.AutomaticEnv()
|
||||||
|
viper.SetEnvPrefix("driverkit")
|
||||||
|
viper.SetEnvKeyReplacer(strings.NewReplacer("-", "_"))
|
||||||
|
|
||||||
|
// If a config file is found, read it in.
|
||||||
|
err := viper.ReadInConfig()
|
||||||
|
// Init printer with either read or existent one,
|
||||||
|
// so that we can further log considering log level set.
|
||||||
|
co.initPrinter()
|
||||||
|
if err == nil {
|
||||||
|
co.Printer.Logger.Info("using config file",
|
||||||
|
co.Printer.Logger.Args("file", viper.ConfigFileUsed()))
|
||||||
|
} else {
|
||||||
|
var configFileNotFoundError viper.ConfigFileNotFoundError
|
||||||
|
if errors.As(err, &configFileNotFoundError) {
|
||||||
|
// Config file not found, ignore ...
|
||||||
|
co.Printer.Logger.Debug("running without a configuration file")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return configErr
|
||||||
|
}
|
||||||
|
|
|
@ -1,25 +1,56 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package cmd
|
package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"github.com/falcosecurity/driverkit/pkg/driverbuilder"
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder"
|
||||||
logger "github.com/sirupsen/logrus"
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
"github.com/spf13/pflag"
|
"github.com/spf13/pflag"
|
||||||
"github.com/spf13/viper"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// NewDockerCmd creates the `driverkit docker` command.
|
// NewDockerCmd creates the `driverkit docker` command.
|
||||||
func NewDockerCmd(rootOpts *RootOptions, rootFlags *pflag.FlagSet) *cobra.Command {
|
func NewDockerCmd(configOpts *ConfigOptions, rootOpts *RootOptions, rootFlags *pflag.FlagSet) *cobra.Command {
|
||||||
dockerCmd := &cobra.Command{
|
dockerCmd := &cobra.Command{
|
||||||
Use: "docker",
|
Use: "docker",
|
||||||
Short: "Build Falco kernel modules and eBPF probes against a docker daemon.",
|
Short: "Build Falco kernel modules and eBPF probes against a docker daemon.",
|
||||||
Run: func(c *cobra.Command, args []string) {
|
RunE: func(c *cobra.Command, args []string) error {
|
||||||
logger.WithField("processor", c.Name()).Info("driver building, it will take a few seconds")
|
configOpts.Printer.Logger.Info("starting build",
|
||||||
if !configOptions.DryRun {
|
configOpts.Printer.Logger.Args("processor", c.Name()))
|
||||||
if err := driverbuilder.NewDockerBuildProcessor(viper.GetInt("timeout"), viper.GetString("proxy")).Start(rootOpts.toBuild()); err != nil {
|
if !configOpts.dryRun {
|
||||||
logger.WithError(err).Fatal("exiting")
|
if !rootOpts.Output.HasOutputs() {
|
||||||
|
configOpts.Printer.Logger.Info("no output specified")
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
// Since we use a spinner, cache log data to a bytesbuffer;
|
||||||
|
// we will later print it once we stop the spinner.
|
||||||
|
var b *builder.Build
|
||||||
|
if configOpts.disableStyling {
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer)
|
||||||
|
} else {
|
||||||
|
var buf bytes.Buffer
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer.WithWriter(&buf))
|
||||||
|
configOpts.Printer.Spinner, _ = configOpts.Printer.Spinner.Start("driver building, it will take a few seconds")
|
||||||
|
defer func() {
|
||||||
|
configOpts.Printer.DefaultText.Print(buf.String())
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return driverbuilder.NewDockerBuildProcessor(configOpts.Timeout, configOpts.ProxyURL).Start(b)
|
||||||
}
|
}
|
||||||
|
return nil
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
// Add root flags
|
// Add root flags
|
||||||
|
|
|
@ -0,0 +1,74 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/olekukonko/tablewriter"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
"github.com/spf13/pflag"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NewImagesCmd creates the `driverkit images` command.
|
||||||
|
func NewImagesCmd(configOpts *ConfigOptions, rootOpts *RootOptions, rootFlags *pflag.FlagSet) *cobra.Command {
|
||||||
|
imagesCmd := &cobra.Command{
|
||||||
|
Use: "images",
|
||||||
|
Short: "List builder images",
|
||||||
|
RunE: func(c *cobra.Command, args []string) error {
|
||||||
|
configOpts.Printer.Logger.Info("starting loading images",
|
||||||
|
configOpts.Printer.Logger.Args("processor", c.Name()))
|
||||||
|
// Since we use a spinner, cache log data to a bytesbuffer;
|
||||||
|
// we will later print it once we stop the spinner.
|
||||||
|
var (
|
||||||
|
buf bytes.Buffer
|
||||||
|
b *builder.Build
|
||||||
|
)
|
||||||
|
if configOpts.disableStyling {
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer)
|
||||||
|
} else {
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer.WithWriter(&buf))
|
||||||
|
configOpts.Printer.Spinner, _ = configOpts.Printer.Spinner.Start("listing images, it will take a few seconds")
|
||||||
|
}
|
||||||
|
b.LoadImages()
|
||||||
|
if !configOpts.disableStyling {
|
||||||
|
_ = configOpts.Printer.Spinner.Stop()
|
||||||
|
configOpts.Printer.DefaultText.Print(buf.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
table := tablewriter.NewWriter(os.Stdout)
|
||||||
|
table.SetHeader([]string{"Image", "Target", "Arch", "GCC"})
|
||||||
|
table.SetBorders(tablewriter.Border{Left: true, Top: false, Right: true, Bottom: false})
|
||||||
|
table.SetCenterSeparator("|")
|
||||||
|
|
||||||
|
for _, img := range b.Images {
|
||||||
|
data := make([]string, 4)
|
||||||
|
data[0] = img.Name
|
||||||
|
data[1] = img.Target.String()
|
||||||
|
data[2] = b.Architecture
|
||||||
|
data[3] = img.GCCVersion.String()
|
||||||
|
table.Append(data)
|
||||||
|
}
|
||||||
|
table.Render() // Send output
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
// Add root flags
|
||||||
|
imagesCmd.PersistentFlags().AddFlagSet(rootFlags)
|
||||||
|
|
||||||
|
return imagesCmd
|
||||||
|
}
|
|
@ -1,20 +1,34 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package cmd
|
package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
||||||
"regexp"
|
"regexp"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/falcosecurity/driverkit/pkg/driverbuilder"
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder"
|
||||||
"github.com/falcosecurity/driverkit/pkg/kubernetes/factory"
|
"github.com/falcosecurity/driverkit/pkg/kubernetes/factory"
|
||||||
logger "github.com/sirupsen/logrus"
|
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
"github.com/spf13/pflag"
|
"github.com/spf13/pflag"
|
||||||
"github.com/spf13/viper"
|
|
||||||
"k8s.io/cli-runtime/pkg/genericclioptions"
|
"k8s.io/cli-runtime/pkg/genericclioptions"
|
||||||
)
|
)
|
||||||
|
|
||||||
// NewKubernetesCmd creates the `driverkit kubernetes` command.
|
// NewKubernetesCmd creates the `driverkit kubernetes` command.
|
||||||
func NewKubernetesCmd(rootOpts *RootOptions, rootFlags *pflag.FlagSet) *cobra.Command {
|
func NewKubernetesCmd(configOpts *ConfigOptions, rootOpts *RootOptions, rootFlags *pflag.FlagSet) *cobra.Command {
|
||||||
kubernetesCmd := &cobra.Command{
|
kubernetesCmd := &cobra.Command{
|
||||||
Use: "kubernetes",
|
Use: "kubernetes",
|
||||||
Short: "Build Falco kernel modules and eBPF probes against a Kubernetes cluster.",
|
Short: "Build Falco kernel modules and eBPF probes against a Kubernetes cluster.",
|
||||||
|
@ -34,35 +48,48 @@ func NewKubernetesCmd(rootOpts *RootOptions, rootFlags *pflag.FlagSet) *cobra.Co
|
||||||
f.Usage = upperAfterPointRegexp.ReplaceAllString(f.Usage, ", ${1}")
|
f.Usage = upperAfterPointRegexp.ReplaceAllString(f.Usage, ", ${1}")
|
||||||
f.Usage = upperAfterCommaRegexp.ReplaceAllStringFunc(f.Usage, strings.ToLower)
|
f.Usage = upperAfterCommaRegexp.ReplaceAllStringFunc(f.Usage, strings.ToLower)
|
||||||
})
|
})
|
||||||
|
// Add Kubernetes pods options flags
|
||||||
|
flags := kubernetesCmd.Flags()
|
||||||
|
addKubernetesFlags(flags)
|
||||||
|
kubernetesCmd.PersistentFlags().AddFlagSet(flags)
|
||||||
// Add root flags
|
// Add root flags
|
||||||
kubernetesCmd.PersistentFlags().AddFlagSet(rootFlags)
|
kubernetesCmd.PersistentFlags().AddFlagSet(rootFlags)
|
||||||
|
|
||||||
kubefactory := factory.NewFactory(configFlags)
|
kubefactory := factory.NewFactory(configFlags)
|
||||||
|
|
||||||
kubernetesCmd.Run = func(cmd *cobra.Command, args []string) {
|
kubernetesCmd.RunE = func(c *cobra.Command, args []string) error {
|
||||||
logger.WithField("processor", cmd.Name()).Info("driver building, it will take a few seconds")
|
configOpts.Printer.Logger.Info("starting build",
|
||||||
if !configOptions.DryRun {
|
configOpts.Printer.Logger.Args("processor", c.Name()))
|
||||||
if err := kubernetesRun(cmd, args, kubefactory, rootOpts); err != nil {
|
if !configOpts.dryRun {
|
||||||
logger.WithError(err).Fatal("exiting")
|
if !rootOpts.Output.HasOutputs() {
|
||||||
|
configOpts.Printer.Logger.Info("no output specified")
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
// Since we use a spinner, cache log data to a bytesbuffer;
|
||||||
|
// we will later print it once we stop the spinner.
|
||||||
|
var b *builder.Build
|
||||||
|
if configOpts.disableStyling {
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer)
|
||||||
|
} else {
|
||||||
|
var buf bytes.Buffer
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer.WithWriter(&buf))
|
||||||
|
configOpts.Printer.Spinner, _ = configOpts.Printer.Spinner.Start("driver building, it will take a few seconds")
|
||||||
|
defer func() {
|
||||||
|
configOpts.Printer.DefaultText.Print(buf.String())
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return kubernetesRun(kubefactory, b, configOpts)
|
||||||
}
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
return kubernetesCmd
|
return kubernetesCmd
|
||||||
}
|
}
|
||||||
|
|
||||||
func kubernetesRun(cmd *cobra.Command, args []string, kubefactory factory.Factory, rootOpts *RootOptions) error {
|
func kubernetesRun(kubefactory factory.Factory,
|
||||||
f := cmd.Flags()
|
b *builder.Build,
|
||||||
b := rootOpts.toBuild()
|
configOpts *ConfigOptions,
|
||||||
|
) error {
|
||||||
namespaceStr, err := f.GetString("namespace")
|
|
||||||
if err != nil {
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
if len(namespaceStr) == 0 {
|
|
||||||
namespaceStr = "default"
|
|
||||||
}
|
|
||||||
|
|
||||||
kc, err := kubefactory.KubernetesClientSet()
|
kc, err := kubefactory.KubernetesClientSet()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -75,7 +102,12 @@ func kubernetesRun(cmd *cobra.Command, args []string, kubefactory factory.Factor
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
buildProcessor := driverbuilder.NewKubernetesBuildProcessor(kc.CoreV1(), clientConfig, namespaceStr, viper.GetInt("timeout"), viper.GetString("proxy"))
|
buildProcessor := driverbuilder.NewKubernetesBuildProcessor(kc.CoreV1(),
|
||||||
|
clientConfig,
|
||||||
|
kubernetesOptions.RunAsUser,
|
||||||
|
kubernetesOptions.Namespace,
|
||||||
|
kubernetesOptions.ImagePullSecret,
|
||||||
|
configOpts.Timeout,
|
||||||
|
configOpts.ProxyURL)
|
||||||
return buildProcessor.Start(b)
|
return buildProcessor.Start(b)
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,94 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kubernetes/factory"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
"github.com/spf13/pflag"
|
||||||
|
"k8s.io/client-go/kubernetes"
|
||||||
|
"k8s.io/client-go/rest"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NewKubernetesInClusterCmd creates the `driverkit kubernetes` command.
|
||||||
|
func NewKubernetesInClusterCmd(configOpts *ConfigOptions, rootOpts *RootOptions, rootFlags *pflag.FlagSet) *cobra.Command {
|
||||||
|
kubernetesInClusterCmd := &cobra.Command{
|
||||||
|
Use: "kubernetes-in-cluster",
|
||||||
|
Short: "Build Falco kernel modules and eBPF probes against a Kubernetes cluster inside a Kubernetes cluster.",
|
||||||
|
Aliases: []string{"k8s-ic"},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Add Kubernetes pods options flags
|
||||||
|
flags := kubernetesInClusterCmd.Flags()
|
||||||
|
addKubernetesFlags(flags)
|
||||||
|
kubernetesInClusterCmd.PersistentFlags().AddFlagSet(flags)
|
||||||
|
// Add root flags
|
||||||
|
kubernetesInClusterCmd.PersistentFlags().AddFlagSet(rootFlags)
|
||||||
|
|
||||||
|
kubernetesInClusterCmd.RunE = func(c *cobra.Command, args []string) error {
|
||||||
|
configOpts.Printer.Logger.Info("starting build",
|
||||||
|
configOpts.Printer.Logger.Args("processor", c.Name()))
|
||||||
|
if !configOpts.dryRun {
|
||||||
|
if !rootOpts.Output.HasOutputs() {
|
||||||
|
configOpts.Printer.Logger.Info("no output specified")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// Since we use a spinner, cache log data to a bytesbuffer;
|
||||||
|
// we will later print it once we stop the spinner.
|
||||||
|
var b *builder.Build
|
||||||
|
if configOpts.disableStyling {
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer)
|
||||||
|
} else {
|
||||||
|
var buf bytes.Buffer
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer.WithWriter(&buf))
|
||||||
|
configOpts.Printer.Spinner, _ = configOpts.Printer.Spinner.Start("driver building, it will take a few seconds")
|
||||||
|
defer func() {
|
||||||
|
configOpts.Printer.DefaultText.Print(buf.String())
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return kubernetesInClusterRun(b, configOpts)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return kubernetesInClusterCmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func kubernetesInClusterRun(b *builder.Build, configOpts *ConfigOptions) error {
|
||||||
|
kubeConfig, err := rest.InClusterConfig()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err = factory.SetKubernetesDefaults(kubeConfig); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
kc, err := kubernetes.NewForConfig(kubeConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
buildProcessor := driverbuilder.NewKubernetesBuildProcessor(kc.CoreV1(),
|
||||||
|
kubeConfig,
|
||||||
|
kubernetesOptions.RunAsUser,
|
||||||
|
kubernetesOptions.Namespace,
|
||||||
|
kubernetesOptions.ImagePullSecret,
|
||||||
|
configOpts.Timeout,
|
||||||
|
configOpts.ProxyURL)
|
||||||
|
return buildProcessor.Start(b)
|
||||||
|
}
|
|
@ -0,0 +1,31 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package cmd
|
||||||
|
|
||||||
|
import flag "github.com/spf13/pflag"
|
||||||
|
|
||||||
|
var kubernetesOptions = &KubeOptions{}
|
||||||
|
|
||||||
|
type KubeOptions struct {
|
||||||
|
RunAsUser int64 `json:"runAsUser,omitempty" protobuf:"varint,2,opt,name=runAsUser" default:"0"`
|
||||||
|
Namespace string `validate:"required" name:"namespace" default:"default"`
|
||||||
|
ImagePullSecret string `validate:"omitempty" name:"image-pull-secret" default:""`
|
||||||
|
}
|
||||||
|
|
||||||
|
func addKubernetesFlags(flags *flag.FlagSet) {
|
||||||
|
flags.StringVarP(&kubernetesOptions.Namespace, "namespace", "n", "default", "If present, the namespace scope for the pods and its config ")
|
||||||
|
flags.Int64Var(&kubernetesOptions.RunAsUser, "run-as-user", 0, "Pods runner user")
|
||||||
|
flags.StringVar(&kubernetesOptions.ImagePullSecret, "image-pull-secret", "", "ImagePullSecret")
|
||||||
|
}
|
|
@ -0,0 +1,81 @@
|
||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
"github.com/spf13/pflag"
|
||||||
|
)
|
||||||
|
|
||||||
|
type localCmdOptions struct {
|
||||||
|
useDKMS bool
|
||||||
|
downloadHeaders bool
|
||||||
|
srcDir string
|
||||||
|
envMap map[string]string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewLocalCmd creates the `driverkit local` command.
|
||||||
|
func NewLocalCmd(configOpts *ConfigOptions, rootOpts *RootOptions, rootFlags *pflag.FlagSet) *cobra.Command {
|
||||||
|
opts := localCmdOptions{}
|
||||||
|
localCmd := &cobra.Command{
|
||||||
|
Use: "local",
|
||||||
|
Short: "Build Falco kernel modules and eBPF probes in local env with local kernel sources and gcc/clang.",
|
||||||
|
RunE: func(c *cobra.Command, args []string) error {
|
||||||
|
configOpts.Printer.Logger.Info("starting build",
|
||||||
|
configOpts.Printer.Logger.Args("processor", c.Name()))
|
||||||
|
if !configOpts.dryRun {
|
||||||
|
if !rootOpts.Output.HasOutputs() {
|
||||||
|
configOpts.Printer.Logger.Info("no output specified")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// Since we use a spinner, cache log data to a bytesbuffer;
|
||||||
|
// we will later print it once we stop the spinner.
|
||||||
|
var b *builder.Build
|
||||||
|
if configOpts.disableStyling {
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer)
|
||||||
|
} else {
|
||||||
|
var buf bytes.Buffer
|
||||||
|
b = rootOpts.ToBuild(configOpts.Printer.WithWriter(&buf))
|
||||||
|
configOpts.Printer.Spinner, _ = configOpts.Printer.Spinner.Start("driver building, it will take a few seconds")
|
||||||
|
defer func() {
|
||||||
|
configOpts.Printer.DefaultText.Print(buf.String())
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
return driverbuilder.NewLocalBuildProcessor(opts.useDKMS,
|
||||||
|
opts.downloadHeaders,
|
||||||
|
false,
|
||||||
|
opts.srcDir,
|
||||||
|
opts.envMap,
|
||||||
|
configOpts.Timeout).Start(b)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
// Add root flags, but not the ones unneeded
|
||||||
|
unusedFlagsSet := map[string]struct{}{
|
||||||
|
"architecture": {},
|
||||||
|
"kernelurls": {},
|
||||||
|
"builderrepo": {},
|
||||||
|
"builderimage": {},
|
||||||
|
"gccversion": {},
|
||||||
|
"kernelconfigdata": {},
|
||||||
|
"proxy": {},
|
||||||
|
"registry-name": {},
|
||||||
|
"registry-password": {},
|
||||||
|
"registry-plain-http": {},
|
||||||
|
"registry-user": {},
|
||||||
|
}
|
||||||
|
flagSet := pflag.NewFlagSet("local", pflag.ExitOnError)
|
||||||
|
rootFlags.VisitAll(func(flag *pflag.Flag) {
|
||||||
|
if _, ok := unusedFlagsSet[flag.Name]; !ok {
|
||||||
|
flagSet.AddFlag(flag)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
flagSet.BoolVar(&opts.useDKMS, "dkms", false, "Enforce usage of DKMS to build the kernel module.")
|
||||||
|
flagSet.BoolVar(&opts.downloadHeaders, "download-headers", false, "Try to automatically download kernel headers.")
|
||||||
|
flagSet.StringVar(&opts.srcDir, "src-dir", "", "Enforce usage of local source dir to build drivers.")
|
||||||
|
flagSet.StringToStringVar(&opts.envMap, "env", make(map[string]string), "Env variables to be enforced during the driver build.")
|
||||||
|
localCmd.PersistentFlags().AddFlagSet(flagSet)
|
||||||
|
return localCmd
|
||||||
|
}
|
233
cmd/root.go
233
cmd/root.go
|
@ -1,28 +1,43 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package cmd
|
package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"os"
|
"os"
|
||||||
"runtime"
|
|
||||||
"sort"
|
"sort"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
"github.com/falcosecurity/driverkit/pkg/version"
|
"github.com/falcosecurity/driverkit/pkg/version"
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
"github.com/spf13/pflag"
|
"github.com/spf13/pflag"
|
||||||
|
|
||||||
homedir "github.com/mitchellh/go-homedir"
|
|
||||||
logger "github.com/sirupsen/logrus"
|
|
||||||
"github.com/spf13/viper"
|
"github.com/spf13/viper"
|
||||||
)
|
)
|
||||||
|
|
||||||
func persistentValidateFunc(rootCommand *RootCmd, rootOpts *RootOptions) func(c *cobra.Command, args []string) error {
|
func persistentValidateFunc(rootCommand *RootCmd, configOpts *ConfigOptions, rootOpts *RootOptions) func(c *cobra.Command, args []string) error {
|
||||||
return func(c *cobra.Command, args []string) error {
|
return func(c *cobra.Command, args []string) error {
|
||||||
|
var validationError = errors.New("exiting for validation errors")
|
||||||
|
configErr := configOpts.Init()
|
||||||
// Early exit if detect some error into config flags
|
// Early exit if detect some error into config flags
|
||||||
if configOptions.configErrors {
|
if configErr {
|
||||||
return fmt.Errorf("exiting for validation errors")
|
return validationError
|
||||||
}
|
}
|
||||||
// Merge environment variables or config file values into the RootOptions instance
|
// Merge environment variables or config file values into the RootOptions instance
|
||||||
skip := map[string]bool{ // do not merge these
|
skip := map[string]bool{ // do not merge these
|
||||||
|
@ -37,34 +52,34 @@ func persistentValidateFunc(rootCommand *RootCmd, rootOpts *RootOptions) func(c
|
||||||
"output-probe": "output.probe",
|
"output-probe": "output.probe",
|
||||||
}
|
}
|
||||||
rootCommand.c.Flags().VisitAll(func(f *pflag.Flag) {
|
rootCommand.c.Flags().VisitAll(func(f *pflag.Flag) {
|
||||||
if name := f.Name; !skip[name] {
|
if name := f.Name; !skip[name] {
|
||||||
if name == "kernelurls" {
|
if name == "kernelurls" {
|
||||||
// Slice types need special treatment when used as flags. If we call 'Set(name, value)',
|
// Slice types need special treatment when used as flags. If we call 'Set(name, value)',
|
||||||
// rather than replace, it appends. Since viper will already have the cli options set
|
// rather than replace, it appends. Since viper will already have the cli options set
|
||||||
// if supplied, we only need this step if rootCommand doesn't already have them e.g.
|
// if supplied, we only need this step if rootCommand doesn't already have them e.g.
|
||||||
// not set on CLI so read from config.
|
// not set on CLI so read from config.
|
||||||
if cli_urls, err := rootCommand.c.Flags().GetStringSlice(name); err == nil && len(cli_urls) != 0 {
|
if cliURLs, err := rootCommand.c.Flags().GetStringSlice(name); err == nil && len(cliURLs) != 0 {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
value := viper.GetStringSlice(name)
|
value := viper.GetStringSlice(name)
|
||||||
if len(value) != 0 {
|
if len(value) != 0 {
|
||||||
strValue := strings.Join(value, ",")
|
strValue := strings.Join(value, ",")
|
||||||
rootCommand.c.Flags().Set(name, strValue)
|
_ = rootCommand.c.Flags().Set(name, strValue)
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
value := viper.GetString(name)
|
value := viper.GetString(name)
|
||||||
if value == "" {
|
if value == "" {
|
||||||
// fallback to nested options in config file, if any
|
// fallback to nested options in config file, if any
|
||||||
if nestedName, ok := nested[name]; ok {
|
if nestedName, ok := nested[name]; ok {
|
||||||
value = viper.GetString(nestedName)
|
value = viper.GetString(nestedName)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// set the value, if any, otherwise let the default
|
// set the value, if any, otherwise let the default
|
||||||
if value != "" {
|
if value != "" {
|
||||||
rootCommand.c.Flags().Set(name, value)
|
_ = rootCommand.c.Flags().Set(name, value)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
// Avoid sensitive info into default values help line
|
// Avoid sensitive info into default values help line
|
||||||
|
@ -74,11 +89,12 @@ func persistentValidateFunc(rootCommand *RootCmd, rootOpts *RootOptions) func(c
|
||||||
if c.Root() != c && c.Name() != "help" && c.Name() != "__complete" && c.Name() != "__completeNoDesc" && c.Name() != "completion" {
|
if c.Root() != c && c.Name() != "help" && c.Name() != "__complete" && c.Name() != "__completeNoDesc" && c.Name() != "completion" {
|
||||||
if errs := rootOpts.Validate(); errs != nil {
|
if errs := rootOpts.Validate(); errs != nil {
|
||||||
for _, err := range errs {
|
for _, err := range errs {
|
||||||
logger.WithError(err).Error("error validating build options")
|
configOpts.Printer.Logger.Error("error validating build options",
|
||||||
|
configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
}
|
}
|
||||||
return fmt.Errorf("exiting for validation errors")
|
return validationError
|
||||||
}
|
}
|
||||||
rootOpts.Log()
|
rootOpts.Log(configOpts.Printer)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -90,9 +106,7 @@ type RootCmd struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewRootCmd instantiates the root command.
|
// NewRootCmd instantiates the root command.
|
||||||
func NewRootCmd() *RootCmd {
|
func NewRootCmd(configOpts *ConfigOptions, rootOpts *RootOptions) *RootCmd {
|
||||||
configOptions = NewConfigOptions()
|
|
||||||
rootOpts := NewRootOptions()
|
|
||||||
rootCmd := &cobra.Command{
|
rootCmd := &cobra.Command{
|
||||||
Use: "driverkit",
|
Use: "driverkit",
|
||||||
Short: "A command line tool to build Falco kernel modules and eBPF probes.",
|
Short: "A command line tool to build Falco kernel modules and eBPF probes.",
|
||||||
|
@ -101,56 +115,51 @@ func NewRootCmd() *RootCmd {
|
||||||
Args: cobra.OnlyValidArgs,
|
Args: cobra.OnlyValidArgs,
|
||||||
DisableFlagsInUseLine: true,
|
DisableFlagsInUseLine: true,
|
||||||
DisableAutoGenTag: true,
|
DisableAutoGenTag: true,
|
||||||
|
SilenceErrors: true,
|
||||||
|
SilenceUsage: true,
|
||||||
Version: version.String(),
|
Version: version.String(),
|
||||||
Run: func(c *cobra.Command, args []string) {
|
RunE: func(c *cobra.Command, args []string) error {
|
||||||
if len(args) == 0 {
|
if len(args) == 0 {
|
||||||
logger.WithField("processors", validProcessors).Info("specify a valid processor")
|
configOpts.Printer.Logger.Info("specify a valid processor", configOpts.Printer.Logger.Args("processors", validProcessors))
|
||||||
}
|
}
|
||||||
// Fallback to help
|
// Fallback to help
|
||||||
c.Help()
|
return c.Help()
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
ret := &RootCmd{
|
ret := &RootCmd{
|
||||||
c: rootCmd,
|
c: rootCmd,
|
||||||
}
|
}
|
||||||
|
|
||||||
rootCmd.PersistentPreRunE = persistentValidateFunc(ret, rootOpts)
|
rootCmd.PersistentPreRunE = persistentValidateFunc(ret, configOpts, rootOpts)
|
||||||
|
|
||||||
flags := rootCmd.Flags()
|
flags := rootCmd.Flags()
|
||||||
|
|
||||||
flags.StringVarP(&configOptions.ConfigFile, "config", "c", configOptions.ConfigFile, "config file path (default $HOME/.driverkit.yaml if exists)")
|
targets := builder.Targets()
|
||||||
flags.StringVarP(&configOptions.LogLevel, "loglevel", "l", configOptions.LogLevel, "log level")
|
sort.Strings(targets)
|
||||||
flags.IntVar(&configOptions.Timeout, "timeout", configOptions.Timeout, "timeout in seconds")
|
|
||||||
flags.BoolVar(&configOptions.DryRun, "dryrun", configOptions.DryRun, "do not actually perform the action")
|
|
||||||
flags.StringVar(&configOptions.ProxyURL, "proxy", configOptions.ProxyURL, "the proxy to use to download data")
|
|
||||||
|
|
||||||
flags.StringVar(&rootOpts.Output.Module, "output-module", rootOpts.Output.Module, "filepath where to save the resulting kernel module")
|
configOpts.AddFlags(flags)
|
||||||
flags.StringVar(&rootOpts.Output.Probe, "output-probe", rootOpts.Output.Probe, "filepath where to save the resulting eBPF probe")
|
rootOpts.AddFlags(flags, targets)
|
||||||
flags.StringVar(&rootOpts.Architecture, "architecture", runtime.GOARCH, "target architecture for the built driver")
|
|
||||||
flags.StringVar(&rootOpts.DriverVersion, "driverversion", rootOpts.DriverVersion, "driver version as a git commit hash or as a git tag")
|
|
||||||
flags.Uint16Var(&rootOpts.KernelVersion, "kernelversion", rootOpts.KernelVersion, "kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v'")
|
|
||||||
flags.StringVar(&rootOpts.KernelRelease, "kernelrelease", rootOpts.KernelRelease, "kernel release to build the module for, it can be found by executing 'uname -v'")
|
|
||||||
flags.StringVarP(&rootOpts.Target, "target", "t", rootOpts.Target, "the system to target the build for")
|
|
||||||
flags.StringVar(&rootOpts.KernelConfigData, "kernelconfigdata", rootOpts.KernelConfigData, "base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc")
|
|
||||||
flags.StringVar(&rootOpts.ModuleDeviceName, "moduledevicename", rootOpts.ModuleDeviceName, "kernel module device name (the default is falco, so the device will be under /dev/falco*)")
|
|
||||||
flags.StringVar(&rootOpts.ModuleDriverName, "moduledrivername", rootOpts.ModuleDriverName, "kernel module driver name, i.e. the name you see when you check installed modules via lsmod")
|
|
||||||
flags.StringVar(&rootOpts.BuilderImage, "builderimage", rootOpts.BuilderImage, "docker image to be used to build the kernel module and eBPF probe. If not provided, the default image will be used.")
|
|
||||||
flags.StringSliceVar(&rootOpts.KernelUrls, "kernelurls", nil, "list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls \"<URL3>,<URL4>\")")
|
|
||||||
|
|
||||||
viper.BindPFlags(flags)
|
if err := viper.BindPFlags(flags); err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
// Flag annotations and custom completions
|
// Flag annotations and custom completions
|
||||||
rootCmd.MarkFlagFilename("config", viper.SupportedExts...)
|
_ = rootCmd.MarkFlagFilename("config", viper.SupportedExts...)
|
||||||
rootCmd.RegisterFlagCompletionFunc("target", func(c *cobra.Command, args []string, toComplete string) ([]string, cobra.ShellCompDirective) {
|
_ = rootCmd.RegisterFlagCompletionFunc("target", func(c *cobra.Command, args []string, toComplete string) ([]string, cobra.ShellCompDirective) {
|
||||||
targets := builder.BuilderByTarget.Targets()
|
|
||||||
sort.Strings(targets)
|
|
||||||
return targets, cobra.ShellCompDirectiveDefault
|
return targets, cobra.ShellCompDirectiveDefault
|
||||||
})
|
})
|
||||||
|
_ = rootCmd.RegisterFlagCompletionFunc("architecture", func(c *cobra.Command, args []string, toComplete string) ([]string, cobra.ShellCompDirective) {
|
||||||
|
return kernelrelease.SupportedArchs.Strings(), cobra.ShellCompDirectiveDefault
|
||||||
|
})
|
||||||
|
|
||||||
// Subcommands
|
// Subcommands
|
||||||
rootCmd.AddCommand(NewKubernetesCmd(rootOpts, flags))
|
rootCmd.AddCommand(NewKubernetesCmd(configOpts, rootOpts, flags))
|
||||||
rootCmd.AddCommand(NewDockerCmd(rootOpts, flags))
|
rootCmd.AddCommand(NewKubernetesInClusterCmd(configOpts, rootOpts, flags))
|
||||||
rootCmd.AddCommand(NewCompletionCmd())
|
rootCmd.AddCommand(NewDockerCmd(configOpts, rootOpts, flags))
|
||||||
|
rootCmd.AddCommand(NewLocalCmd(configOpts, rootOpts, flags))
|
||||||
|
rootCmd.AddCommand(NewImagesCmd(configOpts, rootOpts, flags))
|
||||||
|
rootCmd.AddCommand(NewCompletionCmd(configOpts, rootOpts, flags))
|
||||||
|
|
||||||
ret.StripSensitive()
|
ret.StripSensitive()
|
||||||
|
|
||||||
|
@ -179,16 +188,15 @@ func (r *RootCmd) Command() *cobra.Command {
|
||||||
return r.c
|
return r.c
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// SetArgs proxies the arguments to the underlying cobra.Command.
|
||||||
|
func (r *RootCmd) SetArgs(args []string) {
|
||||||
|
r.c.SetArgs(args)
|
||||||
|
}
|
||||||
|
|
||||||
// SetOutput sets the main command output writer.
|
// SetOutput sets the main command output writer.
|
||||||
func (r *RootCmd) SetOutput(w io.Writer) {
|
func (r *RootCmd) SetOutput(w io.Writer) {
|
||||||
r.c.SetOut(w)
|
r.c.SetOut(w)
|
||||||
r.c.SetErr(w)
|
r.c.SetErr(w)
|
||||||
logger.SetOutput(w)
|
|
||||||
}
|
|
||||||
|
|
||||||
// SetArgs proxies the arguments to the underlying cobra.Command.
|
|
||||||
func (r *RootCmd) SetArgs(args []string) {
|
|
||||||
r.c.SetArgs(args)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Execute proxies the cobra.Command execution.
|
// Execute proxies the cobra.Command execution.
|
||||||
|
@ -198,59 +206,30 @@ func (r *RootCmd) Execute() error {
|
||||||
|
|
||||||
// Start creates the root command and runs it.
|
// Start creates the root command and runs it.
|
||||||
func Start() {
|
func Start() {
|
||||||
root := NewRootCmd()
|
configOpts, err := NewConfigOptions()
|
||||||
if err := root.Execute(); err != nil {
|
if err != nil {
|
||||||
logger.WithError(err).Fatal("error executing driverkit")
|
// configOpts will never be nil here
|
||||||
}
|
if configOpts != nil {
|
||||||
}
|
configOpts.Printer.Logger.Fatal("error setting driverkit config options defaults",
|
||||||
|
configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
func init() {
|
|
||||||
logger.SetFormatter(&logger.TextFormatter{
|
|
||||||
ForceColors: true,
|
|
||||||
DisableLevelTruncation: false,
|
|
||||||
DisableTimestamp: true,
|
|
||||||
})
|
|
||||||
|
|
||||||
cobra.OnInitialize(initConfig)
|
|
||||||
}
|
|
||||||
|
|
||||||
// initConfig reads in config file and ENV variables if set.
|
|
||||||
func initConfig() {
|
|
||||||
if errs := configOptions.Validate(); errs != nil {
|
|
||||||
for _, err := range errs {
|
|
||||||
logger.WithError(err).Error("error validating config options")
|
|
||||||
}
|
|
||||||
// configOptions.configErrors should be true here
|
|
||||||
}
|
|
||||||
if configOptions.ConfigFile != "" {
|
|
||||||
viper.SetConfigFile(configOptions.ConfigFile)
|
|
||||||
} else {
|
|
||||||
// Find home directory.
|
|
||||||
home, err := homedir.Dir()
|
|
||||||
if err != nil {
|
|
||||||
logger.WithError(err).Debug("error getting the home directory")
|
|
||||||
// not setting configOptions.configErrors = true because we fallback to `$HOME/.driverkit.yaml` and try with it
|
|
||||||
}
|
|
||||||
|
|
||||||
viper.AddConfigPath(home)
|
|
||||||
viper.SetConfigName(".driverkit")
|
|
||||||
}
|
|
||||||
|
|
||||||
viper.AutomaticEnv()
|
|
||||||
viper.SetEnvPrefix("driverkit")
|
|
||||||
viper.SetEnvKeyReplacer(strings.NewReplacer("-", "_"))
|
|
||||||
|
|
||||||
// If a config file is found, read it in.
|
|
||||||
if err := viper.ReadInConfig(); err == nil {
|
|
||||||
logger.WithField("file", viper.ConfigFileUsed()).Info("using config file")
|
|
||||||
} else {
|
|
||||||
if _, ok := err.(viper.ConfigFileNotFoundError); ok {
|
|
||||||
// Config file not found, ignore ...
|
|
||||||
logger.Debug("running without a configuration file")
|
|
||||||
} else {
|
} else {
|
||||||
// Config file was found but another error was produced
|
os.Exit(1)
|
||||||
logger.WithField("file", viper.ConfigFileUsed()).WithError(err).Debug("error running with config file")
|
|
||||||
configOptions.configErrors = true
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
rootOpts, err := NewRootOptions()
|
||||||
|
if err != nil {
|
||||||
|
configOpts.Printer.Logger.Fatal("error setting driverkit root options defaults",
|
||||||
|
configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cleanup spinner upon leaving if any
|
||||||
|
defer func() {
|
||||||
|
if configOpts.Printer.Spinner != nil {
|
||||||
|
_ = configOpts.Printer.Spinner.Stop()
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
root := NewRootCmd(configOpts, rootOpts)
|
||||||
|
if err = root.Execute(); err != nil {
|
||||||
|
configOpts.Printer.Logger.Fatal("error executing driverkit", configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,13 +1,32 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package cmd
|
package cmd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"errors"
|
||||||
|
"github.com/falcosecurity/falcoctl/pkg/output"
|
||||||
|
"github.com/spf13/pflag"
|
||||||
|
"os"
|
||||||
|
"runtime"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"github.com/creasty/defaults"
|
"github.com/creasty/defaults"
|
||||||
"github.com/falcosecurity/driverkit/pkg/driverbuilder"
|
|
||||||
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
"github.com/falcosecurity/driverkit/pkg/driverbuilder/builder"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
"github.com/falcosecurity/driverkit/validate"
|
"github.com/falcosecurity/driverkit/validate"
|
||||||
"github.com/go-playground/validator/v10"
|
"github.com/go-playground/validator/v10"
|
||||||
logger "github.com/sirupsen/logrus"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// OutputOptions wraps the two drivers that driverkit builds.
|
// OutputOptions wraps the two drivers that driverkit builds.
|
||||||
|
@ -16,106 +35,186 @@ type OutputOptions struct {
|
||||||
Probe string `validate:"required_without=Module,filepath,omitempty,endswith=.o" name:"output probe path"`
|
Probe string `validate:"required_without=Module,filepath,omitempty,endswith=.o" name:"output probe path"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (oo *OutputOptions) HasOutputs() bool {
|
||||||
|
return oo.Module != "" || oo.Probe != ""
|
||||||
|
}
|
||||||
|
|
||||||
|
type RepoOptions struct {
|
||||||
|
Org string `default:"falcosecurity" name:"organization name"`
|
||||||
|
Name string `default:"libs" name:"repo name"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type Registry struct {
|
||||||
|
Name string `validate:"required_with=Username Password" name:"registry name"`
|
||||||
|
Username string `validate:"required_with=Registry Password" name:"registry username"`
|
||||||
|
Password string `validate:"required_with=Username Registry" name:"registry password"`
|
||||||
|
PlainHTTP bool `default:"false" name:"registry plain http"`
|
||||||
|
}
|
||||||
|
|
||||||
// RootOptions ...
|
// RootOptions ...
|
||||||
type RootOptions struct {
|
type RootOptions struct {
|
||||||
Architecture string `validate:"required,oneof=amd64 arm64" name:"architecture"`
|
Architecture string `validate:"required,architecture" name:"architecture"`
|
||||||
DriverVersion string `default:"master" validate:"eq=master|sha1|semver" name:"driver version"`
|
DriverVersion string `default:"master" validate:"eq=master|sha1|semver" name:"driver version"`
|
||||||
KernelVersion uint16 `default:"1" validate:"omitempty,number" name:"kernel version"`
|
KernelVersion string `default:"1" validate:"omitempty" name:"kernel version"`
|
||||||
ModuleDriverName string `default:"falco" validate:"max=60" name:"kernel module driver name"`
|
ModuleDriverName string `default:"falco" validate:"max=60" name:"kernel module driver name"`
|
||||||
ModuleDeviceName string `default:"falco" validate:"excludes=/,max=255" name:"kernel module device name"`
|
ModuleDeviceName string `default:"falco" validate:"excludes=/,max=255" name:"kernel module device name"`
|
||||||
KernelRelease string `validate:"required,ascii" name:"kernel release"`
|
KernelRelease string `validate:"required,ascii" name:"kernel release"`
|
||||||
Target string `validate:"required,target" name:"target"`
|
Target string `validate:"required,target" name:"target"`
|
||||||
KernelConfigData string `validate:"omitempty,base64" name:"kernel config data"` // fixme > tag "name" does not seem to work when used at struct level, but works when used at inner level
|
KernelConfigData string `validate:"omitempty,base64" name:"kernel config data"` // fixme > tag "name" does not seem to work when used at struct level, but works when used at inner level
|
||||||
BuilderImage string `validate:"imagename" name:"builder image"`
|
BuilderImage string `validate:"omitempty,imagename" name:"builder image"`
|
||||||
|
BuilderRepos []string `default:"[\"docker.io/falcosecurity/driverkit-builder\"]" validate:"omitempty" name:"docker repositories to look for builder images or absolute path pointing to a yaml file containing builder images index"`
|
||||||
|
GCCVersion string `validate:"omitempty,semvertolerant" name:"gcc version"`
|
||||||
KernelUrls []string `name:"kernel header urls"`
|
KernelUrls []string `name:"kernel header urls"`
|
||||||
|
Repo RepoOptions
|
||||||
Output OutputOptions
|
Output OutputOptions
|
||||||
|
Registry Registry
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
validate.V.RegisterStructValidation(RootOptionsLevelValidation, RootOptions{})
|
validate.V.RegisterStructValidation(RootOptionsLevelValidation, RootOptions{})
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ro *RootOptions) SetDefaults() {
|
|
||||||
if defaults.CanUpdate(ro.BuilderImage) {
|
|
||||||
ro.BuilderImage = driverbuilder.BuilderBaseImage
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewRootOptions ...
|
// NewRootOptions ...
|
||||||
func NewRootOptions() *RootOptions {
|
func NewRootOptions() (*RootOptions, error) {
|
||||||
rootOpts := &RootOptions{}
|
rootOpts := &RootOptions{}
|
||||||
if err := defaults.Set(rootOpts); err != nil {
|
if err := defaults.Set(rootOpts); err != nil {
|
||||||
logger.WithError(err).WithField("options", "RootOptions").Fatal("error setting driverkit options defaults")
|
return nil, err
|
||||||
}
|
}
|
||||||
return rootOpts
|
return rootOpts, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Validate validates the RootOptions fields.
|
// Validate validates the RootOptions fields.
|
||||||
func (ro *RootOptions) Validate() []error {
|
func (ro *RootOptions) Validate() []error {
|
||||||
if err := validate.V.Struct(ro); err != nil {
|
if err := validate.V.Struct(ro); err != nil {
|
||||||
errors := err.(validator.ValidationErrors)
|
var errs validator.ValidationErrors
|
||||||
|
errors.As(err, &errs)
|
||||||
errArr := []error{}
|
errArr := []error{}
|
||||||
for _, e := range errors {
|
for _, e := range errs {
|
||||||
// Translate each error one at a time
|
// Translate each error one at a time
|
||||||
errArr = append(errArr, fmt.Errorf(e.Translate(validate.T)))
|
errArr = append(errArr, errors.New(e.Translate(validate.T)))
|
||||||
}
|
}
|
||||||
return errArr
|
return errArr
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// check that the kernel versions supports at least one of probe and module
|
||||||
|
kr := kernelrelease.FromString(ro.KernelRelease)
|
||||||
|
kr.Architecture = kernelrelease.Architecture(ro.Architecture)
|
||||||
|
if !kr.SupportsModule() && !kr.SupportsProbe() {
|
||||||
|
return []error{errors.New("both module and probe are not supported by given options")}
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (ro *RootOptions) AddFlags(flags *pflag.FlagSet, targets []string) {
|
||||||
|
flags.StringVar(&ro.Output.Module, "output-module", ro.Output.Module, "filepath where to save the resulting kernel module")
|
||||||
|
flags.StringVar(&ro.Output.Probe, "output-probe", ro.Output.Probe, "filepath where to save the resulting eBPF probe")
|
||||||
|
flags.StringVar(&ro.Architecture, "architecture", runtime.GOARCH, "target architecture for the built driver, one of "+kernelrelease.SupportedArchs.String())
|
||||||
|
flags.StringVar(&ro.DriverVersion, "driverversion", ro.DriverVersion, "driver version as a git commit hash or as a git tag")
|
||||||
|
flags.StringVar(&ro.KernelVersion, "kernelversion", ro.KernelVersion, "kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v'")
|
||||||
|
flags.StringVar(&ro.KernelRelease, "kernelrelease", ro.KernelRelease, "kernel release to build the module for, it can be found by executing 'uname -v'")
|
||||||
|
flags.StringVarP(&ro.Target, "target", "t", ro.Target, "the system to target the build for, one of ["+strings.Join(targets, ",")+"]")
|
||||||
|
flags.StringVar(&ro.KernelConfigData, "kernelconfigdata", ro.KernelConfigData, "base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc")
|
||||||
|
flags.StringVar(&ro.ModuleDeviceName, "moduledevicename", ro.ModuleDeviceName, "kernel module device name (the default is falco, so the device will be under /dev/falco*)")
|
||||||
|
flags.StringVar(&ro.ModuleDriverName, "moduledrivername", ro.ModuleDriverName, "kernel module driver name, i.e. the name you see when you check installed modules via lsmod")
|
||||||
|
flags.StringVar(&ro.BuilderImage, "builderimage", ro.BuilderImage, "docker image to be used to build the kernel module and eBPF probe. If not provided, an automatically selected image will be used.")
|
||||||
|
flags.StringSliceVar(&ro.BuilderRepos, "builderrepo", ro.BuilderRepos, "list of docker repositories or yaml file (absolute path) containing builder images index with the format 'images: [ { target:<target>, name:<image-name>, arch: <arch>, tag: <imagetag>, gcc_versions: [ <gcc-tag> ] },...]', in descending priority order. Used to search for builder images. eg: --builderrepo myorg/driverkit-builder --builderrepo falcosecurity/driverkit-builder --builderrepo '/path/to/my/index.yaml'.")
|
||||||
|
flags.StringVar(&ro.GCCVersion, "gccversion", ro.GCCVersion, "enforce a specific gcc version for the build")
|
||||||
|
|
||||||
|
flags.StringSliceVar(&ro.KernelUrls, "kernelurls", nil, "list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls \"<URL3>,<URL4>\")")
|
||||||
|
|
||||||
|
flags.StringVar(&ro.Repo.Org, "repo-org", ro.Repo.Org, "repository github organization")
|
||||||
|
flags.StringVar(&ro.Repo.Name, "repo-name", ro.Repo.Name, "repository github name")
|
||||||
|
|
||||||
|
flags.StringVar(&ro.Registry.Name, "registry-name", ro.Registry.Name, "registry name to which authenticate")
|
||||||
|
flags.StringVar(&ro.Registry.Username, "registry-user", ro.Registry.Username, "registry username")
|
||||||
|
flags.StringVar(&ro.Registry.Password, "registry-password", ro.Registry.Password, "registry password")
|
||||||
|
flags.BoolVar(&ro.Registry.PlainHTTP, "registry-plain-http", ro.Registry.PlainHTTP, "allows interacting with remote registry via plain http requests")
|
||||||
|
}
|
||||||
|
|
||||||
// Log emits a log line containing the receiving RootOptions for debugging purposes.
|
// Log emits a log line containing the receiving RootOptions for debugging purposes.
|
||||||
//
|
//
|
||||||
// Call it only after validation.
|
// Call it only after validation.
|
||||||
func (ro *RootOptions) Log() {
|
func (ro *RootOptions) Log(printer *output.Printer) {
|
||||||
fields := logger.Fields{}
|
printer.Logger.Debug("running with options",
|
||||||
if ro.Output.Module != "" {
|
printer.Logger.Args(
|
||||||
fields["output-module"] = ro.Output.Module
|
"output-module", ro.Output.Module,
|
||||||
}
|
"output-probe", ro.Output.Probe,
|
||||||
if ro.Output.Probe != "" {
|
"driverversion", ro.DriverVersion,
|
||||||
fields["output-probe"] = ro.Output.Probe
|
"kernelrelease", ro.KernelRelease,
|
||||||
|
"kernelversion", ro.KernelVersion,
|
||||||
}
|
"target", ro.Target,
|
||||||
if ro.DriverVersion != "" {
|
"arch", ro.Architecture,
|
||||||
fields["driverversion"] = ro.DriverVersion
|
"kernelurls", ro.KernelUrls,
|
||||||
}
|
"repo-org", ro.Repo.Org,
|
||||||
if ro.KernelRelease != "" {
|
"repo-name", ro.Repo.Name,
|
||||||
fields["kernelrelease"] = ro.KernelRelease
|
))
|
||||||
}
|
|
||||||
if ro.KernelVersion > 0 {
|
|
||||||
fields["kernelversion"] = ro.KernelVersion
|
|
||||||
}
|
|
||||||
if ro.Target != "" {
|
|
||||||
fields["target"] = ro.Target
|
|
||||||
}
|
|
||||||
fields["arch"] = ro.Architecture
|
|
||||||
if len(ro.KernelUrls) > 0 {
|
|
||||||
fields["kernelurls"] = ro.KernelUrls
|
|
||||||
}
|
|
||||||
|
|
||||||
logger.WithFields(fields).Debug("running with options")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ro *RootOptions) toBuild() *builder.Build {
|
func (ro *RootOptions) ToBuild(printer *output.Printer) *builder.Build {
|
||||||
kernelConfigData := ro.KernelConfigData
|
kernelConfigData := ro.KernelConfigData
|
||||||
if len(kernelConfigData) == 0 {
|
if len(kernelConfigData) == 0 {
|
||||||
kernelConfigData = "bm8tZGF0YQ==" // no-data
|
kernelConfigData = "bm8tZGF0YQ==" // no-data
|
||||||
}
|
}
|
||||||
|
|
||||||
return &builder.Build{
|
build := &builder.Build{
|
||||||
TargetType: builder.Type(ro.Target),
|
TargetType: builder.Type(ro.Target),
|
||||||
DriverVersion: ro.DriverVersion,
|
DriverVersion: ro.DriverVersion,
|
||||||
KernelVersion: ro.KernelVersion,
|
KernelVersion: ro.KernelVersion,
|
||||||
KernelRelease: ro.KernelRelease,
|
KernelRelease: ro.KernelRelease,
|
||||||
Architecture: ro.Architecture,
|
Architecture: ro.Architecture,
|
||||||
KernelConfigData: kernelConfigData,
|
KernelConfigData: kernelConfigData,
|
||||||
ModuleFilePath: ro.Output.Module,
|
ModuleFilePath: ro.Output.Module,
|
||||||
ProbeFilePath: ro.Output.Probe,
|
ProbeFilePath: ro.Output.Probe,
|
||||||
ModuleDriverName: ro.ModuleDriverName,
|
ModuleDriverName: ro.ModuleDriverName,
|
||||||
ModuleDeviceName: ro.ModuleDeviceName,
|
ModuleDeviceName: ro.ModuleDeviceName,
|
||||||
CustomBuilderImage: ro.BuilderImage,
|
GCCVersion: ro.GCCVersion,
|
||||||
KernelUrls: ro.KernelUrls,
|
BuilderImage: ro.BuilderImage,
|
||||||
|
BuilderRepos: ro.BuilderRepos,
|
||||||
|
KernelUrls: ro.KernelUrls,
|
||||||
|
RepoOrg: ro.Repo.Org,
|
||||||
|
RepoName: ro.Repo.Name,
|
||||||
|
Images: make(builder.ImagesMap),
|
||||||
|
RegistryName: ro.Registry.Name,
|
||||||
|
RegistryUser: ro.Registry.Username,
|
||||||
|
RegistryPassword: ro.Registry.Password,
|
||||||
|
RegistryPlainHTTP: ro.Registry.PlainHTTP,
|
||||||
|
Printer: printer,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// loop over BuilderRepos to build the list ImagesListers based on the value of the builderRepo:
|
||||||
|
// if it's a local path use FileImagesLister, otherwise use RepoImagesLister
|
||||||
|
var (
|
||||||
|
imageLister builder.ImagesLister
|
||||||
|
err error
|
||||||
|
)
|
||||||
|
for _, builderRepo := range build.BuilderRepos {
|
||||||
|
if _, err = os.Stat(builderRepo); err == nil {
|
||||||
|
imageLister, err = builder.NewFileImagesLister(builderRepo, build)
|
||||||
|
} else {
|
||||||
|
imageLister, err = builder.NewRepoImagesLister(builderRepo, build)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
printer.Logger.Warn("skipping repo",
|
||||||
|
printer.Logger.Args("repo", builderRepo, "err", err.Error()))
|
||||||
|
} else {
|
||||||
|
build.ImagesListers = append(build.ImagesListers, imageLister)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// attempt the build in case it comes from an invalid config
|
||||||
|
kr := build.KernelReleaseFromBuildConfig()
|
||||||
|
if len(build.ModuleFilePath) > 0 && !kr.SupportsModule() {
|
||||||
|
build.ModuleFilePath = ""
|
||||||
|
printer.Logger.Warn("skipping build attempt of module for unsupported kernel release",
|
||||||
|
printer.Logger.Args("kernelrelease", kr.String()))
|
||||||
|
}
|
||||||
|
if len(build.ProbeFilePath) > 0 && !kr.SupportsProbe() {
|
||||||
|
build.ProbeFilePath = ""
|
||||||
|
printer.Logger.Warn("skipping build attempt of probe for unsupported kernel release",
|
||||||
|
printer.Logger.Args("kernelrelease", kr.String()))
|
||||||
|
}
|
||||||
|
return build
|
||||||
}
|
}
|
||||||
|
|
||||||
// RootOptionsLevelValidation validates KernelConfigData and Target at the same time.
|
// RootOptionsLevelValidation validates KernelConfigData and Target at the same time.
|
||||||
|
@ -124,16 +223,20 @@ func (ro *RootOptions) toBuild() *builder.Build {
|
||||||
func RootOptionsLevelValidation(level validator.StructLevel) {
|
func RootOptionsLevelValidation(level validator.StructLevel) {
|
||||||
opts := level.Current().Interface().(RootOptions)
|
opts := level.Current().Interface().(RootOptions)
|
||||||
|
|
||||||
if len(opts.KernelConfigData) == 0 && opts.Target == builder.TargetTypeVanilla.String() {
|
if opts.Target == builder.TargetTypeVanilla.String() ||
|
||||||
level.ReportError(opts.KernelConfigData, "kernelConfigData", "KernelConfigData", "required_kernelconfigdata_with_target_vanilla", "")
|
opts.Target == builder.TargetTypeMinikube.String() ||
|
||||||
|
opts.Target == builder.TargetTypeFlatcar.String() {
|
||||||
|
if len(opts.KernelConfigData) == 0 {
|
||||||
|
level.ReportError(opts.KernelConfigData, "kernelConfigData", "KernelConfigData", "required_kernelconfigdata_with_target_vanilla", "")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if opts.KernelVersion == 0 && (opts.Target == builder.TargetTypeUbuntuAWS.String() || opts.Target == builder.TargetTypeUbuntuGeneric.String()) {
|
if opts.KernelVersion == "" && (opts.Target == builder.TargetTypeUbuntu.String()) {
|
||||||
level.ReportError(opts.KernelVersion, "kernelVersion", "KernelVersion", "required_kernelversion_with_target_ubuntu", "")
|
level.ReportError(opts.KernelVersion, "kernelVersion", "KernelVersion", "required_kernelversion_with_target_ubuntu", "")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Target redhat requires a valid build image (has to be registered in order to download packages)
|
// Target redhat requires a valid build image (has to be registered in order to download packages)
|
||||||
if opts.Target == builder.TargetTypeRedhat.String() && opts.BuilderImage == driverbuilder.BuilderBaseImage {
|
if opts.Target == builder.TargetTypeRedhat.String() && opts.BuilderImage == "" {
|
||||||
level.ReportError(opts.BuilderImage, "builderimage", "builderimage", "required_builderimage_with_target_redhat", "")
|
level.ReportError(opts.BuilderImage, "builderimage", "builderimage", "required_builderimage_with_target_redhat", "")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,35 +1,12 @@
|
||||||
INFO specify a valid processor processors="[docker kubernetes]"
|
INFO specify a valid processor
|
||||||
A command line tool to build Falco kernel modules and eBPF probes.
|
└ processors: [docker kubernetes kubernetes-in-cluster local]
|
||||||
|
{{ .Desc }}
|
||||||
|
|
||||||
Usage:
|
{{ .Usage }}
|
||||||
driverkit
|
|
||||||
driverkit [command]
|
|
||||||
|
|
||||||
Available Commands:
|
{{ .Commands }}
|
||||||
completion Generates completion scripts.
|
|
||||||
docker Build Falco kernel modules and eBPF probes against a docker daemon.
|
|
||||||
help Help about any command
|
|
||||||
kubernetes Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
|
||||||
|
|
||||||
Flags:
|
{{ .Flags }}
|
||||||
--architecture string target architecture for the built driver (default "%s")
|
-v, --version version for driverkit
|
||||||
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, the default image will be used. (default "falcosecurity/driverkit-builder:latest")
|
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
|
||||||
--dryrun do not actually perform the action
|
|
||||||
-h, --help help for driverkit
|
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
|
||||||
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
|
||||||
-l, --loglevel string log level (default "info")
|
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
|
||||||
--output-module string filepath where to save the resulting kernel module
|
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
|
||||||
--proxy string the proxy to use to download data
|
|
||||||
-t, --target string the system to target the build for
|
|
||||||
--timeout int timeout in seconds (default 120)
|
|
||||||
-v, --version version for driverkit
|
|
||||||
|
|
||||||
Use "driverkit [command] --help" for more information about a command.
|
{{ .Info }}
|
||||||
|
|
|
@ -1,14 +1,3 @@
|
||||||
amazonlinux
|
{{ .TargetsVerticalList }}
|
||||||
amazonlinux2
|
|
||||||
amazonlinux2022
|
|
||||||
archlinux
|
|
||||||
centos
|
|
||||||
debian
|
|
||||||
flatcar
|
|
||||||
redhat
|
|
||||||
rocky
|
|
||||||
ubuntu-aws
|
|
||||||
ubuntu-generic
|
|
||||||
vanilla
|
|
||||||
:0
|
:0
|
||||||
Completion ended with directive: ShellCompDirectiveDefault
|
Completion ended with directive: ShellCompDirectiveDefault
|
||||||
|
|
|
@ -3,4 +3,5 @@ kernelversion: 59
|
||||||
target: ubuntu-aws
|
target: ubuntu-aws
|
||||||
output:
|
output:
|
||||||
module: /tmp/falco-ubuntu-aws.ko
|
module: /tmp/falco-ubuntu-aws.ko
|
||||||
|
probe: /tmp/falco-ubuntu-aws.o
|
||||||
driverversion: master
|
driverversion: master
|
||||||
|
|
|
@ -7,4 +7,5 @@ kernelurls: [
|
||||||
target: ubuntu-aws
|
target: ubuntu-aws
|
||||||
output:
|
output:
|
||||||
module: /tmp/falco-ubuntu-aws.ko
|
module: /tmp/falco-ubuntu-aws.ko
|
||||||
|
probe: /tmp/falco-ubuntu-aws.o
|
||||||
driverversion: master
|
driverversion: master
|
||||||
|
|
|
@ -1,3 +1,13 @@
|
||||||
INFO using config file file=testdata/configs/1.yaml
|
INFO using config file file: testdata/configs/1.yaml
|
||||||
DEBU running with options arch=%s driverversion=master kernelrelease=4.15.0-1057-aws kernelversion=59 output-module=/tmp/falco-ubuntu-aws.ko target=ubuntu-aws
|
DEBUG running with options
|
||||||
INFO driver building, it will take a few seconds processor=docker
|
├ output-module: /tmp/falco-ubuntu-aws.ko
|
||||||
|
├ output-probe: /tmp/falco-ubuntu-aws.o
|
||||||
|
├ driverversion: master
|
||||||
|
├ kernelrelease: 4.15.0-1057-aws
|
||||||
|
├ kernelversion: 59
|
||||||
|
├ target: ubuntu-aws
|
||||||
|
├ arch: {{ .CurrentArch }}
|
||||||
|
├ kernelurls: []
|
||||||
|
├ repo-org: falcosecurity
|
||||||
|
└ repo-name: libs
|
||||||
|
INFO starting build processor: docker
|
||||||
|
|
|
@ -1,3 +1,13 @@
|
||||||
INFO using config file file=testdata/configs/1.yaml
|
INFO using config file file: testdata/configs/1.yaml
|
||||||
DEBU running with options arch=%s driverversion=master kernelrelease=4.15.0-1057-aws kernelversion=229 output-module=/tmp/override.ko target=ubuntu-aws
|
DEBUG running with options
|
||||||
INFO driver building, it will take a few seconds processor=docker
|
├ output-module: /tmp/override.ko
|
||||||
|
├ output-probe: /tmp/falco-ubuntu-aws.o
|
||||||
|
├ driverversion: master
|
||||||
|
├ kernelrelease: 4.15.0-1057-aws
|
||||||
|
├ kernelversion: 229
|
||||||
|
├ target: ubuntu-aws
|
||||||
|
├ arch: {{ .CurrentArch }}
|
||||||
|
├ kernelurls: []
|
||||||
|
├ repo-org: falcosecurity
|
||||||
|
└ repo-name: libs
|
||||||
|
INFO starting build processor: docker
|
||||||
|
|
|
@ -1,3 +1,13 @@
|
||||||
INFO using config file file=testdata/configs/2.yaml
|
INFO using config file file: testdata/configs/2.yaml
|
||||||
DEBU running with options arch=%s driverversion=master kernelrelease=4.15.0-1057-aws kernelurls="[https://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-aws/linux-aws-headers-4.15.0-1057_4.15.0-1057.59_all.deb https://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-aws/linux-headers-4.15.0-1057-aws_4.15.0-1057.59_amd64.deb]" kernelversion=59 output-module=/tmp/falco-ubuntu-aws.ko target=ubuntu-aws
|
DEBUG running with options
|
||||||
INFO driver building, it will take a few seconds processor=docker
|
├ output-module: /tmp/falco-ubuntu-aws.ko
|
||||||
|
├ output-probe: /tmp/falco-ubuntu-aws.o
|
||||||
|
├ driverversion: master
|
||||||
|
├ kernelrelease: 4.15.0-1057-aws
|
||||||
|
├ kernelversion: 59
|
||||||
|
├ target: ubuntu-aws
|
||||||
|
├ arch: {{ .CurrentArch }}
|
||||||
|
├ kernelurls: [https://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-aws/linux-aws-headers-4.15.0-1057_4.15.0-1057.59_all.deb https://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-aws/linux-headers-4.15.0-1057-aws_4.15.0-1057.59_amd64.deb]
|
||||||
|
├ repo-org: falcosecurity
|
||||||
|
└ repo-name: libs
|
||||||
|
INFO starting build processor: docker
|
||||||
|
|
|
@ -1,3 +1,13 @@
|
||||||
DEBU running without a configuration file
|
DEBUG running without a configuration file
|
||||||
DEBU running with options arch=%s driverversion=master kernelrelease=4.15.0-1057-azure kernelurls="[http://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-azure/linux-azure-headers-4.15.0-1057_4.15.0-1057.62_all.deb http://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-azure/linux-headers-4.15.0-1057-azure_4.15.0-1057.62_amd64.deb]" kernelversion=62 output-module=/tmp/falco-ubuntu-azure.ko target=ubuntu-aws
|
DEBUG running with options
|
||||||
INFO driver building, it will take a few seconds processor=docker
|
├ output-module: /tmp/falco-ubuntu-azure.ko
|
||||||
|
├ output-probe: /tmp/falco-ubuntu-aws.o
|
||||||
|
├ driverversion: master
|
||||||
|
├ kernelrelease: 4.15.0-1057-azure
|
||||||
|
├ kernelversion: 62
|
||||||
|
├ target: ubuntu-azure
|
||||||
|
├ arch: {{ .CurrentArch }}
|
||||||
|
├ kernelurls: [http://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-azure/linux-azure-headers-4.15.0-1057_4.15.0-1057.62_all.deb http://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-azure/linux-headers-4.15.0-1057-azure_4.15.0-1057.62_amd64.deb]
|
||||||
|
├ repo-org: falcosecurity
|
||||||
|
└ repo-name: libs
|
||||||
|
INFO starting build processor: docker
|
||||||
|
|
|
@ -1,26 +1,4 @@
|
||||||
DEBU running without a configuration file
|
DEBUG running without a configuration file
|
||||||
ERRO error validating build options error="builder image is a required field when target is redhat"
|
ERROR error validating build options
|
||||||
Error: exiting for validation errors
|
└ err: builder image is a required field when target is redhat
|
||||||
Usage:
|
ERROR error executing driverkit err: exiting for validation errors
|
||||||
driverkit docker [flags]
|
|
||||||
|
|
||||||
Flags:
|
|
||||||
--architecture string target architecture for the built driver (default "%s")
|
|
||||||
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, the default image will be used. (default "falcosecurity/driverkit-builder:latest")
|
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
|
||||||
--dryrun do not actually perform the action
|
|
||||||
-h, --help help for docker
|
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
|
||||||
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
|
||||||
-l, --loglevel string log level (default "info")
|
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
|
||||||
--output-module string filepath where to save the resulting kernel module
|
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
|
||||||
--proxy string the proxy to use to download data
|
|
||||||
-t, --target string the system to target the build for
|
|
||||||
--timeout int timeout in seconds (default 120)
|
|
||||||
|
|
||||||
|
|
|
@ -1,3 +1,13 @@
|
||||||
DEBU running without a configuration file
|
DEBUG running without a configuration file
|
||||||
DEBU running with options arch=%s driverversion=master kernelrelease=4.15.0-1057-aws kernelurls="[https://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-aws/linux-aws-headers-4.15.0-1057_4.15.0-1057.59_all.deb https://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-aws/linux-headers-4.15.0-1057-aws_4.15.0-1057.59_amd64.deb]" kernelversion=59 output-module=/tmp/falco-ubuntu-aws.ko target=ubuntu-aws
|
DEBUG running with options
|
||||||
INFO driver building, it will take a few seconds processor=docker
|
├ output-module: /tmp/falco-ubuntu-aws.ko
|
||||||
|
├ output-probe: /tmp/falco-ubuntu-aws.o
|
||||||
|
├ driverversion: master
|
||||||
|
├ kernelrelease: 4.15.0-1057-aws
|
||||||
|
├ kernelversion: 59
|
||||||
|
├ target: ubuntu-aws
|
||||||
|
├ arch: {{ .CurrentArch }}
|
||||||
|
├ kernelurls: [https://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-aws/linux-aws-headers-4.15.0-1057_4.15.0-1057.59_all.deb https://mirrors.edge.kernel.org/ubuntu/pool/main/l/linux-aws/linux-headers-4.15.0-1057-aws_4.15.0-1057.59_amd64.deb]
|
||||||
|
├ repo-org: falcosecurity
|
||||||
|
└ repo-name: libs
|
||||||
|
INFO starting build processor: docker
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
INFO driver building, it will take a few seconds processor=docker
|
INFO starting build processor: docker
|
||||||
|
|
|
@ -1,28 +1,7 @@
|
||||||
ERRO error validating build options error="kernel release is a required field"
|
ERROR error validating build options err: kernel release is a required field
|
||||||
ERRO error validating build options error="target is a required field"
|
ERROR error validating build options err: target is a required field
|
||||||
ERRO error validating build options error="output module path is required when probe is missing"
|
ERROR error validating build options
|
||||||
ERRO error validating build options error="output probe path is required when module is missing"
|
└ err: output module path is required when probe is missing
|
||||||
Error: exiting for validation errors
|
ERROR error validating build options
|
||||||
Usage:
|
└ err: output probe path is required when module is missing
|
||||||
driverkit docker [flags]
|
ERROR error executing driverkit err: exiting for validation errors
|
||||||
|
|
||||||
Flags:
|
|
||||||
--architecture string target architecture for the built driver (default "%s")
|
|
||||||
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, the default image will be used. (default "falcosecurity/driverkit-builder:latest")
|
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
|
||||||
--dryrun do not actually perform the action
|
|
||||||
-h, --help help for docker
|
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
|
||||||
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
|
||||||
-l, --loglevel string log level (default "info")
|
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
|
||||||
--output-module string filepath where to save the resulting kernel module
|
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
|
||||||
--proxy string the proxy to use to download data
|
|
||||||
-t, --target string the system to target the build for
|
|
||||||
--timeout int timeout in seconds (default 120)
|
|
||||||
|
|
||||||
|
|
|
@ -1,34 +1,10 @@
|
||||||
A command line tool to build Falco kernel modules and eBPF probes.
|
{{ .Desc }}
|
||||||
|
|
||||||
Usage:
|
{{ .Usage }}
|
||||||
driverkit
|
|
||||||
driverkit [command]
|
|
||||||
|
|
||||||
Available Commands:
|
{{ .Commands }}
|
||||||
completion Generates completion scripts.
|
|
||||||
docker Build Falco kernel modules and eBPF probes against a docker daemon.
|
|
||||||
help Help about any command
|
|
||||||
kubernetes Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
|
||||||
|
|
||||||
Flags:
|
{{ .Flags }}
|
||||||
--architecture string target architecture for the built driver (default "%s")
|
-v, --version version for driverkit
|
||||||
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, the default image will be used. (default "falcosecurity/driverkit-builder:latest")
|
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
|
||||||
--dryrun do not actually perform the action
|
|
||||||
-h, --help help for driverkit
|
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
|
||||||
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
|
||||||
-l, --loglevel string log level (default "info")
|
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
|
||||||
--output-module string filepath where to save the resulting kernel module
|
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
|
||||||
--proxy string the proxy to use to download data
|
|
||||||
-t, --target string the system to target the build for
|
|
||||||
--timeout int timeout in seconds (default 120)
|
|
||||||
-v, --version version for driverkit
|
|
||||||
|
|
||||||
Use "driverkit [command] --help" for more information about a command.
|
{{ .Info }}
|
||||||
|
|
|
@ -1,33 +1,10 @@
|
||||||
A command line tool to build Falco kernel modules and eBPF probes.
|
{{ .Desc }}
|
||||||
|
|
||||||
Usage:
|
{{ .Usage }}
|
||||||
driverkit
|
|
||||||
driverkit [command]
|
|
||||||
|
|
||||||
Available Commands:
|
{{ .Commands }}
|
||||||
completion Generates completion scripts.
|
|
||||||
docker Build Falco kernel modules and eBPF probes against a docker daemon.
|
|
||||||
help Help about any command
|
|
||||||
kubernetes Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
|
||||||
|
|
||||||
Flags:
|
{{ .Flags }}
|
||||||
--architecture string target architecture for the built driver (default "%s")
|
-v, --version version for driverkit
|
||||||
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, the default image will be used. (default "falcosecurity/driverkit-builder:latest")
|
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
|
||||||
--dryrun do not actually perform the action
|
|
||||||
-h, --help help for driverkit
|
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
|
||||||
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
|
||||||
-l, --loglevel string log level (default "info")
|
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
|
||||||
--output-module string filepath where to save the resulting kernel module
|
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
|
||||||
--proxy string the proxy to use to download data
|
|
||||||
-t, --target string the system to target the build for
|
|
||||||
--timeout int timeout in seconds (default 120)
|
|
||||||
|
|
||||||
Use "driverkit [command] --help" for more information about a command.
|
{{ .Info }}
|
||||||
|
|
|
@ -1,35 +1,3 @@
|
||||||
ERRO error validating config options error="proxy url must start with http:// or https:// or socks5:// prefix"
|
ERROR error validating config options
|
||||||
Error: exiting for validation errors
|
└ err: proxy url must start with http:// or https:// or socks5:// prefix
|
||||||
Usage:
|
ERROR error executing driverkit err: exiting for validation errors
|
||||||
driverkit
|
|
||||||
driverkit [command]
|
|
||||||
|
|
||||||
Available Commands:
|
|
||||||
completion Generates completion scripts.
|
|
||||||
docker Build Falco kernel modules and eBPF probes against a docker daemon.
|
|
||||||
help Help about any command
|
|
||||||
kubernetes Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
|
||||||
|
|
||||||
Flags:
|
|
||||||
--architecture string target architecture for the built driver (default "%s")
|
|
||||||
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, the default image will be used. (default "falcosecurity/driverkit-builder:latest")
|
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
|
||||||
--dryrun do not actually perform the action
|
|
||||||
-h, --help help for driverkit
|
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
|
||||||
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
|
||||||
-l, --loglevel string log level (default "info")
|
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
|
||||||
--output-module string filepath where to save the resulting kernel module
|
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
|
||||||
--proxy string the proxy to use to download data
|
|
||||||
-t, --target string the system to target the build for
|
|
||||||
--timeout int timeout in seconds (default 120)
|
|
||||||
-v, --version version for driverkit
|
|
||||||
|
|
||||||
Use "driverkit [command] --help" for more information about a command.
|
|
||||||
|
|
||||||
|
|
|
@ -1,34 +1 @@
|
||||||
Error: invalid argument "abc" for "driverkit"
|
ERROR error executing driverkit err: invalid argument "abc" for "driverkit"
|
||||||
Usage:
|
|
||||||
driverkit
|
|
||||||
driverkit [command]
|
|
||||||
|
|
||||||
Available Commands:
|
|
||||||
completion Generates completion scripts.
|
|
||||||
docker Build Falco kernel modules and eBPF probes against a docker daemon.
|
|
||||||
help Help about any command
|
|
||||||
kubernetes Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
|
||||||
|
|
||||||
Flags:
|
|
||||||
--architecture string target architecture for the built driver (default "%s")
|
|
||||||
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, the default image will be used. (default "falcosecurity/driverkit-builder:latest")
|
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
|
||||||
--dryrun do not actually perform the action
|
|
||||||
-h, --help help for driverkit
|
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
|
||||||
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
|
||||||
-l, --loglevel string log level (default "info")
|
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
|
||||||
--output-module string filepath where to save the resulting kernel module
|
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
|
||||||
--proxy string the proxy to use to download data
|
|
||||||
-t, --target string the system to target the build for
|
|
||||||
--timeout int timeout in seconds (default 120)
|
|
||||||
-v, --version version for driverkit
|
|
||||||
|
|
||||||
Use "driverkit [command] --help" for more information about a command.
|
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
Available Commands:
|
||||||
|
completion Generates completion scripts.
|
||||||
|
docker Build Falco kernel modules and eBPF probes against a docker daemon.
|
||||||
|
help Help about any command
|
||||||
|
images List builder images
|
||||||
|
kubernetes Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
||||||
|
kubernetes-in-cluster Build Falco kernel modules and eBPF probes against a Kubernetes cluster inside a Kubernetes cluster.
|
||||||
|
local Build Falco kernel modules and eBPF probes in local env with local kernel sources and gcc/clang.
|
|
@ -0,0 +1 @@
|
||||||
|
A command line tool to build Falco kernel modules and eBPF probes.
|
|
@ -0,0 +1,27 @@
|
||||||
|
Flags:
|
||||||
|
--architecture string target architecture for the built driver, one of {{ .Architectures }} (default "{{ .CurrentArch }}")
|
||||||
|
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, an automatically selected image will be used.
|
||||||
|
--builderrepo strings list of docker repositories or yaml file (absolute path) containing builder images index with the format 'images: [ { target:<target>, name:<image-name>, arch: <arch>, tag: <imagetag>, gcc_versions: [ <gcc-tag> ] },...]', in descending priority order. Used to search for builder images. eg: --builderrepo myorg/driverkit-builder --builderrepo falcosecurity/driverkit-builder --builderrepo '/path/to/my/index.yaml'. (default [docker.io/falcosecurity/driverkit-builder])
|
||||||
|
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
||||||
|
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
||||||
|
--dryrun do not actually perform the action
|
||||||
|
--gccversion string enforce a specific gcc version for the build
|
||||||
|
-h, --help help for {{ .Cmd }}
|
||||||
|
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
||||||
|
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
||||||
|
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
||||||
|
--kernelversion string kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default "1")
|
||||||
|
-l, --loglevel string set level for logs (info, warn, debug, trace) (default "info")
|
||||||
|
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
||||||
|
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
||||||
|
--output-module string filepath where to save the resulting kernel module
|
||||||
|
--output-probe string filepath where to save the resulting eBPF probe
|
||||||
|
--proxy string the proxy to use to download data
|
||||||
|
--registry-name string registry name to which authenticate
|
||||||
|
--registry-password string registry password
|
||||||
|
--registry-plain-http allows interacting with remote registry via plain http requests
|
||||||
|
--registry-user string registry username
|
||||||
|
--repo-name string repository github name (default "libs")
|
||||||
|
--repo-org string repository github organization (default "falcosecurity")
|
||||||
|
-t, --target string the system to target the build for, one of {{ .Targets }}
|
||||||
|
--timeout int timeout in seconds (default 120)
|
|
@ -0,0 +1 @@
|
||||||
|
Use "driverkit [command] --help" for more information about a command.
|
|
@ -0,0 +1,3 @@
|
||||||
|
Usage:
|
||||||
|
driverkit
|
||||||
|
driverkit [command]
|
|
@ -1,16 +1,28 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"flag"
|
"flag"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
|
||||||
"os"
|
"os"
|
||||||
"path"
|
"path"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/falcosecurity/driverkit/cmd"
|
"github.com/falcosecurity/driverkit/cmd"
|
||||||
logger "github.com/sirupsen/logrus"
|
|
||||||
"github.com/spf13/cobra/doc"
|
"github.com/spf13/cobra/doc"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -47,7 +59,22 @@ func main() {
|
||||||
flag.Parse()
|
flag.Parse()
|
||||||
|
|
||||||
// Get root command
|
// Get root command
|
||||||
driverkit := cmd.NewRootCmd()
|
configOpts, err := cmd.NewConfigOptions()
|
||||||
|
if err != nil {
|
||||||
|
// configOpts will never be nil here
|
||||||
|
if configOpts != nil {
|
||||||
|
configOpts.Printer.Logger.Fatal("error setting driverkit config options defaults",
|
||||||
|
configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
|
} else {
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
rootOpts, err := cmd.NewRootOptions()
|
||||||
|
if err != nil {
|
||||||
|
configOpts.Printer.Logger.Fatal("error setting driverkit root options defaults",
|
||||||
|
configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
|
}
|
||||||
|
driverkit := cmd.NewRootCmd(configOpts, rootOpts)
|
||||||
root := driverkit.Command()
|
root := driverkit.Command()
|
||||||
num := len(root.Commands()) + 1
|
num := len(root.Commands()) + 1
|
||||||
|
|
||||||
|
@ -70,20 +97,20 @@ func main() {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Generate markdown docs
|
// Generate markdown docs
|
||||||
err := doc.GenMarkdownTreeCustom(root, outputDir, prepender(num), linker)
|
err = doc.GenMarkdownTreeCustom(root, outputDir, prepender(num), linker)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.WithError(err).Fatal("markdown generation")
|
configOpts.Printer.Logger.Fatal("markdown generation", configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
}
|
}
|
||||||
|
|
||||||
if targetWebsite {
|
if targetWebsite {
|
||||||
err := os.Rename(path.Join(outputDir, "driverkit.md"), path.Join(outputDir, "_index.md"))
|
err = os.Rename(path.Join(outputDir, "driverkit.md"), path.Join(outputDir, "_index.md"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.WithError(err).Fatal("renaming main docs page")
|
configOpts.Printer.Logger.Fatal("renaming main docs page", configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := stripSensitive(); err != nil {
|
if err = stripSensitive(); err != nil {
|
||||||
logger.WithError(err).Fatal("error replacing sensitive data")
|
configOpts.Printer.Logger.Fatal("error replacing sensitive data", configOpts.Printer.Logger.Args("err", err.Error()))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -100,7 +127,7 @@ func stripSensitive() error {
|
||||||
|
|
||||||
for _, file := range files {
|
for _, file := range files {
|
||||||
filePath := path.Join(outputDir, file.Name())
|
filePath := path.Join(outputDir, file.Name())
|
||||||
file, err := ioutil.ReadFile(filePath)
|
file, err := os.ReadFile(filePath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -110,7 +137,7 @@ func stripSensitive() error {
|
||||||
target := []byte(os.Getenv(s))
|
target := []byte(os.Getenv(s))
|
||||||
file = bytes.ReplaceAll(file, target, append(envMark, []byte(s)...))
|
file = bytes.ReplaceAll(file, target, append(envMark, []byte(s)...))
|
||||||
}
|
}
|
||||||
if err = ioutil.WriteFile(filePath, file, 0666); err != nil {
|
if err = os.WriteFile(filePath, file, 0666); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,32 @@
|
||||||
|
FROM amazonlinux:2.0.20240529.0
|
||||||
|
|
||||||
|
LABEL maintainer="cncf-falco-dev@lists.cncf.io"
|
||||||
|
|
||||||
|
RUN yum -y install gcc10 \
|
||||||
|
clang \
|
||||||
|
llvm \
|
||||||
|
bash-completion \
|
||||||
|
bc \
|
||||||
|
ca-certificates \
|
||||||
|
curl \
|
||||||
|
gnupg2 \
|
||||||
|
libc6-dev \
|
||||||
|
elfutils-libelf-devel \
|
||||||
|
xz \
|
||||||
|
cpio \
|
||||||
|
flex \
|
||||||
|
bison \
|
||||||
|
openssl \
|
||||||
|
openssl-devel \
|
||||||
|
wget \
|
||||||
|
binutils \
|
||||||
|
which \
|
||||||
|
make \
|
||||||
|
cmake3 \
|
||||||
|
tar \
|
||||||
|
zstd \
|
||||||
|
git
|
||||||
|
|
||||||
|
# Properly create soft links
|
||||||
|
RUN ln -s /usr/bin/gcc10-cc /usr/bin/gcc-10.0.0
|
||||||
|
RUN ln -s /usr/bin/cmake3 /usr/bin/cmake
|
|
@ -0,0 +1 @@
|
||||||
|
builder-any-x86_64_gcc10.0.0_gcc9.0.0.Dockerfile
|
|
@ -0,0 +1 @@
|
||||||
|
builder-any-x86_64_gcc12.0.0_gcc11.0.0.Dockerfile
|
|
@ -0,0 +1 @@
|
||||||
|
builder-any-x86_64_gcc13.0.0.Dockerfile
|
|
@ -0,0 +1 @@
|
||||||
|
builder-any-x86_64_gcc14.0.0.Dockerfile
|
|
@ -0,0 +1 @@
|
||||||
|
builder-any-x86_64_gcc8.0.0_gcc6.0.0_gcc5.0.0_gcc4.9.0_gcc4.8.0.Dockerfile
|
|
@ -0,0 +1,48 @@
|
||||||
|
FROM debian:bullseye
|
||||||
|
|
||||||
|
LABEL maintainer="cncf-falco-dev@lists.cncf.io"
|
||||||
|
|
||||||
|
ARG TARGETARCH
|
||||||
|
|
||||||
|
RUN cp /etc/skel/.bashrc /root && cp /etc/skel/.profile /root
|
||||||
|
|
||||||
|
RUN apt-get update \
|
||||||
|
&& apt-get install -y --no-install-recommends \
|
||||||
|
bash-completion \
|
||||||
|
bc \
|
||||||
|
clang \
|
||||||
|
llvm \
|
||||||
|
ca-certificates \
|
||||||
|
curl \
|
||||||
|
dkms \
|
||||||
|
dwarves \
|
||||||
|
gnupg2 \
|
||||||
|
gcc \
|
||||||
|
gcc-9 \
|
||||||
|
jq \
|
||||||
|
libc6-dev \
|
||||||
|
libelf-dev \
|
||||||
|
netcat \
|
||||||
|
xz-utils \
|
||||||
|
rpm2cpio \
|
||||||
|
cpio \
|
||||||
|
flex \
|
||||||
|
bison \
|
||||||
|
openssl \
|
||||||
|
libssl-dev \
|
||||||
|
libncurses-dev \
|
||||||
|
libudev-dev \
|
||||||
|
libpci-dev \
|
||||||
|
libiberty-dev \
|
||||||
|
lsb-release \
|
||||||
|
wget \
|
||||||
|
software-properties-common \
|
||||||
|
gpg \
|
||||||
|
zstd \
|
||||||
|
cmake \
|
||||||
|
git \
|
||||||
|
&& rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
|
# Properly create soft link
|
||||||
|
RUN ln -s /usr/bin/gcc-9 /usr/bin/gcc-9.0.0
|
||||||
|
RUN ln -s /usr/bin/gcc-10 /usr/bin/gcc-10.0.0
|
|
@ -0,0 +1,48 @@
|
||||||
|
FROM debian:bookworm
|
||||||
|
|
||||||
|
LABEL maintainer="cncf-falco-dev@lists.cncf.io"
|
||||||
|
|
||||||
|
ARG TARGETARCH
|
||||||
|
|
||||||
|
RUN cp /etc/skel/.bashrc /root && cp /etc/skel/.profile /root
|
||||||
|
|
||||||
|
RUN apt-get update \
|
||||||
|
&& apt-get install -y --no-install-recommends \
|
||||||
|
bash-completion \
|
||||||
|
bc \
|
||||||
|
clang \
|
||||||
|
llvm \
|
||||||
|
ca-certificates \
|
||||||
|
curl \
|
||||||
|
dkms \
|
||||||
|
dwarves \
|
||||||
|
gnupg2 \
|
||||||
|
gcc \
|
||||||
|
gcc-11 \
|
||||||
|
jq \
|
||||||
|
libc6-dev \
|
||||||
|
libelf-dev \
|
||||||
|
netcat-openbsd \
|
||||||
|
xz-utils \
|
||||||
|
rpm2cpio \
|
||||||
|
cpio \
|
||||||
|
flex \
|
||||||
|
bison \
|
||||||
|
openssl \
|
||||||
|
libssl-dev \
|
||||||
|
libncurses-dev \
|
||||||
|
libudev-dev \
|
||||||
|
libpci-dev \
|
||||||
|
libiberty-dev \
|
||||||
|
lsb-release \
|
||||||
|
wget \
|
||||||
|
software-properties-common \
|
||||||
|
gpg \
|
||||||
|
zstd \
|
||||||
|
cmake \
|
||||||
|
git \
|
||||||
|
&& rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
|
# Properly create soft links
|
||||||
|
RUN ln -s /usr/bin/gcc-11 /usr/bin/gcc-11.0.0
|
||||||
|
RUN ln -s /usr/bin/gcc-12 /usr/bin/gcc-12.0.0
|
|
@ -0,0 +1,40 @@
|
||||||
|
FROM fedora:39
|
||||||
|
|
||||||
|
LABEL maintainer="cncf-falco-dev@lists.cncf.io"
|
||||||
|
|
||||||
|
ARG TARGETARCH
|
||||||
|
|
||||||
|
RUN dnf install -y \
|
||||||
|
bash-completion \
|
||||||
|
bc \
|
||||||
|
clang \
|
||||||
|
llvm \
|
||||||
|
ca-certificates \
|
||||||
|
curl \
|
||||||
|
dkms \
|
||||||
|
dwarves \
|
||||||
|
gnupg2 \
|
||||||
|
gcc \
|
||||||
|
jq \
|
||||||
|
glibc-devel \
|
||||||
|
elfutils-libelf-devel \
|
||||||
|
netcat \
|
||||||
|
xz \
|
||||||
|
cpio \
|
||||||
|
flex \
|
||||||
|
bison \
|
||||||
|
openssl \
|
||||||
|
openssl-devel \
|
||||||
|
ncurses-devel \
|
||||||
|
systemd-devel \
|
||||||
|
pciutils-devel \
|
||||||
|
binutils-devel \
|
||||||
|
lsb-release \
|
||||||
|
wget \
|
||||||
|
gpg \
|
||||||
|
zstd \
|
||||||
|
cmake \
|
||||||
|
git
|
||||||
|
|
||||||
|
# Properly create soft links
|
||||||
|
RUN ln -s /usr/bin/gcc /usr/bin/gcc-13.0.0
|
|
@ -0,0 +1,40 @@
|
||||||
|
FROM fedora:41
|
||||||
|
|
||||||
|
LABEL maintainer="cncf-falco-dev@lists.cncf.io"
|
||||||
|
|
||||||
|
ARG TARGETARCH
|
||||||
|
|
||||||
|
RUN dnf install -y \
|
||||||
|
bash-completion \
|
||||||
|
bc \
|
||||||
|
clang \
|
||||||
|
llvm \
|
||||||
|
ca-certificates \
|
||||||
|
curl \
|
||||||
|
dkms \
|
||||||
|
dwarves \
|
||||||
|
gnupg2 \
|
||||||
|
gcc \
|
||||||
|
jq \
|
||||||
|
glibc-devel \
|
||||||
|
elfutils-libelf-devel \
|
||||||
|
netcat \
|
||||||
|
xz \
|
||||||
|
cpio \
|
||||||
|
flex \
|
||||||
|
bison \
|
||||||
|
openssl \
|
||||||
|
openssl-devel \
|
||||||
|
ncurses-devel \
|
||||||
|
systemd-devel \
|
||||||
|
pciutils-devel \
|
||||||
|
binutils-devel \
|
||||||
|
lsb-release \
|
||||||
|
wget \
|
||||||
|
gpg \
|
||||||
|
zstd \
|
||||||
|
cmake \
|
||||||
|
git
|
||||||
|
|
||||||
|
# Properly create soft links
|
||||||
|
RUN ln -s /usr/bin/gcc /usr/bin/gcc-14.0.0
|
|
@ -5,23 +5,29 @@ LABEL maintainer="cncf-falco-dev@lists.cncf.io"
|
||||||
ARG TARGETARCH
|
ARG TARGETARCH
|
||||||
|
|
||||||
RUN cp /etc/skel/.bashrc /root && cp /etc/skel/.profile /root
|
RUN cp /etc/skel/.bashrc /root && cp /etc/skel/.profile /root
|
||||||
RUN echo 'deb http://deb.debian.org/debian buster-backports main' >>/etc/apt/sources.list
|
|
||||||
|
# Use 20250630T203427Z debian apt snapshot as it still contains support for buster.
|
||||||
|
RUN cat <<EOF > /etc/apt/sources.list
|
||||||
|
deb http://snapshot.debian.org/archive/debian/20250630T203427Z buster main
|
||||||
|
deb http://snapshot.debian.org/archive/debian-security/20250630T203427Z buster/updates main
|
||||||
|
deb http://snapshot.debian.org/archive/debian/20250630T203427Z buster-updates main
|
||||||
|
EOF
|
||||||
|
|
||||||
RUN apt-get update \
|
RUN apt-get update \
|
||||||
&& apt-get install -y --no-install-recommends \
|
&& apt-get install -y --no-install-recommends \
|
||||||
bash-completion \
|
bash-completion \
|
||||||
bc \
|
bc \
|
||||||
clang-7 \
|
clang \
|
||||||
|
llvm \
|
||||||
ca-certificates \
|
ca-certificates \
|
||||||
curl \
|
curl \
|
||||||
dkms \
|
dkms \
|
||||||
dwarves/buster-backports \
|
dwarves \
|
||||||
gnupg2 \
|
gnupg2 \
|
||||||
gcc \
|
gcc \
|
||||||
jq \
|
jq \
|
||||||
libc6-dev \
|
libc6-dev \
|
||||||
libelf-dev \
|
libelf-dev \
|
||||||
llvm-7 \
|
|
||||||
netcat \
|
netcat \
|
||||||
xz-utils \
|
xz-utils \
|
||||||
rpm2cpio \
|
rpm2cpio \
|
||||||
|
@ -39,15 +45,19 @@ RUN apt-get update \
|
||||||
software-properties-common \
|
software-properties-common \
|
||||||
gpg \
|
gpg \
|
||||||
zstd \
|
zstd \
|
||||||
&& rm -rf /var/lib/apt/lists/*
|
gawk \
|
||||||
|
mawk \
|
||||||
|
git \
|
||||||
|
&& rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
RUN if [ "$TARGETARCH" = "amd64" ] ; then apt-get install -y --no-install-recommends libmpx2; fi
|
RUN if [ "$TARGETARCH" = "amd64" ] ; then apt-get install -y --no-install-recommends libmpx2; fi
|
||||||
|
|
||||||
# Install clang 12
|
# gcc 4.9 is required on x86 to build some 3.10+ kernels
|
||||||
RUN cd /tmp \
|
# note: on arm gcc 4.9 could not be found.
|
||||||
&& wget https://apt.llvm.org/llvm.sh \
|
RUN echo 'deb http://dk.archive.ubuntu.com/ubuntu/ xenial main' >> /etc/apt/sources.list && \
|
||||||
&& chmod +x llvm.sh \
|
echo 'deb http://dk.archive.ubuntu.com/ubuntu/ xenial universe' >> /etc/apt/sources.list
|
||||||
&& ./llvm.sh 12
|
# repo is unsigned therefore the APT options
|
||||||
|
RUN if [ "$TARGETARCH" = "amd64" ] ; then apt-get -o Acquire::AllowInsecureRepositories=true -o Acquire::AllowDowngradeToInsecureRepositories=true update && apt-get -o APT::Get::AllowUnauthenticated=true install -y --no-install-recommends gcc-4.9; fi
|
||||||
|
|
||||||
# gcc 6 is no longer included in debian stable, but we need it to
|
# gcc 6 is no longer included in debian stable, but we need it to
|
||||||
# build kernel modules on the default debian-based ami used by
|
# build kernel modules on the default debian-based ami used by
|
||||||
|
@ -120,3 +130,17 @@ RUN curl -L -o binutils_2.30-22_${TARGETARCH}.deb https://download.falco.org/dep
|
||||||
&& curl -L -o binutils-common_2.30-22_${TARGETARCH}.deb https://download.falco.org/dependencies/binutils-common_2.30-22_${TARGETARCH}.deb \
|
&& curl -L -o binutils-common_2.30-22_${TARGETARCH}.deb https://download.falco.org/dependencies/binutils-common_2.30-22_${TARGETARCH}.deb \
|
||||||
&& dpkg -i *binutils*.deb \
|
&& dpkg -i *binutils*.deb \
|
||||||
&& rm -f *binutils*.deb
|
&& rm -f *binutils*.deb
|
||||||
|
|
||||||
|
# Install a recent version of cmake (debian buster has at most 3.13)
|
||||||
|
RUN curl -L -o /tmp/cmake.tar.gz https://github.com/Kitware/CMake/releases/download/v3.22.5/cmake-3.22.5-linux-$(uname -m).tar.gz; \
|
||||||
|
gzip -d /tmp/cmake.tar.gz; \
|
||||||
|
tar -xpf /tmp/cmake.tar --directory=/tmp; \
|
||||||
|
cp -R /tmp/cmake-3.22.5-linux-$(uname -m)/* /usr; \
|
||||||
|
rm -rf /tmp/cmake-3.22.5-linux-$(uname -m)/
|
||||||
|
|
||||||
|
# Properly create soft link
|
||||||
|
RUN ln -s /usr/bin/gcc-4.8 /usr/bin/gcc-4.8.0
|
||||||
|
RUN if [ "$TARGETARCH" = "amd64" ] ; then ln -s /usr/bin/gcc-4.9 /usr/bin/gcc-4.9.0; fi;
|
||||||
|
RUN ln -s /usr/bin/gcc-5 /usr/bin/gcc-5.0.0
|
||||||
|
RUN ln -s /usr/bin/gcc-6 /usr/bin/gcc-6.0.0
|
||||||
|
RUN ln -s /usr/bin/gcc-8 /usr/bin/gcc-8.0.0
|
|
@ -0,0 +1,50 @@
|
||||||
|
FROM centos:7
|
||||||
|
|
||||||
|
LABEL maintainer="cncf-falco-dev@lists.cncf.io"
|
||||||
|
|
||||||
|
# Fix broken mirrors - centos:7 eol
|
||||||
|
RUN sed -i s/mirror.centos.org/vault.centos.org/g /etc/yum.repos.d/*.repo; \
|
||||||
|
sed -i s/^#.*baseurl=http/baseurl=https/g /etc/yum.repos.d/*.repo; \
|
||||||
|
sed -i s/^mirrorlist=http/#mirrorlist=https/g /etc/yum.repos.d/*.repo
|
||||||
|
|
||||||
|
RUN yum -y install centos-release-scl
|
||||||
|
|
||||||
|
# fix broken mirrors (again)
|
||||||
|
RUN sed -i s/mirror.centos.org/vault.centos.org/g /etc/yum.repos.d/*.repo; \
|
||||||
|
sed -i s/^#.*baseurl=http/baseurl=https/g /etc/yum.repos.d/*.repo; \
|
||||||
|
sed -i s/^mirrorlist=http/#mirrorlist=https/g /etc/yum.repos.d/*.repo
|
||||||
|
|
||||||
|
RUN yum -y install gcc \
|
||||||
|
llvm-toolset-7.0 \
|
||||||
|
bash-completion \
|
||||||
|
bc \
|
||||||
|
ca-certificates \
|
||||||
|
curl \
|
||||||
|
gnupg2 \
|
||||||
|
libc6-dev \
|
||||||
|
elfutils-libelf-devel \
|
||||||
|
xz \
|
||||||
|
cpio \
|
||||||
|
flex \
|
||||||
|
bison \
|
||||||
|
openssl \
|
||||||
|
openssl-devel \
|
||||||
|
wget \
|
||||||
|
binutils \
|
||||||
|
which \
|
||||||
|
make \
|
||||||
|
git
|
||||||
|
|
||||||
|
# Install cmake3.x (on centos7 `cmake` package installs cmake2.x)
|
||||||
|
RUN curl -L -o /tmp/cmake.tar.gz https://github.com/Kitware/CMake/releases/download/v3.22.5/cmake-3.22.5-linux-$(uname -m).tar.gz; \
|
||||||
|
gzip -d /tmp/cmake.tar.gz; \
|
||||||
|
tar -xpf /tmp/cmake.tar --directory=/tmp; \
|
||||||
|
cp -R /tmp/cmake-3.22.5-linux-$(uname -m)/* /usr; \
|
||||||
|
rm -rf /tmp/cmake-3.22.5-linux-$(uname -m)/
|
||||||
|
|
||||||
|
# Properly create soft link
|
||||||
|
RUN ln -s /usr/bin/gcc /usr/bin/gcc-4.8.5
|
||||||
|
|
||||||
|
RUN source scl_source enable llvm-toolset-7.0
|
||||||
|
RUN echo "source scl_source enable llvm-toolset-7.0" >> /etc/bashrc
|
||||||
|
RUN source /etc/bashrc
|
|
@ -0,0 +1,196 @@
|
||||||
|
# Builders
|
||||||
|
|
||||||
|
The [builder](../pkg/driverbuilder/builder) package contains all of the actual builders code, for each supported target.
|
||||||
|
Their bash-like build templates live under the [templates](../pkg/driverbuilder/builder/templates) subfolder.
|
||||||
|
|
||||||
|
# Support a new distro
|
||||||
|
|
||||||
|
You probably came here because you want to tell the [Falco Drivers Build Grid](https://github.com/falcosecurity/test-infra/tree/master/driverkit) to
|
||||||
|
build drivers for a specific distro you care about.
|
||||||
|
|
||||||
|
If that distribution is not yet supported by driverkit, the Falco Drivers Build Grid will not be able to just build it as it does for other distros.
|
||||||
|
|
||||||
|
Adding support for a new distro is a multiple-step work:
|
||||||
|
* first of all, a new builder on driverkit must be created
|
||||||
|
* secondly, [kernel-crawler](https://github.com/falcosecurity/kernel-crawler) must also be updated to support the new distro; see [below](#5-kernel-crawler) section
|
||||||
|
* third, [dbg-go](https://github.com/falcosecurity/dbg-go) must [bump driverkit](https://github.com/falcosecurity/dbg-go?tab=readme-ov-file#bumping-driverkit) and enable support to generate configs for the new distro: https://github.com/falcosecurity/dbg-go/blob/main/pkg/root/distro.go#L30.
|
||||||
|
* lastly, [test-infra](https://github.com/falcosecurity/test-infra) must be updated to add the new [prow config](https://github.com/falcosecurity/test-infra/tree/master/config/jobs/build-drivers) for new distro related jobs and `dbg-go` images must be bumped, see https://github.com/falcosecurity/test-infra/tree/master/images/build-drivers and https://github.com/falcosecurity/test-infra/tree/master/images/update-dbg.
|
||||||
|
|
||||||
|
Here, we will only focus about driverkit part.
|
||||||
|
|
||||||
|
## Creating a new Builder
|
||||||
|
|
||||||
|
To add a new supported distribution, you need to create a specific file implementing the `builder.Builder` interface.
|
||||||
|
Here's the [archlinux](../pkg/driverbuilder/builder/archlinux.go) one for reference.
|
||||||
|
Following this simple set of instructions should help you while you implement a new `builder.Builder`.
|
||||||
|
|
||||||
|
### 1. Builder file
|
||||||
|
|
||||||
|
Create a file, named with the name of the distro you want to add in the `pkg/driverbuilder/builder` folder.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
touch pkg/driverbuilder/builder/archlinux.go
|
||||||
|
```
|
||||||
|
|
||||||
|
### 2. Target name
|
||||||
|
|
||||||
|
Your builder will need a constant for the target it implements. Usually that constant
|
||||||
|
can just be the ID of the distribution you are implementing, as taken reading `/etc/os-release` file.
|
||||||
|
A builder can implement more than one target at time. For example, the minikube builder is just a vanilla one.
|
||||||
|
|
||||||
|
Once you have the constant, you will need to add it to the [byTarget](https://github.com/falcosecurity/driverkit/blob/master/pkg/driverbuilder/builder/target.go) map.
|
||||||
|
Open your file and you will need to add something like this:
|
||||||
|
|
||||||
|
```go
|
||||||
|
// TargetTypeArchLinux identifies the Arch Linux target.
|
||||||
|
const TargetTypeArchLinux Type = "arch"
|
||||||
|
|
||||||
|
type archLinux struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeArchLinux] = &archLinux{}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Now, you can implement the `builder.Builder` interface for the `archlinux` struct
|
||||||
|
you just registered.
|
||||||
|
|
||||||
|
Here's a very minimalistic example:
|
||||||
|
|
||||||
|
```go
|
||||||
|
func (c *archlinux) Name() string {
|
||||||
|
return TargetTypeArchlinux.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *archlinux) TemplateKernelUrlsScript() string {
|
||||||
|
return archlinuxKernelTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *archlinux) TemplateScript() string {
|
||||||
|
return archlinuxTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c archlinux) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
urls := []string{}
|
||||||
|
if kr.Architecture == kernelrelease.ArchitectureAmd64 {
|
||||||
|
urls = append(urls, fmt.Sprintf("https://archive.archlinux.org/packages/l/linux-headers/linux-headers-%s.%s-%d-%s.pkg.tar.xz",
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.Extraversion,
|
||||||
|
cfg.KernelVersion,
|
||||||
|
kr.Architecture.ToNonDeb()))
|
||||||
|
} else {
|
||||||
|
urls = append(urls, fmt.Sprintf("https://alaa.ad24.cz/packages/l/linux-%s-headers/linux-%s-headers-%s-%d-%s.pkg.tar.xz",
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
cfg.KernelVersion,
|
||||||
|
kr.Architecture.ToNonDeb()))
|
||||||
|
}
|
||||||
|
return urls, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *archlinux) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return archlinuxTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
Essentially, the various methods that you are implementing are needed to:
|
||||||
|
* fill the kernel download/extract script template, a `bash` script responsible to fetch and extract the kernel headers for the distro
|
||||||
|
* fill the build script template (see below), that is a `bash` script that will be executed by driverkit at build time
|
||||||
|
* return a list of possible kernel headers urls that will later be downloaded by the kernel download script, and then used for the driver build
|
||||||
|
|
||||||
|
Under `pkg/driverbuilder/builder/templates` folder, you can find all the template scripts for the supported builders.
|
||||||
|
Adding a new template there and using `go:embed` to include it in your builder, allows leaner code
|
||||||
|
without mixing up templates and builder logic.
|
||||||
|
For example:
|
||||||
|
|
||||||
|
```go
|
||||||
|
//go:embed templates/archlinux_kernel.sh
|
||||||
|
var archlinuxKernelTemplate string
|
||||||
|
|
||||||
|
//go:embed templates/archlinux.sh
|
||||||
|
var archlinuxTemplate string
|
||||||
|
```
|
||||||
|
|
||||||
|
Depending on how the distro works, the "kernel" template script will fetch the kernel headers for it at the specific kernel version specified
|
||||||
|
in the `Config` struct at `c.Build.KernelVersion`, and then extracting them.
|
||||||
|
Finally, the script will also `export` the `KERNELDIR` variable to be consumed by the actual build script.
|
||||||
|
Example kernel download template for archlinux:
|
||||||
|
```bash
|
||||||
|
set -xeuo pipefail
|
||||||
|
|
||||||
|
# Fetch the kernel
|
||||||
|
mkdir /tmp/kernel-download
|
||||||
|
cd /tmp/kernel-download
|
||||||
|
curl --silent -o kernel-devel.pkg.tar.xz -SL {{ .KernelDownloadURL }}
|
||||||
|
tar -xf kernel-devel.pkg.tar.xz
|
||||||
|
rm -Rf /tmp/kernel
|
||||||
|
mkdir -p /tmp/kernel
|
||||||
|
mv usr/lib/modules/*/build/* /tmp/kernel
|
||||||
|
|
||||||
|
# exit value
|
||||||
|
export KERNELDIR=/tmp/kernel
|
||||||
|
```
|
||||||
|
|
||||||
|
Once you have those, based on what that kernel can do and based on what was configured
|
||||||
|
by the user, the build script will build the kernel module driver and/or the eBPF probe driver.
|
||||||
|
Example build template for archlinux:
|
||||||
|
```bash
|
||||||
|
set -xeuo pipefail
|
||||||
|
|
||||||
|
cd {{ .DriverBuildDir }}
|
||||||
|
mkdir -p build && cd build
|
||||||
|
{{ .CmakeCmd }}
|
||||||
|
|
||||||
|
{{ if .BuildModule }}
|
||||||
|
# Build the module
|
||||||
|
make CC=/usr/bin/gcc-{{ .GCCVersion }} driver
|
||||||
|
strip -g {{ .ModuleFullPath }}
|
||||||
|
# Print results
|
||||||
|
modinfo {{ .ModuleFullPath }}
|
||||||
|
{{ end }}
|
||||||
|
|
||||||
|
{{ if .BuildProbe }}
|
||||||
|
# Build the eBPF probe
|
||||||
|
make bpf
|
||||||
|
ls -l driver/bpf/probe.o
|
||||||
|
{{ end }}
|
||||||
|
```
|
||||||
|
|
||||||
|
How does this work?
|
||||||
|
|
||||||
|
If the user specifies:
|
||||||
|
|
||||||
|
- `c.Build.ModuleFilePath` you will need to build the kernel module and save it in /tmp/driver/falco.ko`
|
||||||
|
- `c.Build.ProbeFilePath` you will need to build the eBPF probe and save it in /tmp/driver/probe.o`
|
||||||
|
|
||||||
|
The `/tmp/driver` MUST be interpolated from the `DriverDirectory` constant from [`builders.go`](/pkg/driverbuilder/builder/builders.go).
|
||||||
|
|
||||||
|
If you look at the various builder implemented, you will see that the task of creating a new builder
|
||||||
|
can be easy or difficult depending on how the distribution ships their artifacts.
|
||||||
|
Indeed, the hardest part is fetching the kernel headers urls for each distro.
|
||||||
|
|
||||||
|
### 3. Customize GCC version
|
||||||
|
|
||||||
|
A builder can enforce a GCC selection algorithm,
|
||||||
|
by implementing the `builder.GCCVersionRequestor` interface.
|
||||||
|
A sane default algorithm is provided, that selects a GCC version based on the kernel version.
|
||||||
|
The requested gcc version is then [used to find the correct builder image to be used](builder_images.md#selection-algorithm).
|
||||||
|
|
||||||
|
> **NOTE**: when implementing the `builder.GCCVersionRequestor`, returning an empty `semver.Version` means to fallback at default algorithm.
|
||||||
|
|
||||||
|
However, there is no mechanism to dynamically choose a clang version, because there should never be any need of touching it.
|
||||||
|
The build will use the one provided by the chosen builder image.
|
||||||
|
Any failure must be treated as a bug, and reported on [libs](https://github.com/falcosecurity/libs) repository.
|
||||||
|
|
||||||
|
### 5. kernel-crawler
|
||||||
|
|
||||||
|
When creating a new builder, it is recommended to check that [kernel-crawler](https://github.com/falcosecurity/kernel-crawler)
|
||||||
|
can also support collecting the new builders kernel versions and header package URLs. This will make sure that the latest drivers
|
||||||
|
for the new builder are automatically built by [test-infra](https://github.com/falcosecurity/test-infra). If required, add a feature request
|
||||||
|
for support for the new builder on the kernel-crawler repository.
|
||||||
|
|
||||||
|
> **NOTE**: be sure that the crawler you are going to add is interesting for the community as a whole.
|
|
@ -0,0 +1,68 @@
|
||||||
|
# Builder Images
|
||||||
|
|
||||||
|
Driverkit supports multiple builder images.
|
||||||
|
A builder image is the docker image used to build the drivers.
|
||||||
|
|
||||||
|
## Adding a builder image
|
||||||
|
|
||||||
|
Adding a builder image is just a matter of adding a new dockerfile under the [docker/builders](../docker/builders) folder,
|
||||||
|
with a name matching the following regex: `builder-(?P<target>[a-z0-9]+)-(?P<arch>x86_64|aarch64)(?P<gccVers>(_gcc[0-9]+.[0-9]+.[0-9]+)+).Dockerfile$`.
|
||||||
|
For example: `builder-centos-x86_64_gcc5.8.0_gcc6.0.0.Dockerfile`.
|
||||||
|
|
||||||
|
> **NOTE:** `any` is also a valid target, and means "apply as fallback for any target"
|
||||||
|
|
||||||
|
The image **MUST** symlink all of its provided GCC versions to their full semver name, like:
|
||||||
|
* `/usr/bin/gcc5` must be linked to `/usr/bin/gcc-5.0.0`
|
||||||
|
* `/usr/bin/gcc-4.8` must be linked to `/usr/bin/gcc-4.8.0`
|
||||||
|
|
||||||
|
This is needed because driverkit logic must be able to differentiate eg: between
|
||||||
|
an image that provides gcc4 and one that provides 4.8, in a reliable manner.
|
||||||
|
|
||||||
|
The makefile will be then automatically able to collect the new docker images and pushing it as part of the CI.
|
||||||
|
Note: the images will be pushed under the `falcosecurity/driverkit-builder` repository, each with a tag reflecting its name, eg:
|
||||||
|
* `falcosecurity/driverkit-builder:centos-x86_64_gcc5.8.0_gcc6.0.0-latest`
|
||||||
|
* `falcosecurity/driverkit-builder:any-x86_64_gcc12.0.0-454eff8fcc7d9abc615d312e9eccbd41abffb810`
|
||||||
|
|
||||||
|
As you can see, the last part of the image tag is the real versioned tag (ie: `-latest` or `-$commithash`).
|
||||||
|
|
||||||
|
## Selection algorithm
|
||||||
|
|
||||||
|
Once pushed, driverkit will be able to correctly load the image during startup, using [falcoctl](https://github.com/falcosecurity/falcoctl/) OCI utilities.
|
||||||
|
Then, it will map images whose target and architecture are correct for the current build, storing the provided GCCs list.
|
||||||
|
Moreover, it will also take care of only using images with correct tag (ie: `latest` or `commithash`), as requested by user or automatically set by Makefile.
|
||||||
|
The algorithm goes as follows:
|
||||||
|
* load any image for the build arch, tag and target
|
||||||
|
* load any image for the build arch, tag and "any" target
|
||||||
|
* if any of the target-specific image provides the targetGCC for the build, we are over
|
||||||
|
* if any of the "any" fallback image provides the targetGCC for the build, we are over
|
||||||
|
* else, find the image between target-specific and fallback ones, that provides nearest GCC.
|
||||||
|
In this latest step, there is no distinction between/different priority given to target specific or fallback images.
|
||||||
|
|
||||||
|
## Customize builder images repos
|
||||||
|
|
||||||
|
Moreover, users can also ship their own builder images in their own docker repositories, by using `--builderrepo` CLI option.
|
||||||
|
|
||||||
|
Instead of passing a docker repo, one can also pass the full path to a so-called builder images index yaml file.
|
||||||
|
It is mostly convenient in "static" scenarios, but it also gives the ability to freely define images name since all required infos are explicitly stated in the index file.
|
||||||
|
For an example of such a file, see [index.yaml](./index.yaml).
|
||||||
|
|
||||||
|
One can use this option multiple times; builder repos are a priority first list of docker repositories or builder images indexes (they can be mixed too!).
|
||||||
|
|
||||||
|
## Force use a builder image
|
||||||
|
|
||||||
|
Users can also force-specify the builder image to be used for the current build,
|
||||||
|
instead of relying on the internal algorithm, by using `--builderimage` CLI option.
|
||||||
|
|
||||||
|
> **NOTE**: builderimage MUST provide the selected gcc for the build
|
||||||
|
|
||||||
|
A special value for builder image is available:
|
||||||
|
* `auto:$tag`, that is used to tell driverkit to use the automatic algorithm, but forcing a certain image tag
|
||||||
|
|
||||||
|
## Force use a gcc version
|
||||||
|
|
||||||
|
Users can specify the target gcc version of the build, using `--gccversion` option.
|
||||||
|
As seen above, this needs to be a fully expanded gcc version, like `4.8.0`, or `8.0.0`.
|
||||||
|
When set, the image selection algorithm will pick the best builder image,
|
||||||
|
ie: the one that provides the nearest gcc version.
|
||||||
|
One can also play with both `--gccversion` and `--builderimage` options to enforce the
|
||||||
|
usage of a specific builder image that ships a specific gcc version.
|
|
@ -2,10 +2,6 @@
|
||||||
|
|
||||||
A command line tool to build Falco kernel modules and eBPF probes.
|
A command line tool to build Falco kernel modules and eBPF probes.
|
||||||
|
|
||||||
### Synopsis
|
|
||||||
|
|
||||||
A command line tool to build Falco kernel modules and eBPF probes.
|
|
||||||
|
|
||||||
```
|
```
|
||||||
driverkit
|
driverkit
|
||||||
```
|
```
|
||||||
|
@ -13,28 +9,40 @@ driverkit
|
||||||
### Options
|
### Options
|
||||||
|
|
||||||
```
|
```
|
||||||
--architecture string target architecture for the built driver (default "$runtime.GOARCH")
|
--architecture string target architecture for the built driver, one of [amd64,arm64] (default "amd64")
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, an automatically selected image will be used.
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
--builderrepo strings list of docker repositories or yaml file (absolute path) containing builder images index with the format 'images: [ { target:<target>, name:<image-name>, arch: <arch>, tag: <imagetag>, gcc_versions: [ <gcc-tag> ] },...]', in descending priority order. Used to search for builder images. eg: --builderrepo myorg/driverkit-builder --builderrepo falcosecurity/driverkit-builder --builderrepo '/path/to/my/index.yaml'. (default [docker.io/falcosecurity/driverkit-builder])
|
||||||
--dryrun do not actually perform the action
|
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
||||||
-h, --help help for driverkit
|
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
--dryrun do not actually perform the action
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
--gccversion string enforce a specific gcc version for the build
|
||||||
--kernelurls []string list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
-h, --help help for driverkit
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
||||||
-l, --loglevel string log level (default "info")
|
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
--kernelversion string kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default "1")
|
||||||
--output-module string filepath where to save the resulting kernel module
|
-l, --loglevel string set level for logs (info, warn, debug, trace) (default "info")
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
||||||
--proxy string the proxy to use to download data
|
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
||||||
-t, --target string the system to target the build for
|
--output-module string filepath where to save the resulting kernel module
|
||||||
--timeout int timeout in seconds (default 120)
|
--output-probe string filepath where to save the resulting eBPF probe
|
||||||
|
--proxy string the proxy to use to download data
|
||||||
|
--registry-name string registry name to which authenticate
|
||||||
|
--registry-password string registry password
|
||||||
|
--registry-plain-http allows interacting with remote registry via plain http requests
|
||||||
|
--registry-user string registry username
|
||||||
|
--repo-name string repository github name (default "libs")
|
||||||
|
--repo-org string repository github organization (default "falcosecurity")
|
||||||
|
-t, --target string the system to target the build for, one of [alinux,almalinux,amazonlinux,amazonlinux2,amazonlinux2022,amazonlinux2023,arch,bottlerocket,centos,debian,fedora,flatcar,minikube,ol,opensuse,photon,redhat,rocky,sles,talos,ubuntu,vanilla]
|
||||||
|
--timeout int timeout in seconds (default 120)
|
||||||
```
|
```
|
||||||
|
|
||||||
### SEE ALSO
|
### SEE ALSO
|
||||||
|
|
||||||
* [driverkit completion](driverkit_completion.md) - Generates completion scripts.
|
* [driverkit completion](driverkit_completion.md) - Generates completion scripts.
|
||||||
* [driverkit docker](driverkit_docker.md) - Build Falco kernel modules and eBPF probes against a docker daemon.
|
* [driverkit docker](driverkit_docker.md) - Build Falco kernel modules and eBPF probes against a docker daemon.
|
||||||
|
* [driverkit images](driverkit_images.md) - List builder images
|
||||||
* [driverkit kubernetes](driverkit_kubernetes.md) - Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
* [driverkit kubernetes](driverkit_kubernetes.md) - Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
||||||
|
* [driverkit kubernetes-in-cluster](driverkit_kubernetes-in-cluster.md) - Build Falco kernel modules and eBPF probes against a Kubernetes cluster inside a Kubernetes cluster.
|
||||||
|
* [driverkit local](driverkit_local.md) - Build Falco kernel modules and eBPF probes in local env with local kernel sources and gcc/clang.
|
||||||
|
|
||||||
|
|
|
@ -2,10 +2,6 @@
|
||||||
|
|
||||||
Build Falco kernel modules and eBPF probes against a docker daemon.
|
Build Falco kernel modules and eBPF probes against a docker daemon.
|
||||||
|
|
||||||
### Synopsis
|
|
||||||
|
|
||||||
Build Falco kernel modules and eBPF probes against a docker daemon.
|
|
||||||
|
|
||||||
```
|
```
|
||||||
driverkit docker [flags]
|
driverkit docker [flags]
|
||||||
```
|
```
|
||||||
|
@ -13,24 +9,32 @@ driverkit docker [flags]
|
||||||
### Options
|
### Options
|
||||||
|
|
||||||
```
|
```
|
||||||
--architecture string target architecture for the built driver (default "$runtime.GOARCH")
|
--architecture string target architecture for the built driver, one of [amd64,arm64] (default "amd64")
|
||||||
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, the default image will be used. (default "falcosecurity/driverkit-builder:latest")
|
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, an automatically selected image will be used.
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
--builderrepo strings list of docker repositories or yaml file (absolute path) containing builder images index with the format 'images: [ { target:<target>, name:<image-name>, arch: <arch>, tag: <imagetag>, gcc_versions: [ <gcc-tag> ] },...]', in descending priority order. Used to search for builder images. eg: --builderrepo myorg/driverkit-builder --builderrepo falcosecurity/driverkit-builder --builderrepo '/path/to/my/index.yaml'. (default [docker.io/falcosecurity/driverkit-builder])
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
||||||
--dryrun do not actually perform the action
|
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
||||||
-h, --help help for docker
|
--dryrun do not actually perform the action
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
--gccversion string enforce a specific gcc version for the build
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
-h, --help help for docker
|
||||||
--kernelurls []string list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
||||||
-l, --loglevel string log level (default "info")
|
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
--kernelversion string kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default "1")
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
-l, --loglevel string set level for logs (info, warn, debug, trace) (default "info")
|
||||||
--output-module string filepath where to save the resulting kernel module
|
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
||||||
--proxy string the proxy to use to download data
|
--output-module string filepath where to save the resulting kernel module
|
||||||
-t, --target string the system to target the build for
|
--output-probe string filepath where to save the resulting eBPF probe
|
||||||
--timeout int timeout in seconds (default 120)
|
--proxy string the proxy to use to download data
|
||||||
|
--registry-name string registry name to which authenticate
|
||||||
|
--registry-password string registry password
|
||||||
|
--registry-plain-http allows interacting with remote registry via plain http requests
|
||||||
|
--registry-user string registry username
|
||||||
|
--repo-name string repository github name (default "libs")
|
||||||
|
--repo-org string repository github organization (default "falcosecurity")
|
||||||
|
-t, --target string the system to target the build for, one of [alinux,almalinux,amazonlinux,amazonlinux2,amazonlinux2022,amazonlinux2023,arch,bottlerocket,centos,debian,fedora,flatcar,minikube,ol,opensuse,photon,redhat,rocky,sles,talos,ubuntu,vanilla]
|
||||||
|
--timeout int timeout in seconds (default 120)
|
||||||
```
|
```
|
||||||
|
|
||||||
### SEE ALSO
|
### SEE ALSO
|
||||||
|
|
|
@ -0,0 +1,43 @@
|
||||||
|
## driverkit images
|
||||||
|
|
||||||
|
List builder images
|
||||||
|
|
||||||
|
```
|
||||||
|
driverkit images [flags]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
--architecture string target architecture for the built driver, one of [amd64,arm64] (default "amd64")
|
||||||
|
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, an automatically selected image will be used.
|
||||||
|
--builderrepo strings list of docker repositories or yaml file (absolute path) containing builder images index with the format 'images: [ { target:<target>, name:<image-name>, arch: <arch>, tag: <imagetag>, gcc_versions: [ <gcc-tag> ] },...]', in descending priority order. Used to search for builder images. eg: --builderrepo myorg/driverkit-builder --builderrepo falcosecurity/driverkit-builder --builderrepo '/path/to/my/index.yaml'. (default [docker.io/falcosecurity/driverkit-builder])
|
||||||
|
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
||||||
|
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
||||||
|
--dryrun do not actually perform the action
|
||||||
|
--gccversion string enforce a specific gcc version for the build
|
||||||
|
-h, --help help for images
|
||||||
|
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
||||||
|
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
||||||
|
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
||||||
|
--kernelversion string kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default "1")
|
||||||
|
-l, --loglevel string set level for logs (info, warn, debug, trace) (default "info")
|
||||||
|
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
||||||
|
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
||||||
|
--output-module string filepath where to save the resulting kernel module
|
||||||
|
--output-probe string filepath where to save the resulting eBPF probe
|
||||||
|
--proxy string the proxy to use to download data
|
||||||
|
--registry-name string registry name to which authenticate
|
||||||
|
--registry-password string registry password
|
||||||
|
--registry-plain-http allows interacting with remote registry via plain http requests
|
||||||
|
--registry-user string registry username
|
||||||
|
--repo-name string repository github name (default "libs")
|
||||||
|
--repo-org string repository github organization (default "falcosecurity")
|
||||||
|
-t, --target string the system to target the build for, one of [alinux,almalinux,amazonlinux,amazonlinux2,amazonlinux2022,amazonlinux2023,arch,bottlerocket,centos,debian,fedora,flatcar,minikube,ol,opensuse,photon,redhat,rocky,sles,talos,ubuntu,vanilla]
|
||||||
|
--timeout int timeout in seconds (default 120)
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [driverkit](driverkit.md) - A command line tool to build Falco kernel modules and eBPF probes.
|
||||||
|
|
|
@ -0,0 +1,46 @@
|
||||||
|
## driverkit kubernetes-in-cluster
|
||||||
|
|
||||||
|
Build Falco kernel modules and eBPF probes against a Kubernetes cluster inside a Kubernetes cluster.
|
||||||
|
|
||||||
|
```
|
||||||
|
driverkit kubernetes-in-cluster [flags]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
--architecture string target architecture for the built driver, one of [amd64,arm64] (default "amd64")
|
||||||
|
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, an automatically selected image will be used.
|
||||||
|
--builderrepo strings list of docker repositories or yaml file (absolute path) containing builder images index with the format 'images: [ { target:<target>, name:<image-name>, arch: <arch>, tag: <imagetag>, gcc_versions: [ <gcc-tag> ] },...]', in descending priority order. Used to search for builder images. eg: --builderrepo myorg/driverkit-builder --builderrepo falcosecurity/driverkit-builder --builderrepo '/path/to/my/index.yaml'. (default [docker.io/falcosecurity/driverkit-builder])
|
||||||
|
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
||||||
|
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
||||||
|
--dryrun do not actually perform the action
|
||||||
|
--gccversion string enforce a specific gcc version for the build
|
||||||
|
-h, --help help for kubernetes-in-cluster
|
||||||
|
--image-pull-secret string ImagePullSecret
|
||||||
|
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
||||||
|
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
||||||
|
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
||||||
|
--kernelversion string kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default "1")
|
||||||
|
-l, --loglevel string set level for logs (info, warn, debug, trace) (default "info")
|
||||||
|
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
||||||
|
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
||||||
|
-n, --namespace string If present, the namespace scope for the pods and its config (default "default")
|
||||||
|
--output-module string filepath where to save the resulting kernel module
|
||||||
|
--output-probe string filepath where to save the resulting eBPF probe
|
||||||
|
--proxy string the proxy to use to download data
|
||||||
|
--registry-name string registry name to which authenticate
|
||||||
|
--registry-password string registry password
|
||||||
|
--registry-plain-http allows interacting with remote registry via plain http requests
|
||||||
|
--registry-user string registry username
|
||||||
|
--repo-name string repository github name (default "libs")
|
||||||
|
--repo-org string repository github organization (default "falcosecurity")
|
||||||
|
--run-as-user int Pods runner user
|
||||||
|
-t, --target string the system to target the build for, one of [alinux,almalinux,amazonlinux,amazonlinux2,amazonlinux2022,amazonlinux2023,arch,bottlerocket,centos,debian,fedora,flatcar,minikube,ol,opensuse,photon,redhat,rocky,sles,talos,ubuntu,vanilla]
|
||||||
|
--timeout int timeout in seconds (default 120)
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [driverkit](driverkit.md) - A command line tool to build Falco kernel modules and eBPF probes.
|
||||||
|
|
|
@ -2,10 +2,6 @@
|
||||||
|
|
||||||
Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
||||||
|
|
||||||
### Synopsis
|
|
||||||
|
|
||||||
Build Falco kernel modules and eBPF probes against a Kubernetes cluster.
|
|
||||||
|
|
||||||
```
|
```
|
||||||
driverkit kubernetes [flags]
|
driverkit kubernetes [flags]
|
||||||
```
|
```
|
||||||
|
@ -13,36 +9,50 @@ driverkit kubernetes [flags]
|
||||||
### Options
|
### Options
|
||||||
|
|
||||||
```
|
```
|
||||||
--architecture string target architecture for the built driver (default "$runtime.GOARCH")
|
--architecture string target architecture for the built driver, one of [amd64,arm64] (default "amd64")
|
||||||
--as string username to impersonate for the operation
|
--as string username to impersonate for the operation, user could be a regular user or a service account in a namespace
|
||||||
--as-group stringArray group to impersonate for the operation, this flag can be repeated to specify multiple groups
|
--as-group stringArray group to impersonate for the operation, this flag can be repeated to specify multiple groups
|
||||||
--cache-dir string default HTTP cache directory (default "$HOME/.kube/http-cache")
|
--as-uid string uID to impersonate for the operation
|
||||||
|
--builderimage string docker image to be used to build the kernel module and eBPF probe. If not provided, an automatically selected image will be used.
|
||||||
|
--builderrepo strings list of docker repositories or yaml file (absolute path) containing builder images index with the format 'images: [ { target:<target>, name:<image-name>, arch: <arch>, tag: <imagetag>, gcc_versions: [ <gcc-tag> ] },...]', in descending priority order. Used to search for builder images. eg: --builderrepo myorg/driverkit-builder --builderrepo falcosecurity/driverkit-builder --builderrepo '/path/to/my/index.yaml'. (default [docker.io/falcosecurity/driverkit-builder])
|
||||||
|
--cache-dir string default cache directory (default "$HOME/.kube/cache")
|
||||||
--certificate-authority string path to a cert file for the certificate authority
|
--certificate-authority string path to a cert file for the certificate authority
|
||||||
--client-certificate string path to a client certificate file for TLS
|
--client-certificate string path to a client certificate file for TLS
|
||||||
--client-key string path to a client key file for TLS
|
--client-key string path to a client key file for TLS
|
||||||
--cluster string the name of the kubeconfig cluster to use
|
--cluster string the name of the kubeconfig cluster to use
|
||||||
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
||||||
--context string the name of the kubeconfig context to use
|
--context string the name of the kubeconfig context to use
|
||||||
|
--disable-compression if true, opt-out of response compression for all requests to the server
|
||||||
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
||||||
--dryrun do not actually perform the action
|
--dryrun do not actually perform the action
|
||||||
|
--gccversion string enforce a specific gcc version for the build
|
||||||
-h, --help help for kubernetes
|
-h, --help help for kubernetes
|
||||||
|
--image-pull-secret string ImagePullSecret
|
||||||
--insecure-skip-tls-verify if true, the server's certificate will not be checked for validity, this will make your HTTPS connections insecure
|
--insecure-skip-tls-verify if true, the server's certificate will not be checked for validity, this will make your HTTPS connections insecure
|
||||||
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
--kernelconfigdata string base64 encoded kernel config data: in some systems it can be found under the /boot directory, in other it is gzip compressed under /proc
|
||||||
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
||||||
--kernelurls []string list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
--kernelurls strings list of kernel header urls (e.g. --kernelurls <URL1> --kernelurls <URL2> --kernelurls "<URL3>,<URL4>")
|
||||||
--kernelversion uint16 kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default 1)
|
--kernelversion string kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default "1")
|
||||||
--kubeconfig string path to the kubeconfig file to use for CLI requests
|
--kubeconfig string path to the kubeconfig file to use for CLI requests
|
||||||
-l, --loglevel string log level (default "info")
|
-l, --loglevel string set level for logs (info, warn, debug, trace) (default "info")
|
||||||
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
||||||
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
||||||
-n, --namespace string if present, the namespace scope for this CLI request
|
-n, --namespace string If present, the namespace scope for the pods and its config (default "default")
|
||||||
--output-module string filepath where to save the resulting kernel module
|
--output-module string filepath where to save the resulting kernel module
|
||||||
--output-probe string filepath where to save the resulting eBPF probe
|
--output-probe string filepath where to save the resulting eBPF probe
|
||||||
--proxy string the proxy to use to download data
|
--proxy string the proxy to use to download data
|
||||||
|
--registry-name string registry name to which authenticate
|
||||||
|
--registry-password string registry password
|
||||||
|
--registry-plain-http allows interacting with remote registry via plain http requests
|
||||||
|
--registry-user string registry username
|
||||||
|
--repo-name string repository github name (default "libs")
|
||||||
|
--repo-org string repository github organization (default "falcosecurity")
|
||||||
--request-timeout string the length of time to wait before giving up on a single server request, non-zero values should contain a corresponding time unit (e.g, 1s, 2m, 3h), a value of zero means don't timeout requests (default "0")
|
--request-timeout string the length of time to wait before giving up on a single server request, non-zero values should contain a corresponding time unit (e.g, 1s, 2m, 3h), a value of zero means don't timeout requests (default "0")
|
||||||
|
--run-as-user int Pods runner user
|
||||||
-s, --server string the address and port of the Kubernetes API server
|
-s, --server string the address and port of the Kubernetes API server
|
||||||
-t, --target string the system to target the build for
|
-t, --target string the system to target the build for, one of [alinux,almalinux,amazonlinux,amazonlinux2,amazonlinux2022,amazonlinux2023,arch,bottlerocket,centos,debian,fedora,flatcar,minikube,ol,opensuse,photon,redhat,rocky,sles,talos,ubuntu,vanilla]
|
||||||
--timeout int timeout in seconds (default 120)
|
--timeout int timeout in seconds (default 120)
|
||||||
|
--tls-server-name string server name to use for server certificate validation, if it is not provided, the hostname used to contact the server is used
|
||||||
--token string bearer token for authentication to the API server
|
--token string bearer token for authentication to the API server
|
||||||
--user string the name of the kubeconfig user to use
|
--user string the name of the kubeconfig user to use
|
||||||
```
|
```
|
||||||
|
|
|
@ -0,0 +1,36 @@
|
||||||
|
## driverkit local
|
||||||
|
|
||||||
|
Build Falco kernel modules and eBPF probes in local env with local kernel sources and gcc/clang.
|
||||||
|
|
||||||
|
```
|
||||||
|
driverkit local [flags]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
-c, --config string config file path (default $HOME/.driverkit.yaml if exists)
|
||||||
|
--dkms Enforce usage of DKMS to build the kernel module.
|
||||||
|
--download-headers Try to automatically download kernel headers.
|
||||||
|
--driverversion string driver version as a git commit hash or as a git tag (default "master")
|
||||||
|
--dryrun do not actually perform the action
|
||||||
|
--env stringToString Env variables to be enforced during the driver build. (default [])
|
||||||
|
-h, --help help for local
|
||||||
|
--kernelrelease string kernel release to build the module for, it can be found by executing 'uname -v'
|
||||||
|
--kernelversion string kernel version to build the module for, it's the numeric value after the hash when you execute 'uname -v' (default "1")
|
||||||
|
-l, --loglevel string set level for logs (info, warn, debug, trace) (default "info")
|
||||||
|
--moduledevicename string kernel module device name (the default is falco, so the device will be under /dev/falco*) (default "falco")
|
||||||
|
--moduledrivername string kernel module driver name, i.e. the name you see when you check installed modules via lsmod (default "falco")
|
||||||
|
--output-module string filepath where to save the resulting kernel module
|
||||||
|
--output-probe string filepath where to save the resulting eBPF probe
|
||||||
|
--repo-name string repository github name (default "libs")
|
||||||
|
--repo-org string repository github organization (default "falcosecurity")
|
||||||
|
--src-dir string Enforce usage of local source dir to build drivers.
|
||||||
|
-t, --target string the system to target the build for, one of [alinux,almalinux,amazonlinux,amazonlinux2,amazonlinux2022,amazonlinux2023,arch,bottlerocket,centos,debian,fedora,flatcar,minikube,ol,opensuse,photon,redhat,rocky,sles,talos,ubuntu,vanilla]
|
||||||
|
--timeout int timeout in seconds (default 120)
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [driverkit](driverkit.md) - A command line tool to build Falco kernel modules and eBPF probes.
|
||||||
|
|
|
@ -0,0 +1,31 @@
|
||||||
|
images:
|
||||||
|
- name: docker.io/falcosecurity/driverkit-builder:any-x86_64_gcc8.0.0_gcc6.0.0_gcc5.0.0_gcc4.9.0_gcc4.8.0-latest
|
||||||
|
target: any
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 8.0.0
|
||||||
|
- 6.0.0
|
||||||
|
- 5.0.0
|
||||||
|
- 4.9.0
|
||||||
|
- 4.8.0
|
||||||
|
# Name is just the image name that will be used to download the image.
|
||||||
|
# Contrarily to normal repo lister there is no constraint on it,
|
||||||
|
# since all fields are already explicitly available
|
||||||
|
- name: docker.io/foo/bar:mytag
|
||||||
|
target: arch
|
||||||
|
arch: x86_64
|
||||||
|
tag: mytag
|
||||||
|
gcc_versions:
|
||||||
|
- 13.1.1
|
||||||
|
|
||||||
|
# Image name tag ("mytag" in this case)
|
||||||
|
# is not even required to match "tag" property below,
|
||||||
|
# since the latter is used to match against the desired builder image tag for the build,
|
||||||
|
# while the former is the real image tag that will be used.
|
||||||
|
- name: docker.io/foo/baz:mytag
|
||||||
|
target: arch
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 13.1.1
|
180
go.mod
180
go.mod
|
@ -1,34 +1,162 @@
|
||||||
module github.com/falcosecurity/driverkit
|
module github.com/falcosecurity/driverkit
|
||||||
|
|
||||||
go 1.16
|
go 1.24.1
|
||||||
|
|
||||||
|
toolchain go1.24.2
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/Masterminds/semver/v3 v3.1.1
|
|
||||||
github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d
|
github.com/acarl005/stripansi v0.0.0-20180116102854-5a71ef0e047d
|
||||||
github.com/containerd/containerd v1.6.3 // indirect
|
github.com/blang/semver/v4 v4.0.0
|
||||||
github.com/creasty/defaults v1.6.0
|
github.com/creasty/defaults v1.7.0
|
||||||
github.com/docker/distribution v2.8.1+incompatible // indirect
|
github.com/docker/docker v28.3.3+incompatible
|
||||||
github.com/docker/docker v20.10.14+incompatible
|
github.com/falcosecurity/falcoctl v0.11.1
|
||||||
github.com/go-playground/locales v0.14.0
|
github.com/go-playground/locales v0.14.1
|
||||||
github.com/go-playground/universal-translator v0.18.0
|
github.com/go-playground/universal-translator v0.18.1
|
||||||
github.com/go-playground/validator/v10 v10.10.1
|
github.com/go-playground/validator/v10 v10.24.0
|
||||||
github.com/mitchellh/go-homedir v1.1.0
|
github.com/mitchellh/go-homedir v1.1.0
|
||||||
github.com/moby/sys/mount v0.3.3 // indirect
|
github.com/olekukonko/tablewriter v0.0.5
|
||||||
github.com/moby/term v0.0.0-20210619224110-3f7ff695adc6 // indirect
|
github.com/opencontainers/image-spec v1.1.1
|
||||||
github.com/opencontainers/image-spec v1.0.3-0.20211202183452-c5a74bcca799
|
github.com/pterm/pterm v0.12.80
|
||||||
github.com/sirupsen/logrus v1.8.1
|
github.com/spf13/cobra v1.9.1
|
||||||
github.com/spf13/cobra v1.4.0
|
github.com/spf13/pflag v1.0.6
|
||||||
github.com/spf13/pflag v1.0.5
|
github.com/spf13/viper v1.20.0
|
||||||
github.com/spf13/viper v1.11.0
|
gopkg.in/yaml.v3 v3.0.1
|
||||||
golang.org/x/time v0.0.0-20220411224347-583f2d630306 // indirect
|
|
||||||
google.golang.org/grpc v1.46.0 // indirect
|
|
||||||
gotest.tools v2.2.0+incompatible
|
gotest.tools v2.2.0+incompatible
|
||||||
gotest.tools/v3 v3.2.0 // indirect
|
k8s.io/api v0.32.3
|
||||||
k8s.io/api v0.23.6
|
k8s.io/apimachinery v0.32.3
|
||||||
k8s.io/apimachinery v0.23.6
|
k8s.io/cli-runtime v0.30.0
|
||||||
k8s.io/cli-runtime v0.23.6
|
k8s.io/client-go v0.32.3
|
||||||
k8s.io/client-go v0.23.6
|
k8s.io/kubectl v0.30.0
|
||||||
k8s.io/kubectl v0.23.6
|
k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738
|
||||||
k8s.io/utils v0.0.0-20220210201930-3a6ce19ff2f9
|
modernc.org/sqlite v1.29.9
|
||||||
modernc.org/sqlite v1.17.3
|
oras.land/oras-go/v2 v2.5.0
|
||||||
|
)
|
||||||
|
|
||||||
|
require (
|
||||||
|
atomicgo.dev/cursor v0.2.0 // indirect
|
||||||
|
atomicgo.dev/keyboard v0.2.9 // indirect
|
||||||
|
atomicgo.dev/schedule v0.1.0 // indirect
|
||||||
|
github.com/Azure/go-ansiterm v0.0.0-20250102033503-faa5f7b0171c // indirect
|
||||||
|
github.com/MakeNowJust/heredoc v1.0.0 // indirect
|
||||||
|
github.com/Microsoft/go-winio v0.6.2 // indirect
|
||||||
|
github.com/chai2010/gettext-go v1.0.3 // indirect
|
||||||
|
github.com/containerd/console v1.0.4 // indirect
|
||||||
|
github.com/containerd/errdefs v1.0.0 // indirect
|
||||||
|
github.com/containerd/errdefs/pkg v0.3.0 // indirect
|
||||||
|
github.com/containerd/log v0.1.0 // indirect
|
||||||
|
github.com/cpuguy83/go-md2man/v2 v2.0.6 // indirect
|
||||||
|
github.com/creack/pty v1.1.21 // indirect
|
||||||
|
github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc // indirect
|
||||||
|
github.com/distribution/reference v0.6.0 // indirect
|
||||||
|
github.com/docker/go-connections v0.5.0 // indirect
|
||||||
|
github.com/docker/go-units v0.5.0 // indirect
|
||||||
|
github.com/dustin/go-humanize v1.0.1 // indirect
|
||||||
|
github.com/emicklei/go-restful/v3 v3.12.0 // indirect
|
||||||
|
github.com/evanphx/json-patch v5.9.0+incompatible // indirect
|
||||||
|
github.com/exponent-io/jsonpath v0.0.0-20210407135951-1de76d718b3f // indirect
|
||||||
|
github.com/fatih/camelcase v1.0.0 // indirect
|
||||||
|
github.com/felixge/httpsnoop v1.0.4 // indirect
|
||||||
|
github.com/fsnotify/fsnotify v1.8.0 // indirect
|
||||||
|
github.com/fvbommel/sortorder v1.1.0 // indirect
|
||||||
|
github.com/fxamacker/cbor/v2 v2.7.0 // indirect
|
||||||
|
github.com/gabriel-vasile/mimetype v1.4.8 // indirect
|
||||||
|
github.com/go-errors/errors v1.5.1 // indirect
|
||||||
|
github.com/go-logr/logr v1.4.2 // indirect
|
||||||
|
github.com/go-logr/stdr v1.2.2 // indirect
|
||||||
|
github.com/go-openapi/jsonpointer v0.21.0 // indirect
|
||||||
|
github.com/go-openapi/jsonreference v0.21.0 // indirect
|
||||||
|
github.com/go-openapi/swag v0.23.0 // indirect
|
||||||
|
github.com/go-viper/mapstructure/v2 v2.3.0 // indirect
|
||||||
|
github.com/gogo/protobuf v1.3.2 // indirect
|
||||||
|
github.com/golang/protobuf v1.5.4 // indirect
|
||||||
|
github.com/google/btree v1.1.3 // indirect
|
||||||
|
github.com/google/gnostic-models v0.6.9-0.20230804172637-c7be7c783f49 // indirect
|
||||||
|
github.com/google/go-cmp v0.7.0 // indirect
|
||||||
|
github.com/google/gofuzz v1.2.0 // indirect
|
||||||
|
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect
|
||||||
|
github.com/google/uuid v1.6.0 // indirect
|
||||||
|
github.com/gookit/color v1.5.4 // indirect
|
||||||
|
github.com/gorilla/websocket v1.5.1 // indirect
|
||||||
|
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 // indirect
|
||||||
|
github.com/hashicorp/golang-lru/v2 v2.0.7 // indirect
|
||||||
|
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
||||||
|
github.com/josharian/intern v1.0.0 // indirect
|
||||||
|
github.com/json-iterator/go v1.1.12 // indirect
|
||||||
|
github.com/klauspost/compress v1.18.0 // indirect
|
||||||
|
github.com/leodido/go-urn v1.4.0 // indirect
|
||||||
|
github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de // indirect
|
||||||
|
github.com/lithammer/fuzzysearch v1.1.8 // indirect
|
||||||
|
github.com/mailru/easyjson v0.7.7 // indirect
|
||||||
|
github.com/mattn/go-isatty v0.0.20 // indirect
|
||||||
|
github.com/mattn/go-runewidth v0.0.16 // indirect
|
||||||
|
github.com/mitchellh/go-wordwrap v1.0.1 // indirect
|
||||||
|
github.com/moby/docker-image-spec v1.3.1 // indirect
|
||||||
|
github.com/moby/go-archive v0.1.0 // indirect
|
||||||
|
github.com/moby/patternmatcher v0.6.0 // indirect
|
||||||
|
github.com/moby/spdystream v0.5.0 // indirect
|
||||||
|
github.com/moby/sys/atomicwriter v0.1.0 // indirect
|
||||||
|
github.com/moby/sys/sequential v0.6.0 // indirect
|
||||||
|
github.com/moby/sys/user v0.4.0 // indirect
|
||||||
|
github.com/moby/sys/userns v0.1.0 // indirect
|
||||||
|
github.com/moby/term v0.5.2 // indirect
|
||||||
|
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
|
||||||
|
github.com/modern-go/reflect2 v1.0.2 // indirect
|
||||||
|
github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 // indirect
|
||||||
|
github.com/morikuni/aec v1.0.0 // indirect
|
||||||
|
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
|
||||||
|
github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f // indirect
|
||||||
|
github.com/ncruces/go-strftime v0.1.9 // indirect
|
||||||
|
github.com/opencontainers/go-digest v1.0.0 // indirect
|
||||||
|
github.com/pelletier/go-toml/v2 v2.2.3 // indirect
|
||||||
|
github.com/peterbourgon/diskv v2.0.1+incompatible // indirect
|
||||||
|
github.com/pkg/errors v0.9.1 // indirect
|
||||||
|
github.com/remyoudompheng/bigfft v0.0.0-20230129092748-24d4a6f8daec // indirect
|
||||||
|
github.com/rivo/uniseg v0.4.7 // indirect
|
||||||
|
github.com/rogpeppe/go-internal v1.13.2-0.20241226121412-a5dc8ff20d0a // indirect
|
||||||
|
github.com/russross/blackfriday/v2 v2.1.0 // indirect
|
||||||
|
github.com/sagikazarmark/locafero v0.7.0 // indirect
|
||||||
|
github.com/sergi/go-diff v1.3.1 // indirect
|
||||||
|
github.com/sirupsen/logrus v1.9.3 // indirect
|
||||||
|
github.com/sourcegraph/conc v0.3.0 // indirect
|
||||||
|
github.com/spf13/afero v1.12.0 // indirect
|
||||||
|
github.com/spf13/cast v1.7.1 // indirect
|
||||||
|
github.com/subosito/gotenv v1.6.0 // indirect
|
||||||
|
github.com/x448/float16 v0.8.4 // indirect
|
||||||
|
github.com/xlab/treeprint v1.2.0 // indirect
|
||||||
|
github.com/xo/terminfo v0.0.0-20220910002029-abceb7e1c41e // indirect
|
||||||
|
go.opentelemetry.io/auto/sdk v1.1.0 // indirect
|
||||||
|
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.59.0 // indirect
|
||||||
|
go.opentelemetry.io/otel v1.34.0 // indirect
|
||||||
|
go.opentelemetry.io/otel/metric v1.34.0 // indirect
|
||||||
|
go.opentelemetry.io/otel/trace v1.34.0 // indirect
|
||||||
|
go.starlark.net v0.0.0-20240507195648-35fe9f26b4bc // indirect
|
||||||
|
go.uber.org/multierr v1.11.0 // indirect
|
||||||
|
golang.org/x/crypto v0.36.0 // indirect
|
||||||
|
golang.org/x/exp v0.0.0-20241108190413-2d47ceb2692f // indirect
|
||||||
|
golang.org/x/net v0.38.0 // indirect
|
||||||
|
golang.org/x/oauth2 v0.28.0 // indirect
|
||||||
|
golang.org/x/sync v0.12.0 // indirect
|
||||||
|
golang.org/x/sys v0.31.0 // indirect
|
||||||
|
golang.org/x/term v0.30.0 // indirect
|
||||||
|
golang.org/x/text v0.23.0 // indirect
|
||||||
|
golang.org/x/time v0.11.0 // indirect
|
||||||
|
google.golang.org/protobuf v1.36.5 // indirect
|
||||||
|
gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
|
||||||
|
gopkg.in/inf.v0 v0.9.1 // indirect
|
||||||
|
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||||
|
gotest.tools/v3 v3.5.2 // indirect
|
||||||
|
k8s.io/component-base v0.30.0 // indirect
|
||||||
|
k8s.io/klog/v2 v2.130.1 // indirect
|
||||||
|
k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f // indirect
|
||||||
|
modernc.org/gc/v3 v3.0.0-20240304020402-f0dba7c97c2b // indirect
|
||||||
|
modernc.org/libc v1.50.5 // indirect
|
||||||
|
modernc.org/mathutil v1.6.0 // indirect
|
||||||
|
modernc.org/memory v1.8.0 // indirect
|
||||||
|
modernc.org/strutil v1.2.0 // indirect
|
||||||
|
modernc.org/token v1.1.0 // indirect
|
||||||
|
sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 // indirect
|
||||||
|
sigs.k8s.io/kustomize/api v0.17.1 // indirect
|
||||||
|
sigs.k8s.io/kustomize/kyaml v0.17.0 // indirect
|
||||||
|
sigs.k8s.io/structured-merge-diff/v4 v4.4.2 // indirect
|
||||||
|
sigs.k8s.io/yaml v1.4.0 // indirect
|
||||||
)
|
)
|
||||||
|
|
14
main.go
14
main.go
|
@ -1,3 +1,17 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
|
|
@ -0,0 +1,84 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
//go:embed templates/alinux_kernel.sh
|
||||||
|
var alinuxKernelTemplate string
|
||||||
|
|
||||||
|
//go:embed templates/alinux.sh
|
||||||
|
var alinuxTemplate string
|
||||||
|
|
||||||
|
// TargetTypeAlinux identifies the AliyunLinux 2 and 3 target.
|
||||||
|
const TargetTypeAlinux Type = "alinux"
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeAlinux] = &alinux{}
|
||||||
|
}
|
||||||
|
|
||||||
|
type alinuxTemplateData struct {
|
||||||
|
KernelDownloadURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
type alinux struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alinux) Name() string {
|
||||||
|
return TargetTypeAlinux.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alinux) TemplateKernelUrlsScript() string {
|
||||||
|
return alinuxKernelTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alinux) TemplateScript() string {
|
||||||
|
return alinuxTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alinux) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
return fetchAlinuxKernelURLS(kr), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alinux) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return alinuxTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func fetchAlinuxKernelURLS(kr kernelrelease.KernelRelease) []string {
|
||||||
|
alinuxReleases := []string{
|
||||||
|
"2",
|
||||||
|
"2.1903",
|
||||||
|
"3",
|
||||||
|
}
|
||||||
|
|
||||||
|
urls := []string{}
|
||||||
|
for _, r := range alinuxReleases {
|
||||||
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
"http://mirrors.aliyun.com/alinux/%s/os/%s/Packages/kernel-devel-%s%s.rpm",
|
||||||
|
r,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
}
|
||||||
|
return urls
|
||||||
|
}
|
|
@ -0,0 +1,96 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
//go:embed templates/almalinux_kernel.sh
|
||||||
|
var almaKernelTemplate string
|
||||||
|
|
||||||
|
//go:embed templates/almalinux.sh
|
||||||
|
var almaTemplate string
|
||||||
|
|
||||||
|
// TargetTypeAlma identifies the AlmaLinux target.
|
||||||
|
const TargetTypeAlma Type = "almalinux"
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeAlma] = &alma{}
|
||||||
|
}
|
||||||
|
|
||||||
|
type almaTemplateData struct {
|
||||||
|
KernelDownloadURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
// alma is a driverkit target.
|
||||||
|
type alma struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alma) Name() string {
|
||||||
|
return TargetTypeAlma.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alma) TemplateKernelUrlsScript() string {
|
||||||
|
return almaKernelTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alma) TemplateScript() string {
|
||||||
|
return almaTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alma) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
return fetchAlmaKernelURLS(kr), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *alma) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return almaTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func fetchAlmaKernelURLS(kr kernelrelease.KernelRelease) []string {
|
||||||
|
almaReleases := []string{
|
||||||
|
"8",
|
||||||
|
"8.6",
|
||||||
|
"9",
|
||||||
|
"9.0",
|
||||||
|
}
|
||||||
|
|
||||||
|
urls := []string{}
|
||||||
|
for _, r := range almaReleases {
|
||||||
|
if r >= "9" {
|
||||||
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
"https://repo.almalinux.org/almalinux/%s/AppStream/%s/os/Packages/kernel-devel-%s%s.rpm",
|
||||||
|
r,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
} else {
|
||||||
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
"https://repo.almalinux.org/almalinux/%s/BaseOS/%s/os/Packages/kernel-devel-%s%s.rpm",
|
||||||
|
r,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return urls
|
||||||
|
}
|
|
@ -1,3 +1,17 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
@ -5,24 +19,24 @@ import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"compress/bzip2"
|
"compress/bzip2"
|
||||||
"compress/gzip"
|
"compress/gzip"
|
||||||
|
"database/sql"
|
||||||
_ "embed"
|
_ "embed"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"github.com/blang/semver/v4"
|
||||||
"io"
|
"io"
|
||||||
"io/ioutil"
|
|
||||||
"log"
|
"log"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
"strings"
|
"strings"
|
||||||
"text/template"
|
|
||||||
|
|
||||||
"database/sql"
|
|
||||||
|
|
||||||
_ "modernc.org/sqlite"
|
_ "modernc.org/sqlite"
|
||||||
|
|
||||||
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
logger "github.com/sirupsen/logrus"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
|
//go:embed templates/amazonlinux_kernel.sh
|
||||||
|
var amazonlinuxKernelTemplate string
|
||||||
|
|
||||||
//go:embed templates/amazonlinux.sh
|
//go:embed templates/amazonlinux.sh
|
||||||
var amazonlinuxTemplate string
|
var amazonlinuxTemplate string
|
||||||
|
|
||||||
|
@ -31,18 +45,26 @@ type amazonBuilder interface {
|
||||||
repos() []string
|
repos() []string
|
||||||
baseUrl() string
|
baseUrl() string
|
||||||
ext() string
|
ext() string
|
||||||
target() Type
|
|
||||||
}
|
|
||||||
|
|
||||||
type amazonlinux2022 struct {
|
|
||||||
}
|
|
||||||
|
|
||||||
type amazonlinux2 struct {
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type amazonlinux struct {
|
type amazonlinux struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type amazonlinux2 struct {
|
||||||
|
amazonlinux
|
||||||
|
}
|
||||||
|
|
||||||
|
type amazonlinux2022 struct {
|
||||||
|
amazonlinux
|
||||||
|
}
|
||||||
|
|
||||||
|
type amazonlinux2023 struct {
|
||||||
|
amazonlinux
|
||||||
|
}
|
||||||
|
|
||||||
|
// TargetTypeAmazonLinux2023 identifies the AmazonLinux2023 target.
|
||||||
|
const TargetTypeAmazonLinux2023 Type = "amazonlinux2023"
|
||||||
|
|
||||||
// TargetTypeAmazonLinux2022 identifies the AmazonLinux2022 target.
|
// TargetTypeAmazonLinux2022 identifies the AmazonLinux2022 target.
|
||||||
const TargetTypeAmazonLinux2022 Type = "amazonlinux2022"
|
const TargetTypeAmazonLinux2022 Type = "amazonlinux2022"
|
||||||
|
|
||||||
|
@ -53,78 +75,37 @@ const TargetTypeAmazonLinux2 Type = "amazonlinux2"
|
||||||
const TargetTypeAmazonLinux Type = "amazonlinux"
|
const TargetTypeAmazonLinux Type = "amazonlinux"
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
BuilderByTarget[TargetTypeAmazonLinux2022] = &amazonlinux2022{}
|
byTarget[TargetTypeAmazonLinux2023] = &amazonlinux2023{}
|
||||||
BuilderByTarget[TargetTypeAmazonLinux2] = &amazonlinux2{}
|
byTarget[TargetTypeAmazonLinux2022] = &amazonlinux2022{}
|
||||||
BuilderByTarget[TargetTypeAmazonLinux] = &amazonlinux{}
|
byTarget[TargetTypeAmazonLinux2] = &amazonlinux2{}
|
||||||
|
byTarget[TargetTypeAmazonLinux] = &amazonlinux{}
|
||||||
}
|
}
|
||||||
|
|
||||||
type amazonlinuxTemplateData struct {
|
type amazonlinuxTemplateData struct {
|
||||||
DriverBuildDir string
|
|
||||||
ModuleDownloadURL string
|
|
||||||
KernelDownloadURLs []string
|
KernelDownloadURLs []string
|
||||||
ModuleDriverName string
|
|
||||||
ModuleFullPath string
|
|
||||||
BuildModule bool
|
|
||||||
BuildProbe bool
|
|
||||||
LLVMVersion string
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Script compiles the script to build the kernel module and/or the eBPF probe.
|
func (a *amazonlinux) Name() string {
|
||||||
func (a amazonlinux2022) Script(c Config, kr kernelrelease.KernelRelease) (string, error) {
|
return TargetTypeAmazonLinux.String()
|
||||||
return script(a, c, kr)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a amazonlinux2022) repos() []string {
|
func (a *amazonlinux) TemplateKernelUrlsScript() string { return amazonlinuxKernelTemplate }
|
||||||
return []string{
|
|
||||||
"2022.0.20220202",
|
func (a *amazonlinux) TemplateScript() string {
|
||||||
"2022.0.20220315",
|
return amazonlinuxTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
return fetchAmazonLinuxPackagesURLs(a, kr)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return amazonlinuxTemplateData{
|
||||||
|
KernelDownloadURLs: urls,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a amazonlinux2022) baseUrl() string {
|
func (a *amazonlinux) repos() []string {
|
||||||
return "https://al2022-repos-us-east-1-9761ab97.s3.dualstack.us-east-1.amazonaws.com/core/mirrors"
|
|
||||||
}
|
|
||||||
|
|
||||||
func (a amazonlinux2022) ext() string {
|
|
||||||
return "gz"
|
|
||||||
}
|
|
||||||
|
|
||||||
func (a amazonlinux2022) target() Type {
|
|
||||||
return TargetTypeAmazonLinux2022
|
|
||||||
}
|
|
||||||
|
|
||||||
// Script compiles the script to build the kernel module and/or the eBPF probe.
|
|
||||||
func (a amazonlinux2) Script(c Config, kr kernelrelease.KernelRelease) (string, error) {
|
|
||||||
return script(a, c, kr)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (a amazonlinux2) repos() []string {
|
|
||||||
return []string{
|
|
||||||
"core/2.0",
|
|
||||||
"core/latest",
|
|
||||||
"extras/kernel-5.4/latest",
|
|
||||||
"extras/kernel-5.10/latest",
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (a amazonlinux2) baseUrl() string {
|
|
||||||
return "http://amazonlinux.us-east-1.amazonaws.com/2"
|
|
||||||
}
|
|
||||||
|
|
||||||
func (a amazonlinux2) ext() string {
|
|
||||||
return "gz"
|
|
||||||
}
|
|
||||||
|
|
||||||
func (a amazonlinux2) target() Type {
|
|
||||||
return TargetTypeAmazonLinux2
|
|
||||||
}
|
|
||||||
|
|
||||||
// Script compiles the script to build the kernel module and/or the eBPF probe.
|
|
||||||
func (a amazonlinux) Script(c Config, kr kernelrelease.KernelRelease) (string, error) {
|
|
||||||
return script(a, c, kr)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (a amazonlinux) repos() []string {
|
|
||||||
return []string{
|
return []string{
|
||||||
"latest/updates",
|
"latest/updates",
|
||||||
"latest/main",
|
"latest/main",
|
||||||
|
@ -137,75 +118,105 @@ func (a amazonlinux) repos() []string {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a amazonlinux) baseUrl() string {
|
func (a *amazonlinux) baseUrl() string {
|
||||||
return "http://repo.us-east-1.amazonaws.com"
|
return "http://repo.us-east-1.amazonaws.com"
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a amazonlinux) ext() string {
|
func (a *amazonlinux) ext() string {
|
||||||
return "bz2"
|
return "bz2"
|
||||||
}
|
}
|
||||||
|
|
||||||
func (a amazonlinux) target() Type {
|
func (a *amazonlinux2022) Name() string {
|
||||||
return TargetTypeAmazonLinux
|
return TargetTypeAmazonLinux2022.String()
|
||||||
}
|
}
|
||||||
|
|
||||||
func script(a amazonBuilder, c Config, kr kernelrelease.KernelRelease) (string, error) {
|
func (a *amazonlinux2022) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
t := template.New(string(a.target()))
|
return fetchAmazonLinuxPackagesURLs(a, kr)
|
||||||
parsed, err := t.Parse(amazonlinuxTemplate)
|
}
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
var urls []string
|
func (a *amazonlinux2022) repos() []string {
|
||||||
if c.KernelUrls == nil {
|
return []string{
|
||||||
// Check (and filter) existing kernels before continuing
|
"2022.0.20220202",
|
||||||
var packages []string
|
"2022.0.20220315",
|
||||||
packages, err = fetchAmazonLinuxPackagesURLs(a, kr)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
urls, err = getResolvingURLs(packages)
|
|
||||||
} else {
|
|
||||||
urls, err = getResolvingURLs(c.KernelUrls)
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
td := amazonlinuxTemplateData{
|
func (a *amazonlinux2022) baseUrl() string {
|
||||||
DriverBuildDir: DriverDirectory,
|
return "https://al2022-repos-us-east-1-9761ab97.s3.dualstack.us-east-1.amazonaws.com/core/mirrors"
|
||||||
ModuleDownloadURL: moduleDownloadURL(c),
|
}
|
||||||
KernelDownloadURLs: urls,
|
|
||||||
ModuleDriverName: c.DriverName,
|
|
||||||
ModuleFullPath: ModuleFullPath,
|
|
||||||
BuildModule: len(c.Build.ModuleFilePath) > 0,
|
|
||||||
BuildProbe: len(c.Build.ProbeFilePath) > 0,
|
|
||||||
LLVMVersion: amazonLLVMVersionFromKernelRelease(kr),
|
|
||||||
}
|
|
||||||
|
|
||||||
buf := bytes.NewBuffer(nil)
|
func (a *amazonlinux2022) ext() string {
|
||||||
err = parsed.Execute(buf, td)
|
return "gz"
|
||||||
if err != nil {
|
}
|
||||||
return "", err
|
|
||||||
|
func (a *amazonlinux2023) Name() string {
|
||||||
|
return TargetTypeAmazonLinux2023.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2023) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
return fetchAmazonLinuxPackagesURLs(a, kr)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2023) repos() []string {
|
||||||
|
return []string{
|
||||||
|
"latest",
|
||||||
}
|
}
|
||||||
return buf.String(), nil
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2023) baseUrl() string {
|
||||||
|
return "https://cdn.amazonlinux.com/al2023/core/mirrors"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2023) ext() string {
|
||||||
|
return "gz"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2) Name() string {
|
||||||
|
return TargetTypeAmazonLinux2.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
return fetchAmazonLinuxPackagesURLs(a, kr)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2) GCCVersion(kr kernelrelease.KernelRelease) semver.Version {
|
||||||
|
// 5.10 amazonlinux2 kernels need gcc 10
|
||||||
|
if kr.Major == 5 && kr.Minor == 10 {
|
||||||
|
return semver.Version{Major: 10}
|
||||||
|
}
|
||||||
|
return semver.Version{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2) repos() []string {
|
||||||
|
return []string{
|
||||||
|
"core/2.0",
|
||||||
|
"core/latest",
|
||||||
|
"extras/kernel-5.4/latest",
|
||||||
|
"extras/kernel-5.10/latest",
|
||||||
|
"extras/kernel-5.15/latest",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2) baseUrl() string {
|
||||||
|
return "http://amazonlinux.us-east-1.amazonaws.com/2"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *amazonlinux2) ext() string {
|
||||||
|
return "gz"
|
||||||
}
|
}
|
||||||
|
|
||||||
func buildMirror(a amazonBuilder, r string, kv kernelrelease.KernelRelease) (string, error) {
|
func buildMirror(a amazonBuilder, r string, kv kernelrelease.KernelRelease) (string, error) {
|
||||||
var baseURL string
|
var baseURL string
|
||||||
switch a.target() {
|
switch a.(type) {
|
||||||
case TargetTypeAmazonLinux:
|
case *amazonlinux:
|
||||||
baseURL = fmt.Sprintf("%s/%s", a.baseUrl(), r)
|
baseURL = fmt.Sprintf("%s/%s", a.baseUrl(), r)
|
||||||
case TargetTypeAmazonLinux2:
|
case *amazonlinux2, *amazonlinux2022, *amazonlinux2023:
|
||||||
baseURL = fmt.Sprintf("%s/%s/%s", a.baseUrl(), r, kv.Architecture.ToNonDeb())
|
|
||||||
case TargetTypeAmazonLinux2022:
|
|
||||||
baseURL = fmt.Sprintf("%s/%s/%s", a.baseUrl(), r, kv.Architecture.ToNonDeb())
|
baseURL = fmt.Sprintf("%s/%s/%s", a.baseUrl(), r, kv.Architecture.ToNonDeb())
|
||||||
default:
|
default:
|
||||||
return "", fmt.Errorf("unsupported target")
|
return "", fmt.Errorf("unsupported target")
|
||||||
}
|
}
|
||||||
|
|
||||||
mirror := fmt.Sprintf("%s/%s", baseURL, "mirror.list")
|
mirror := fmt.Sprintf("%s/%s", baseURL, "mirror.list")
|
||||||
logger.WithField("url", mirror).WithField("version", r).Debug("looking for repo...")
|
|
||||||
return mirror, nil
|
return mirror, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -226,89 +237,89 @@ func fetchAmazonLinuxPackagesURLs(a amazonBuilder, kv kernelrelease.KernelReleas
|
||||||
visited := make(map[string]struct{})
|
visited := make(map[string]struct{})
|
||||||
|
|
||||||
for _, v := range a.repos() {
|
for _, v := range a.repos() {
|
||||||
mirror, err := buildMirror(a, v, kv)
|
err := func() error {
|
||||||
if err != nil {
|
mirror, err := buildMirror(a, v, kv)
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
// Obtain the repo URL by getting mirror URL content
|
|
||||||
mirrorRes, err := http.Get(mirror)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer mirrorRes.Body.Close()
|
|
||||||
|
|
||||||
var repo string
|
|
||||||
scanner := bufio.NewScanner(mirrorRes.Body)
|
|
||||||
if scanner.Scan() {
|
|
||||||
repo = scanner.Text()
|
|
||||||
}
|
|
||||||
if repo == "" {
|
|
||||||
return nil, fmt.Errorf("repository not found")
|
|
||||||
}
|
|
||||||
repo = strings.ReplaceAll(strings.TrimSuffix(repo, "\n"), "$basearch", kv.Architecture.ToNonDeb())
|
|
||||||
repo = strings.TrimSuffix(repo, "/")
|
|
||||||
repoDatabaseURL := fmt.Sprintf("%s/repodata/primary.sqlite.%s", repo, a.ext())
|
|
||||||
if _, ok := visited[repoDatabaseURL]; ok {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// Download the repo database
|
|
||||||
repoRes, err := http.Get(repoDatabaseURL)
|
|
||||||
logger.WithField("url", repoDatabaseURL).Debug("downloading...")
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer repoRes.Body.Close()
|
|
||||||
visited[repoDatabaseURL] = struct{}{}
|
|
||||||
|
|
||||||
unzip, err := unzipFuncFromBuilder(a)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
dbBytes, err := unzip(repoRes.Body)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
// Create the temporary database file
|
|
||||||
dbFile, err := ioutil.TempFile(os.TempDir(), fmt.Sprintf("%s-*.sqlite", string(a.target())))
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer os.Remove(dbFile.Name())
|
|
||||||
if _, err := dbFile.Write(dbBytes); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
// Open the database
|
|
||||||
db, err := sql.Open("sqlite", dbFile.Name())
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer db.Close()
|
|
||||||
logger.WithField("db", dbFile.Name()).Debug("connecting to database...")
|
|
||||||
// Query the database
|
|
||||||
rel := strings.TrimPrefix(strings.TrimSuffix(kv.FullExtraversion, fmt.Sprintf(".%s", kv.Architecture.ToNonDeb())), "-")
|
|
||||||
q := fmt.Sprintf("SELECT location_href FROM packages WHERE name LIKE 'kernel-devel%%' AND version='%s' AND release='%s'", kv.Fullversion, rel)
|
|
||||||
stmt, err := db.Prepare(q)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer stmt.Close()
|
|
||||||
rows, err := stmt.Query()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
defer rows.Close()
|
|
||||||
for rows.Next() {
|
|
||||||
var href string
|
|
||||||
err = rows.Scan(&href)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
return err
|
||||||
}
|
}
|
||||||
urls = append(urls, fmt.Sprintf("%s/%s", repo, href))
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := dbFile.Close(); err != nil {
|
// Obtain the repo URL by getting mirror URL content
|
||||||
|
mirrorRes, err := http.Get(mirror)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer mirrorRes.Body.Close()
|
||||||
|
|
||||||
|
var repo string
|
||||||
|
scanner := bufio.NewScanner(mirrorRes.Body)
|
||||||
|
if scanner.Scan() {
|
||||||
|
repo = scanner.Text()
|
||||||
|
}
|
||||||
|
if repo == "" {
|
||||||
|
return fmt.Errorf("repository not found")
|
||||||
|
}
|
||||||
|
repo = strings.ReplaceAll(strings.TrimSuffix(repo, "\n"), "$basearch", kv.Architecture.ToNonDeb())
|
||||||
|
repo = strings.TrimSuffix(repo, "/")
|
||||||
|
repoDatabaseURL := fmt.Sprintf("%s/repodata/primary.sqlite.%s", repo, a.ext())
|
||||||
|
if _, ok := visited[repoDatabaseURL]; ok {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
// Download the repo database
|
||||||
|
repoRes, err := http.Get(repoDatabaseURL)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer repoRes.Body.Close()
|
||||||
|
visited[repoDatabaseURL] = struct{}{}
|
||||||
|
|
||||||
|
unzip, err := unzipFuncFromBuilder(a)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
dbBytes, err := unzip(repoRes.Body)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
// Create the temporary database file
|
||||||
|
dbFile, err := os.CreateTemp(os.TempDir(), fmt.Sprintf("%s-*.sqlite", a.Name()))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer os.Remove(dbFile.Name())
|
||||||
|
if _, err := dbFile.Write(dbBytes); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
// Open the database
|
||||||
|
db, err := sql.Open("sqlite", dbFile.Name())
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer db.Close()
|
||||||
|
// Query the database
|
||||||
|
rel := strings.TrimPrefix(strings.TrimSuffix(kv.FullExtraversion, fmt.Sprintf(".%s", kv.Architecture.ToNonDeb())), "-")
|
||||||
|
q := fmt.Sprintf("SELECT location_href FROM packages WHERE name LIKE 'kernel-devel%%' AND version='%s' AND release='%s'", kv.Fullversion, rel)
|
||||||
|
stmt, err := db.Prepare(q)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer stmt.Close()
|
||||||
|
rows, err := stmt.Query()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer rows.Close()
|
||||||
|
for rows.Next() {
|
||||||
|
var href string
|
||||||
|
err = rows.Scan(&href)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatal(err)
|
||||||
|
}
|
||||||
|
urls = append(urls, fmt.Sprintf("%s/%s", repo, href))
|
||||||
|
}
|
||||||
|
return dbFile.Close()
|
||||||
|
}()
|
||||||
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -353,14 +364,3 @@ func bunzip(data io.Reader) (res []byte, err error) {
|
||||||
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func amazonLLVMVersionFromKernelRelease(kr kernelrelease.KernelRelease) string {
|
|
||||||
switch kr.Version {
|
|
||||||
case 4:
|
|
||||||
return "7"
|
|
||||||
case 5:
|
|
||||||
return "12"
|
|
||||||
default:
|
|
||||||
return "12"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
|
@ -1,105 +1,157 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
_ "embed"
|
_ "embed"
|
||||||
"fmt"
|
"fmt"
|
||||||
"text/template"
|
"strings"
|
||||||
|
|
||||||
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
//go:embed templates/archlinux_kernel.sh
|
||||||
|
var archlinuxKernelTemplate string
|
||||||
|
|
||||||
//go:embed templates/archlinux.sh
|
//go:embed templates/archlinux.sh
|
||||||
var archlinuxTemplate string
|
var archlinuxTemplate string
|
||||||
|
|
||||||
// TargetTypeArchlinux identifies the Archlinux target.
|
// TargetTypeArchlinux identifies the Archlinux target.
|
||||||
const TargetTypeArchlinux Type = "archlinux"
|
const TargetTypeArchlinux Type = "arch"
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
BuilderByTarget[TargetTypeArchlinux] = &archlinux{}
|
byTarget[TargetTypeArchlinux] = &archlinux{}
|
||||||
}
|
}
|
||||||
|
|
||||||
// archlinux is a driverkit target.
|
// archlinux is a driverkit target.
|
||||||
type archlinux struct {
|
type archlinux struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Script compiles the script to build the kernel module and/or the eBPF probe.
|
|
||||||
func (c archlinux) Script(cfg Config, kr kernelrelease.KernelRelease) (string, error) {
|
|
||||||
t := template.New(string(TargetTypeArchlinux))
|
|
||||||
parsed, err := t.Parse(archlinuxTemplate)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
var urls []string
|
|
||||||
if cfg.KernelUrls == nil {
|
|
||||||
// Check (and filter) existing kernels before continuing
|
|
||||||
urls, err = getResolvingURLs(fetchArchlinuxKernelURLS(kr, cfg.KernelVersion))
|
|
||||||
} else {
|
|
||||||
urls, err = getResolvingURLs(cfg.KernelUrls)
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
td := archlinuxTemplateData{
|
|
||||||
DriverBuildDir: DriverDirectory,
|
|
||||||
ModuleDownloadURL: moduleDownloadURL(cfg),
|
|
||||||
KernelDownloadURL: urls[0],
|
|
||||||
GCCVersion: archlinuxGccVersionFromKernelRelease(kr),
|
|
||||||
ModuleDriverName: cfg.DriverName,
|
|
||||||
ModuleFullPath: ModuleFullPath,
|
|
||||||
BuildModule: len(cfg.Build.ModuleFilePath) > 0,
|
|
||||||
BuildProbe: len(cfg.Build.ProbeFilePath) > 0,
|
|
||||||
}
|
|
||||||
|
|
||||||
buf := bytes.NewBuffer(nil)
|
|
||||||
err = parsed.Execute(buf, td)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
return buf.String(), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func fetchArchlinuxKernelURLS(kr kernelrelease.KernelRelease, kv uint16) []string {
|
|
||||||
urls := []string{}
|
|
||||||
|
|
||||||
if kr.Architecture == "amd64" {
|
|
||||||
urls = append(urls, fmt.Sprintf(
|
|
||||||
"https://archive.archlinux.org/packages/l/linux-headers/linux-headers-%s.%s-%d-%s.pkg.tar.xz",
|
|
||||||
kr.Fullversion,
|
|
||||||
kr.Extraversion,
|
|
||||||
kv,
|
|
||||||
kr.Architecture.ToNonDeb()))
|
|
||||||
} else {
|
|
||||||
urls = append(urls, fmt.Sprintf(
|
|
||||||
"http://tardis.tiny-vps.com/aarm/packages/l/linux-%s-headers/linux-%s-headers-%s-%d-%s.pkg.tar.xz",
|
|
||||||
kr.Architecture.ToNonDeb(),
|
|
||||||
kr.Architecture.ToNonDeb(),
|
|
||||||
kr.Fullversion,
|
|
||||||
kv,
|
|
||||||
kr.Architecture.ToNonDeb()))
|
|
||||||
}
|
|
||||||
return urls
|
|
||||||
}
|
|
||||||
|
|
||||||
type archlinuxTemplateData struct {
|
type archlinuxTemplateData struct {
|
||||||
DriverBuildDir string
|
|
||||||
ModuleDownloadURL string
|
|
||||||
KernelDownloadURL string
|
KernelDownloadURL string
|
||||||
GCCVersion string
|
|
||||||
ModuleDriverName string
|
|
||||||
ModuleFullPath string
|
|
||||||
BuildModule bool
|
|
||||||
BuildProbe bool
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func archlinuxGccVersionFromKernelRelease(kr kernelrelease.KernelRelease) string {
|
func (c *archlinux) Name() string {
|
||||||
switch kr.Version {
|
return TargetTypeArchlinux.String()
|
||||||
case 3:
|
}
|
||||||
return "5"
|
|
||||||
case 2:
|
func (c *archlinux) TemplateKernelUrlsScript() string { return archlinuxKernelTemplate }
|
||||||
return "4.8"
|
|
||||||
}
|
func (c *archlinux) TemplateScript() string {
|
||||||
return "8"
|
return archlinuxTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *archlinux) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
// uname -r returns "6.8.1-arch1-1" but headers URL is "6.8.1.arch1-1"
|
||||||
|
// Also, for 0-patch releases, like: "6.8.0-arch1-1", headers url is "6.8.arch1-1"
|
||||||
|
kr.FullExtraversion = strings.Replace(kr.FullExtraversion, "-arch", ".arch", 1)
|
||||||
|
if kr.Patch == 0 {
|
||||||
|
kr.Fullversion = strings.TrimSuffix(kr.Fullversion, ".0")
|
||||||
|
}
|
||||||
|
|
||||||
|
urls := []string{}
|
||||||
|
possibleCompressionSuffixes := []string{
|
||||||
|
"xz",
|
||||||
|
"zst",
|
||||||
|
}
|
||||||
|
|
||||||
|
// check the architecture, which limits the mirror options
|
||||||
|
if kr.Architecture.ToNonDeb() == "x86_64" {
|
||||||
|
if strings.Contains(kr.FullExtraversion, "arch") { // arch stable kernel
|
||||||
|
baseURL := "https://archive.archlinux.org/packages/l/linux-headers"
|
||||||
|
for _, compressionAlgo := range possibleCompressionSuffixes {
|
||||||
|
urls = append(
|
||||||
|
urls,
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/linux-headers-%s-%s-%s.pkg.tar.%s",
|
||||||
|
baseURL,
|
||||||
|
kr.String(),
|
||||||
|
kr.KernelVersion,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
compressionAlgo,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
} else if strings.Contains(kr.FullExtraversion, "hardened") || strings.Contains(kr.FullExtraversion, ".a-1") { // arch hardened kernel ("a-1" is old naming standard)
|
||||||
|
baseURL := "https://archive.archlinux.org/packages/l/linux-hardened-headers"
|
||||||
|
for _, compressionAlgo := range possibleCompressionSuffixes {
|
||||||
|
urls = append(
|
||||||
|
urls,
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/linux-hardened-headers-%s-%s-%s.pkg.tar.%s",
|
||||||
|
baseURL,
|
||||||
|
kr.String(),
|
||||||
|
kr.KernelVersion,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
compressionAlgo,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
} else if strings.Contains(kr.FullExtraversion, "zen") { // arch zen kernel
|
||||||
|
baseURL := "https://archive.archlinux.org/packages/l/linux-zen-headers"
|
||||||
|
for _, compressionAlgo := range possibleCompressionSuffixes {
|
||||||
|
urls = append(
|
||||||
|
urls,
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/linux-zen-headers-%s-%s-%s.pkg.tar.%s",
|
||||||
|
baseURL,
|
||||||
|
kr.String(),
|
||||||
|
kr.KernelVersion,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
compressionAlgo,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
} else { // arch LTS kernel
|
||||||
|
baseURL := "https://archive.archlinux.org/packages/l/linux-lts-headers"
|
||||||
|
for _, compressionAlgo := range possibleCompressionSuffixes {
|
||||||
|
urls = append(
|
||||||
|
urls,
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/linux-lts-headers-%s-%s-%s.pkg.tar.%s",
|
||||||
|
baseURL,
|
||||||
|
kr.String(),
|
||||||
|
kr.KernelVersion,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
compressionAlgo,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else if kr.Architecture.ToNonDeb() == "aarch64" {
|
||||||
|
baseURL := "https://alaa.ad24.cz/packages/l/linux-aarch64-headers/"
|
||||||
|
for _, compressionAlgo := range possibleCompressionSuffixes {
|
||||||
|
urls = append(
|
||||||
|
urls,
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/linux-aarch64-headers-%s-%s-%s.pkg.tar.%s",
|
||||||
|
baseURL,
|
||||||
|
kr.String(),
|
||||||
|
kr.KernelVersion,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
compressionAlgo,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return urls, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *archlinux) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return archlinuxTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,43 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TargetTypeBottlerocket identifies the Bottlerocket target.
|
||||||
|
const TargetTypeBottlerocket Type = "bottlerocket"
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeBottlerocket] = &bottlerocket{
|
||||||
|
vanilla{},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type bottlerocket struct {
|
||||||
|
vanilla
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *bottlerocket) Name() string {
|
||||||
|
return TargetTypeBottlerocket.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *bottlerocket) KernelTemplateData(kr kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return vanillaTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
KernelLocalVersion: kr.FullExtraversion,
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,25 +1,113 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
import "github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"github.com/falcosecurity/falcoctl/pkg/output"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
"oras.land/oras-go/v2/registry/remote/auth"
|
||||||
|
)
|
||||||
|
|
||||||
|
var defaultImageTag = "latest" // This is overwritten when using the Makefile to build
|
||||||
|
|
||||||
// Build contains the info about the on-going build.
|
// Build contains the info about the on-going build.
|
||||||
type Build struct {
|
type Build struct {
|
||||||
TargetType Type
|
TargetType Type
|
||||||
KernelConfigData string
|
KernelConfigData string
|
||||||
KernelRelease string
|
KernelRelease string
|
||||||
KernelVersion uint16
|
KernelVersion string
|
||||||
DriverVersion string
|
DriverVersion string
|
||||||
Architecture string
|
Architecture string
|
||||||
ModuleFilePath string
|
ModuleFilePath string
|
||||||
ProbeFilePath string
|
ProbeFilePath string
|
||||||
ModuleDriverName string
|
ModuleDriverName string
|
||||||
ModuleDeviceName string
|
ModuleDeviceName string
|
||||||
CustomBuilderImage string
|
BuilderImage string
|
||||||
KernelUrls []string
|
BuilderRepos []string
|
||||||
|
ImagesListers []ImagesLister
|
||||||
|
KernelUrls []string
|
||||||
|
GCCVersion string
|
||||||
|
RepoOrg string
|
||||||
|
RepoName string
|
||||||
|
Images ImagesMap
|
||||||
|
RegistryName string
|
||||||
|
RegistryUser string
|
||||||
|
RegistryPassword string
|
||||||
|
RegistryPlainHTTP bool
|
||||||
|
|
||||||
|
*output.Printer
|
||||||
}
|
}
|
||||||
|
|
||||||
func (b *Build) KernelReleaseFromBuildConfig() kernelrelease.KernelRelease {
|
func (b *Build) KernelReleaseFromBuildConfig() kernelrelease.KernelRelease {
|
||||||
kv := kernelrelease.FromString(b.KernelRelease)
|
kv := kernelrelease.FromString(b.KernelRelease)
|
||||||
kv.Architecture = kernelrelease.Architecture(b.Architecture)
|
kv.Architecture = kernelrelease.Architecture(b.Architecture)
|
||||||
|
kv.KernelVersion = b.KernelVersion
|
||||||
return kv
|
return kv
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (b *Build) toGithubRepoArchive() string {
|
||||||
|
return fmt.Sprintf("https://github.com/%s/%s/archive", b.RepoOrg, b.RepoName)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *Build) ToConfig() Config {
|
||||||
|
return Config{
|
||||||
|
DriverName: b.ModuleDriverName,
|
||||||
|
DeviceName: b.ModuleDeviceName,
|
||||||
|
DownloadBaseURL: b.toGithubRepoArchive(),
|
||||||
|
Build: b,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// hasCustomBuilderImage return true if a custom builder image has been set by the user.
|
||||||
|
func (b *Build) hasCustomBuilderImage() bool {
|
||||||
|
if len(b.BuilderImage) > 0 {
|
||||||
|
customNames := strings.Split(b.BuilderImage, ":")
|
||||||
|
return customNames[0] != "auto"
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// builderImageTag returns the tag(latest, master or hash) to be used for the builder image.
|
||||||
|
func (b *Build) builderImageTag() string {
|
||||||
|
if len(b.BuilderImage) > 0 {
|
||||||
|
customNames := strings.Split(b.BuilderImage, ":")
|
||||||
|
// Updated image tag if "auto:tag" is passed
|
||||||
|
if len(customNames) > 1 {
|
||||||
|
return customNames[1]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return defaultImageTag
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *Build) ClientForRegistry(registry string) *auth.Client {
|
||||||
|
client := auth.DefaultClient
|
||||||
|
client.SetUserAgent("driverkit")
|
||||||
|
client.Credential = func(ctx context.Context, reg string) (auth.Credential, error) {
|
||||||
|
if b.RegistryName == registry {
|
||||||
|
return auth.Credential{
|
||||||
|
Username: b.RegistryUser,
|
||||||
|
Password: b.RegistryPassword,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return auth.EmptyCredential, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return client
|
||||||
|
}
|
||||||
|
|
|
@ -1,30 +1,60 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
|
_ "embed"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
"github.com/falcosecurity/falcoctl/pkg/output"
|
||||||
"log"
|
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
"path"
|
"path"
|
||||||
|
"strings"
|
||||||
|
"text/template"
|
||||||
|
|
||||||
logger "github.com/sirupsen/logrus"
|
"github.com/blang/semver/v4"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
)
|
)
|
||||||
|
|
||||||
// DriverDirectory is the directory the processor uses to store the driver.
|
// DriverDirectory is the directory the processor uses to store the driver.
|
||||||
const DriverDirectory = "/tmp/driver"
|
const (
|
||||||
|
DriverDirectory = "/tmp/driver"
|
||||||
|
cmakeCmdFmt = `cmake -Wno-dev \
|
||||||
|
-DUSE_BUNDLED_DEPS=On \
|
||||||
|
-DCREATE_TEST_TARGETS=Off \
|
||||||
|
-DBUILD_LIBSCAP_GVISOR=Off \
|
||||||
|
-DBUILD_LIBSCAP_MODERN_BPF=Off \
|
||||||
|
-DENABLE_DRIVERS_TESTS=Off \
|
||||||
|
-DDRIVER_NAME=%s \
|
||||||
|
-DPROBE_NAME=%s \
|
||||||
|
-DBUILD_BPF=On \
|
||||||
|
-DDRIVER_VERSION=%s \
|
||||||
|
-DPROBE_VERSION=%s \
|
||||||
|
-DGIT_COMMIT=%s \
|
||||||
|
-DDRIVER_DEVICE_NAME=%s \
|
||||||
|
-DPROBE_DEVICE_NAME=%s \
|
||||||
|
.. && \
|
||||||
|
sed -i s/'DRIVER_COMMIT ""'/'DRIVER_COMMIT "%s"'/g driver/src/driver_config.h`
|
||||||
|
)
|
||||||
|
|
||||||
// ModuleFileName is the standard file name for the kernel module.
|
//go:embed templates/libs_download.sh
|
||||||
const ModuleFileName = "module.ko"
|
var libsDownloadTemplate string
|
||||||
|
|
||||||
// ProbeFileName is the standard file name for the eBPF probe.
|
var HeadersNotFoundErr = errors.New("kernel headers not found")
|
||||||
const ProbeFileName = "probe.o"
|
|
||||||
|
|
||||||
// ModuleFullPath is the standard path for the kernel module. Builders must place the compiled module at this location.
|
|
||||||
var ModuleFullPath = path.Join(DriverDirectory, ModuleFileName)
|
|
||||||
|
|
||||||
// ProbeFullPath is the standard path for the eBPF probe. Builders must place the compiled probe at this location.
|
|
||||||
var ProbeFullPath = path.Join(DriverDirectory, "bpf", ProbeFileName)
|
|
||||||
|
|
||||||
// Config contains all the configurations needed to build the kernel module or the eBPF probe.
|
// Config contains all the configurations needed to build the kernel module or the eBPF probe.
|
||||||
type Config struct {
|
type Config struct {
|
||||||
|
@ -34,38 +64,353 @@ type Config struct {
|
||||||
*Build
|
*Build
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c Config) ToDriverFullPath() string {
|
||||||
|
return path.Join(DriverDirectory, "build", "driver", fmt.Sprintf("%s.ko", c.DriverName))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c Config) ToProbeFullPath() string {
|
||||||
|
return path.Join(DriverDirectory, "build", "driver", "bpf", "probe.o")
|
||||||
|
}
|
||||||
|
|
||||||
|
type commonTemplateData struct {
|
||||||
|
DriverBuildDir string
|
||||||
|
ModuleDriverName string
|
||||||
|
ModuleFullPath string
|
||||||
|
BuildModule bool
|
||||||
|
BuildProbe bool
|
||||||
|
GCCVersion string
|
||||||
|
CmakeCmd string
|
||||||
|
}
|
||||||
|
|
||||||
// Builder represents a builder capable of generating a script for a driverkit target.
|
// Builder represents a builder capable of generating a script for a driverkit target.
|
||||||
type Builder interface {
|
type Builder interface {
|
||||||
Script(c Config, kr kernelrelease.KernelRelease) (string, error)
|
Name() string
|
||||||
|
TemplateKernelUrlsScript() string
|
||||||
|
TemplateScript() string
|
||||||
|
URLs(kr kernelrelease.KernelRelease) ([]string, error)
|
||||||
|
KernelTemplateData(kr kernelrelease.KernelRelease, urls []string) interface{} // error return type is managed
|
||||||
|
}
|
||||||
|
|
||||||
|
// MinimumURLsBuilder is an optional interface implemented by builders
|
||||||
|
// to specify minimum number of requested headers urls
|
||||||
|
type MinimumURLsBuilder interface {
|
||||||
|
MinimumURLs() int
|
||||||
|
}
|
||||||
|
|
||||||
|
// TemplateDataSpecifier is an optional interface implemented by builders
|
||||||
|
// to specify a custom template data instead of the default one.
|
||||||
|
type TemplateDataSpecifier interface {
|
||||||
|
TemplateData(c Config, kr kernelrelease.KernelRelease) interface{}
|
||||||
|
}
|
||||||
|
|
||||||
|
type libsDownloadTemplateData struct {
|
||||||
|
DriverBuildDir string
|
||||||
|
ModuleDownloadURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
// LibsDownloadScript returns the script that downloads and configures libs repo at requested commit/tag
|
||||||
|
func LibsDownloadScript(c Config) (string, error) {
|
||||||
|
t := template.New("download-libs")
|
||||||
|
parsed, err := t.Parse(libsDownloadTemplate)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
td := libsDownloadTemplateData{
|
||||||
|
DriverBuildDir: DriverDirectory,
|
||||||
|
ModuleDownloadURL: fmt.Sprintf("%s/%s.tar.gz", c.DownloadBaseURL, c.DriverVersion),
|
||||||
|
}
|
||||||
|
|
||||||
|
buf := bytes.NewBuffer(nil)
|
||||||
|
err = parsed.Execute(buf, td)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
return buf.String(), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// KernelDownloadScript returns the script that will download and extract kernel headers
|
||||||
|
func KernelDownloadScript(b Builder,
|
||||||
|
kernelurls []string,
|
||||||
|
kr kernelrelease.KernelRelease,
|
||||||
|
printer *output.Printer,
|
||||||
|
) (string, error) {
|
||||||
|
t := template.New("download-kernel")
|
||||||
|
parsed, err := t.Parse(b.TemplateKernelUrlsScript())
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
var urls []string
|
||||||
|
minimumURLs := 1
|
||||||
|
if bb, ok := b.(MinimumURLsBuilder); ok {
|
||||||
|
minimumURLs = bb.MinimumURLs()
|
||||||
|
}
|
||||||
|
|
||||||
|
if kernelurls == nil {
|
||||||
|
urls, err = b.URLs(kr)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
// Only if returned urls array is not empty
|
||||||
|
// Otherwise, it is up to the builder to return an error
|
||||||
|
if len(urls) > 0 {
|
||||||
|
// Check (and filter) existing kernels before continuing
|
||||||
|
urls, err = GetResolvingURLs(urls)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
urls, err = GetResolvingURLs(kernelurls)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(urls) < minimumURLs {
|
||||||
|
return "", fmt.Errorf("not enough headers packages found; expected %d, found %d", minimumURLs, len(urls))
|
||||||
|
}
|
||||||
|
|
||||||
|
printer.Logger.Debug("kernel headers found",
|
||||||
|
printer.Logger.Args("urls", urls))
|
||||||
|
|
||||||
|
td := b.KernelTemplateData(kr, urls)
|
||||||
|
if tdErr, ok := td.(error); ok {
|
||||||
|
return "", tdErr
|
||||||
|
}
|
||||||
|
|
||||||
|
buf := bytes.NewBuffer(nil)
|
||||||
|
err = parsed.Execute(buf, td)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
return buf.String(), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Script retrieves the actually drivers building script
|
||||||
|
func Script(b Builder, c Config, kr kernelrelease.KernelRelease) (string, error) {
|
||||||
|
t := template.New(b.Name())
|
||||||
|
parsed, err := t.Parse(b.TemplateScript())
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
var td interface{}
|
||||||
|
if bb, ok := b.(TemplateDataSpecifier); ok {
|
||||||
|
td = bb.TemplateData(c, kr)
|
||||||
|
} else {
|
||||||
|
td = c.toTemplateData(b, kr)
|
||||||
|
}
|
||||||
|
|
||||||
|
buf := bytes.NewBuffer(nil)
|
||||||
|
err = parsed.Execute(buf, td)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
return buf.String(), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type GCCVersionRequestor interface {
|
||||||
|
// GCCVersion returns the GCC version to be used.
|
||||||
|
// If the returned value is empty, the default algorithm will be enforced.
|
||||||
|
GCCVersion(kr kernelrelease.KernelRelease) semver.Version
|
||||||
|
}
|
||||||
|
|
||||||
|
func defaultGCC(kr kernelrelease.KernelRelease) semver.Version {
|
||||||
|
switch kr.Major {
|
||||||
|
case 6:
|
||||||
|
if kr.Minor >= 9 {
|
||||||
|
return semver.Version{Major: 14}
|
||||||
|
}
|
||||||
|
if kr.Minor >= 5 {
|
||||||
|
return semver.Version{Major: 13}
|
||||||
|
}
|
||||||
|
return semver.Version{Major: 12}
|
||||||
|
case 5:
|
||||||
|
if kr.Minor >= 15 {
|
||||||
|
return semver.Version{Major: 12}
|
||||||
|
}
|
||||||
|
return semver.Version{Major: 11}
|
||||||
|
case 4:
|
||||||
|
return semver.Version{Major: 8}
|
||||||
|
case 3:
|
||||||
|
if kr.Minor >= 18 {
|
||||||
|
return semver.Version{Major: 5}
|
||||||
|
}
|
||||||
|
return semver.Version{Major: 4, Minor: 9}
|
||||||
|
case 2:
|
||||||
|
return semver.Version{Major: 4, Minor: 8}
|
||||||
|
default:
|
||||||
|
return semver.Version{Major: 14}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func mustParseTolerant(gccStr string) semver.Version {
|
||||||
|
g, err := semver.ParseTolerant(gccStr)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return g
|
||||||
|
}
|
||||||
|
|
||||||
|
// Algorithm.
|
||||||
|
// * always load images (note that it loads only images that provide gccversion, if set by user)
|
||||||
|
// * if user set a fixed gccversion, we are good to go
|
||||||
|
// * otherwise, try to fix the best-match gcc version provided by any of the loaded images;
|
||||||
|
// see below for algorithm explanation
|
||||||
|
func (b *Build) setGCCVersion(builder Builder, kr kernelrelease.KernelRelease) {
|
||||||
|
if !b.hasCustomBuilderImage() {
|
||||||
|
b.LoadImages()
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(b.GCCVersion) > 0 {
|
||||||
|
// If set from user, go on
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
b.GCCVersion = "8" // default value
|
||||||
|
|
||||||
|
// if builder implements "GCCVersionRequestor" interface -> use it
|
||||||
|
// Else, fetch the best builder available from the kernelrelease version
|
||||||
|
// using the deadly simple defaultGCC() algorithm
|
||||||
|
// Always returns the nearest one
|
||||||
|
var targetGCC semver.Version
|
||||||
|
if bb, ok := builder.(GCCVersionRequestor); ok {
|
||||||
|
targetGCC = bb.GCCVersion(kr)
|
||||||
|
}
|
||||||
|
// If builder implements GCCVersionRequestor but returns an empty semver.Version
|
||||||
|
// it means that it does not want to manage this kernelrelease,
|
||||||
|
// and instead wants to fallback to default algorithm
|
||||||
|
if targetGCC.EQ(semver.Version{}) {
|
||||||
|
targetGCC = defaultGCC(kr)
|
||||||
|
}
|
||||||
|
|
||||||
|
if b.hasCustomBuilderImage() {
|
||||||
|
b.GCCVersion = targetGCC.String()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Step 1:
|
||||||
|
// If we are able to either find a specific-target image,
|
||||||
|
// or "any" target image that provide desired gcc,
|
||||||
|
// we are over.
|
||||||
|
image, ok := b.Images.findImage(b.TargetType, targetGCC)
|
||||||
|
if ok {
|
||||||
|
b.GCCVersion = image.GCCVersion.String()
|
||||||
|
} else {
|
||||||
|
// Step 2:
|
||||||
|
// Build the list of "proposed" GCC versions,
|
||||||
|
// that is, the list of available gccs from images
|
||||||
|
// for each builder image
|
||||||
|
proposedGCCs := make([]semver.Version, 0)
|
||||||
|
for _, img := range b.Images {
|
||||||
|
proposedGCCs = append(proposedGCCs, img.GCCVersion)
|
||||||
|
b.Logger.Debug("proposed GCC",
|
||||||
|
b.Logger.Args("image", img.Name,
|
||||||
|
"targetGCC", targetGCC.String(),
|
||||||
|
"proposedGCC", img.GCCVersion.String()))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Now, sort versions and fetch
|
||||||
|
// the nearest gcc, that is also < targetGCC
|
||||||
|
semver.Sort(proposedGCCs)
|
||||||
|
lastGCC := proposedGCCs[0]
|
||||||
|
for _, gcc := range proposedGCCs {
|
||||||
|
if gcc.GT(targetGCC) {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
lastGCC = gcc
|
||||||
|
}
|
||||||
|
b.GCCVersion = lastGCC.String()
|
||||||
|
}
|
||||||
|
b.Logger.Debug("found GCC",
|
||||||
|
b.Logger.Args("targetGCC", targetGCC.String(), "version", b.GCCVersion))
|
||||||
|
}
|
||||||
|
|
||||||
|
type BuilderImageNetworkMode interface {
|
||||||
|
// sets the network mode of the builder image, allows individual builders to override
|
||||||
|
BuilderImageNetMode() string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *Build) GetBuilderImage() string {
|
||||||
|
if b.hasCustomBuilderImage() {
|
||||||
|
// BuilderImage MUST have requested GCC installed inside
|
||||||
|
return b.BuilderImage
|
||||||
|
}
|
||||||
|
|
||||||
|
// NOTE: here below we are already sure that we are going
|
||||||
|
// to find an image, because setGCCVersion()
|
||||||
|
// has already set an existent gcc version
|
||||||
|
// (ie: one provided by an image) for us
|
||||||
|
image, _ := b.Images.findImage(b.TargetType, mustParseTolerant(b.GCCVersion))
|
||||||
|
return image.Name
|
||||||
}
|
}
|
||||||
|
|
||||||
// Factory returns a builder for the given target.
|
// Factory returns a builder for the given target.
|
||||||
func Factory(target Type) (Builder, error) {
|
func Factory(target Type) (Builder, error) {
|
||||||
b, ok := BuilderByTarget[target]
|
// Workaround for "local" target (that is not exposed to users,
|
||||||
|
// nor registered in byTarget map)".
|
||||||
|
if target.String() == "local" {
|
||||||
|
return &LocalBuilder{}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Driverkit builder is named "ubuntu"; there is no ubuntu-foo
|
||||||
|
if strings.HasPrefix(target.String(), "ubuntu") {
|
||||||
|
target = Type("ubuntu")
|
||||||
|
}
|
||||||
|
|
||||||
|
b, ok := byTarget[target]
|
||||||
if !ok {
|
if !ok {
|
||||||
return nil, fmt.Errorf("no builder found for target: %s", target)
|
return nil, fmt.Errorf("no builder found for target: %s", target)
|
||||||
}
|
}
|
||||||
return b, nil
|
return b, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func moduleDownloadURL(c Config) string {
|
// Targets returns the list of all the supported targets.
|
||||||
return fmt.Sprintf("%s/%s.tar.gz", c.DownloadBaseURL, c.DriverVersion)
|
func Targets() []string {
|
||||||
|
res := []string{}
|
||||||
|
for k := range byTarget {
|
||||||
|
res = append(res, k.String())
|
||||||
|
}
|
||||||
|
return res
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c Config) toTemplateData(b Builder, kr kernelrelease.KernelRelease) commonTemplateData {
|
||||||
|
c.setGCCVersion(b, kr)
|
||||||
|
return commonTemplateData{
|
||||||
|
DriverBuildDir: DriverDirectory,
|
||||||
|
ModuleDriverName: c.DriverName,
|
||||||
|
ModuleFullPath: c.ToDriverFullPath(),
|
||||||
|
BuildModule: len(c.ModuleFilePath) > 0,
|
||||||
|
BuildProbe: len(c.ProbeFilePath) > 0,
|
||||||
|
GCCVersion: c.GCCVersion,
|
||||||
|
CmakeCmd: fmt.Sprintf(cmakeCmdFmt,
|
||||||
|
c.DriverName,
|
||||||
|
c.DriverName,
|
||||||
|
c.DriverVersion,
|
||||||
|
c.DriverVersion,
|
||||||
|
c.DriverVersion,
|
||||||
|
c.DeviceName,
|
||||||
|
c.DeviceName,
|
||||||
|
c.DriverVersion),
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func resolveURLReference(u string) string {
|
func resolveURLReference(u string) string {
|
||||||
uu, err := url.Parse(u)
|
uu, err := url.Parse(u)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
base, err := url.Parse(uu.Host)
|
base, err := url.Parse(uu.Host)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
return base.ResolveReference(uu).String()
|
return base.ResolveReference(uu).String()
|
||||||
}
|
}
|
||||||
|
|
||||||
func getResolvingURLs(urls []string) ([]string, error) {
|
func GetResolvingURLs(urls []string) ([]string, error) {
|
||||||
results := []string{}
|
var results []string
|
||||||
for _, u := range urls {
|
for _, u := range urls {
|
||||||
// in case url has some relative paths
|
// in case url has some relative paths
|
||||||
// (kernel-crawler does not resolve them for us,
|
// (kernel-crawler does not resolve them for us,
|
||||||
|
@ -79,11 +424,10 @@ func getResolvingURLs(urls []string) ([]string, error) {
|
||||||
}
|
}
|
||||||
if res.StatusCode == http.StatusOK {
|
if res.StatusCode == http.StatusOK {
|
||||||
results = append(results, u)
|
results = append(results, u)
|
||||||
logger.WithField("url", u).Debug("kernel header url found")
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if len(results) == 0 {
|
if len(results) == 0 {
|
||||||
return nil, fmt.Errorf("kernel not found")
|
return nil, HeadersNotFoundErr
|
||||||
}
|
}
|
||||||
return results, nil
|
return results, nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,107 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/blang/semver/v4"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
var gccTests = []struct {
|
||||||
|
config kernelrelease.KernelRelease
|
||||||
|
expectedGCC semver.Version
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
config: kernelrelease.KernelRelease{
|
||||||
|
Fullversion: "4.15.0",
|
||||||
|
Version: semver.Version{
|
||||||
|
Major: 4,
|
||||||
|
Minor: 15,
|
||||||
|
Patch: 0,
|
||||||
|
},
|
||||||
|
Extraversion: "188",
|
||||||
|
FullExtraversion: "-188",
|
||||||
|
Architecture: kernelrelease.ArchitectureAmd64,
|
||||||
|
},
|
||||||
|
expectedGCC: semver.Version{
|
||||||
|
Major: 8,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
config: kernelrelease.KernelRelease{
|
||||||
|
Fullversion: "5.15.0",
|
||||||
|
Version: semver.Version{
|
||||||
|
Major: 5,
|
||||||
|
Minor: 15,
|
||||||
|
Patch: 0,
|
||||||
|
},
|
||||||
|
Extraversion: "1004-intel-iotg",
|
||||||
|
FullExtraversion: "-1004-intel-iotg",
|
||||||
|
Architecture: kernelrelease.ArchitectureAmd64,
|
||||||
|
},
|
||||||
|
expectedGCC: semver.Version{
|
||||||
|
Major: 12,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
config: kernelrelease.KernelRelease{
|
||||||
|
Fullversion: "3.13.0",
|
||||||
|
Version: semver.Version{
|
||||||
|
Major: 3,
|
||||||
|
Minor: 13,
|
||||||
|
Patch: 0,
|
||||||
|
},
|
||||||
|
Extraversion: "100",
|
||||||
|
FullExtraversion: "-100",
|
||||||
|
Architecture: kernelrelease.ArchitectureAmd64,
|
||||||
|
},
|
||||||
|
expectedGCC: semver.Version{
|
||||||
|
Major: 4,
|
||||||
|
Minor: 9,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
config: kernelrelease.KernelRelease{
|
||||||
|
Fullversion: "5.18.0",
|
||||||
|
Version: semver.Version{
|
||||||
|
Major: 5,
|
||||||
|
Minor: 18,
|
||||||
|
Patch: 0,
|
||||||
|
},
|
||||||
|
Extraversion: "1001-kvm",
|
||||||
|
FullExtraversion: "-1001-kvm",
|
||||||
|
Architecture: kernelrelease.ArchitectureAmd64,
|
||||||
|
},
|
||||||
|
expectedGCC: semver.Version{
|
||||||
|
Major: 12,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDefaultGCC(t *testing.T) {
|
||||||
|
for _, test := range gccTests {
|
||||||
|
// call function
|
||||||
|
selectedGCC := defaultGCC(test.config)
|
||||||
|
|
||||||
|
// compare errors
|
||||||
|
// there are no official errors, so comparing fmt.Errorf() doesn't really work
|
||||||
|
// compare error message text instead
|
||||||
|
if test.expectedGCC.NE(selectedGCC) {
|
||||||
|
t.Fatalf("SelectedGCC (%s) != expectedGCC (%s) with kernelrelease: '%v'", selectedGCC, test.expectedGCC, test.config)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,14 +1,30 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
_ "embed"
|
_ "embed"
|
||||||
"fmt"
|
"fmt"
|
||||||
"text/template"
|
|
||||||
|
|
||||||
|
"github.com/blang/semver/v4"
|
||||||
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
//go:embed templates/centos_kernel.sh
|
||||||
|
var centosKernelTemplate string
|
||||||
|
|
||||||
//go:embed templates/centos.sh
|
//go:embed templates/centos.sh
|
||||||
var centosTemplate string
|
var centosTemplate string
|
||||||
|
|
||||||
|
@ -16,52 +32,28 @@ var centosTemplate string
|
||||||
const TargetTypeCentos Type = "centos"
|
const TargetTypeCentos Type = "centos"
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
BuilderByTarget[TargetTypeCentos] = ¢os{}
|
byTarget[TargetTypeCentos] = ¢os{}
|
||||||
}
|
}
|
||||||
|
|
||||||
// centos is a driverkit target.
|
// centos is a driverkit target.
|
||||||
type centos struct {
|
type centos struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Script compiles the script to build the kernel module and/or the eBPF probe.
|
type centosTemplateData struct {
|
||||||
func (c centos) Script(cfg Config, kr kernelrelease.KernelRelease) (string, error) {
|
KernelDownloadURL string
|
||||||
t := template.New(string(TargetTypeCentos))
|
|
||||||
parsed, err := t.Parse(centosTemplate)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
var urls []string
|
|
||||||
if cfg.KernelUrls == nil {
|
|
||||||
// Check (and filter) existing kernels before continuing
|
|
||||||
urls, err = getResolvingURLs(fetchCentosKernelURLS(kr))
|
|
||||||
} else {
|
|
||||||
urls, err = getResolvingURLs(cfg.KernelUrls)
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
td := centosTemplateData{
|
|
||||||
DriverBuildDir: DriverDirectory,
|
|
||||||
ModuleDownloadURL: moduleDownloadURL(cfg),
|
|
||||||
KernelDownloadURL: urls[0],
|
|
||||||
GCCVersion: centosGccVersionFromKernelRelease(kr),
|
|
||||||
ModuleDriverName: cfg.DriverName,
|
|
||||||
ModuleFullPath: ModuleFullPath,
|
|
||||||
BuildModule: len(cfg.Build.ModuleFilePath) > 0,
|
|
||||||
BuildProbe: len(cfg.Build.ProbeFilePath) > 0,
|
|
||||||
}
|
|
||||||
|
|
||||||
buf := bytes.NewBuffer(nil)
|
|
||||||
err = parsed.Execute(buf, td)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
return buf.String(), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func fetchCentosKernelURLS(kr kernelrelease.KernelRelease) []string {
|
func (c *centos) Name() string {
|
||||||
|
return TargetTypeCentos.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *centos) TemplateKernelUrlsScript() string { return centosKernelTemplate }
|
||||||
|
|
||||||
|
func (c *centos) TemplateScript() string {
|
||||||
|
return centosTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *centos) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
vaultReleases := []string{
|
vaultReleases := []string{
|
||||||
"6.0/os",
|
"6.0/os",
|
||||||
"6.0/updates",
|
"6.0/updates",
|
||||||
|
@ -132,6 +124,11 @@ func fetchCentosKernelURLS(kr kernelrelease.KernelRelease) []string {
|
||||||
"8-stream/BaseOS",
|
"8-stream/BaseOS",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
stream9Releases := []string{
|
||||||
|
"9-stream/AppStream",
|
||||||
|
"9-stream/BaseOS",
|
||||||
|
}
|
||||||
|
|
||||||
urls := []string{}
|
urls := []string{}
|
||||||
for _, r := range edgeReleases {
|
for _, r := range edgeReleases {
|
||||||
urls = append(urls, fmt.Sprintf(
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
@ -169,26 +166,35 @@ func fetchCentosKernelURLS(kr kernelrelease.KernelRelease) []string {
|
||||||
kr.FullExtraversion,
|
kr.FullExtraversion,
|
||||||
))
|
))
|
||||||
}
|
}
|
||||||
return urls
|
|
||||||
}
|
|
||||||
|
|
||||||
type centosTemplateData struct {
|
for _, r := range stream9Releases {
|
||||||
DriverBuildDir string
|
urls = append(urls, fmt.Sprintf(
|
||||||
ModuleDownloadURL string
|
"http://mirror.stream.centos.org/%s/%s/os/Packages/kernel-devel-%s%s.rpm",
|
||||||
KernelDownloadURL string
|
r,
|
||||||
GCCVersion string
|
kr.Architecture.ToNonDeb(),
|
||||||
ModuleDriverName string
|
kr.Fullversion,
|
||||||
ModuleFullPath string
|
kr.FullExtraversion,
|
||||||
BuildModule bool
|
))
|
||||||
BuildProbe bool
|
|
||||||
}
|
|
||||||
|
|
||||||
func centosGccVersionFromKernelRelease(kr kernelrelease.KernelRelease) string {
|
|
||||||
switch kr.Version {
|
|
||||||
case 3:
|
|
||||||
return "5"
|
|
||||||
case 2:
|
|
||||||
return "4.8"
|
|
||||||
}
|
}
|
||||||
return "8"
|
|
||||||
|
return urls, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *centos) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return centosTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *centos) GCCVersion(kr kernelrelease.KernelRelease) semver.Version {
|
||||||
|
// 4.18+ centos 8 kernels need gcc 9
|
||||||
|
if kr.Major == 4 && kr.Minor >= 18 {
|
||||||
|
return semver.Version{Major: 9}
|
||||||
|
}
|
||||||
|
// 3.10.X kernels need 4.8.5 gcc version; see:
|
||||||
|
// https://github.com/falcosecurity/driverkit/issues/236
|
||||||
|
if kr.Major == 3 && kr.Minor == 10 {
|
||||||
|
return semver.Version{Major: 4, Minor: 8, Patch: 5}
|
||||||
|
}
|
||||||
|
return semver.Version{}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,82 +1,93 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
_ "embed"
|
_ "embed"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"net/http"
|
"net/http"
|
||||||
"regexp"
|
"regexp"
|
||||||
"strings"
|
"strings"
|
||||||
"text/template"
|
|
||||||
|
|
||||||
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
//go:embed templates/debian_kernel.sh
|
||||||
|
var debianKernelTemplate string
|
||||||
|
|
||||||
//go:embed templates/debian.sh
|
//go:embed templates/debian.sh
|
||||||
var debianTemplate string
|
var debianTemplate string
|
||||||
|
|
||||||
// TargetTypeDebian identifies the Debian target.
|
// TargetTypeDebian identifies the Debian target.
|
||||||
const TargetTypeDebian Type = "debian"
|
const TargetTypeDebian Type = "debian"
|
||||||
|
|
||||||
|
// We need:
|
||||||
|
// kernel devel
|
||||||
|
// kernel devel common
|
||||||
|
// kbuild package
|
||||||
|
const debianRequiredURLs = 3
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
BuilderByTarget[TargetTypeDebian] = &debian{}
|
byTarget[TargetTypeDebian] = &debian{}
|
||||||
|
}
|
||||||
|
|
||||||
|
type debianTemplateData struct {
|
||||||
|
KernelDownloadURLS []string
|
||||||
|
KernelLocalVersion string
|
||||||
|
KernelHeadersPattern string
|
||||||
}
|
}
|
||||||
|
|
||||||
// debian is a driverkit target.
|
// debian is a driverkit target.
|
||||||
type debian struct {
|
type debian struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Script compiles the script to build the kernel module and/or the eBPF probe.
|
func (v *debian) Name() string {
|
||||||
func (v debian) Script(c Config, kr kernelrelease.KernelRelease) (string, error) {
|
return TargetTypeDebian.String()
|
||||||
t := template.New(string(TargetTypeDebian))
|
}
|
||||||
|
|
||||||
debTemplateStr := fmt.Sprintf(debianTemplate, kr.Architecture.String())
|
func (v *debian) TemplateKernelUrlsScript() string { return debianKernelTemplate }
|
||||||
parsed, err := t.Parse(debTemplateStr)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
var urls []string
|
func (v *debian) TemplateScript() string {
|
||||||
if c.KernelUrls == nil {
|
return debianTemplate
|
||||||
var kurls []string
|
}
|
||||||
kurls, err = fetchDebianKernelURLs(kr)
|
|
||||||
if err != nil {
|
func (v *debian) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
return "", err
|
return fetchDebianKernelURLs(kr)
|
||||||
}
|
}
|
||||||
urls, err = getResolvingURLs(kurls)
|
|
||||||
|
func (v *debian) KernelTemplateData(kr kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
var KernelHeadersPattern string
|
||||||
|
if strings.HasSuffix(kr.Extraversion, "pve") {
|
||||||
|
KernelHeadersPattern = "linux-headers-*pve"
|
||||||
|
} else if strings.Contains(kr.FullExtraversion, "rpi") {
|
||||||
|
KernelHeadersPattern = "linux-headers-*-rpi-v*"
|
||||||
} else {
|
} else {
|
||||||
urls, err = getResolvingURLs(c.KernelUrls)
|
KernelHeadersPattern = "linux-headers-*" + kr.Architecture.String()
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
// We need:
|
|
||||||
// kernel devel
|
|
||||||
// kernel devel common
|
|
||||||
// kbuild package
|
|
||||||
if len(urls) < 3 {
|
|
||||||
return "", fmt.Errorf("specific kernel headers not found")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
td := debianTemplateData{
|
return debianTemplateData{
|
||||||
DriverBuildDir: DriverDirectory,
|
KernelDownloadURLS: urls,
|
||||||
ModuleDownloadURL: fmt.Sprintf("%s/%s.tar.gz", c.DownloadBaseURL, c.Build.DriverVersion),
|
KernelLocalVersion: kr.FullExtraversion,
|
||||||
KernelDownloadURLS: urls,
|
KernelHeadersPattern: KernelHeadersPattern,
|
||||||
KernelLocalVersion: kr.FullExtraversion,
|
|
||||||
ModuleDriverName: c.DriverName,
|
|
||||||
ModuleFullPath: ModuleFullPath,
|
|
||||||
BuildModule: len(c.Build.ModuleFilePath) > 0,
|
|
||||||
BuildProbe: len(c.Build.ProbeFilePath) > 0,
|
|
||||||
LLVMVersion: debianLLVMVersionFromKernelRelease(kr),
|
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
buf := bytes.NewBuffer(nil)
|
func (v *debian) MinimumURLs() int {
|
||||||
err = parsed.Execute(buf, td)
|
return debianRequiredURLs
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
return buf.String(), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func fetchDebianKernelURLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
func fetchDebianKernelURLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
@ -94,18 +105,6 @@ func fetchDebianKernelURLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
return urls, nil
|
return urls, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
type debianTemplateData struct {
|
|
||||||
DriverBuildDir string
|
|
||||||
ModuleDownloadURL string
|
|
||||||
KernelDownloadURLS []string
|
|
||||||
KernelLocalVersion string
|
|
||||||
ModuleDriverName string
|
|
||||||
ModuleFullPath string
|
|
||||||
BuildModule bool
|
|
||||||
BuildProbe bool
|
|
||||||
LLVMVersion string
|
|
||||||
}
|
|
||||||
|
|
||||||
func debianHeadersURLFromRelease(kr kernelrelease.KernelRelease) ([]string, error) {
|
func debianHeadersURLFromRelease(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
baseURLS := []string{
|
baseURLS := []string{
|
||||||
"http://security-cdn.debian.org/pool/main/l/linux/",
|
"http://security-cdn.debian.org/pool/main/l/linux/",
|
||||||
|
@ -121,7 +120,7 @@ func debianHeadersURLFromRelease(kr kernelrelease.KernelRelease) ([]string, erro
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil, fmt.Errorf("kernel headers not found")
|
return nil, HeadersNotFoundErr
|
||||||
}
|
}
|
||||||
|
|
||||||
func fetchDebianHeadersURLFromRelease(baseURL string, kr kernelrelease.KernelRelease) ([]string, error) {
|
func fetchDebianHeadersURLFromRelease(baseURL string, kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
@ -136,9 +135,18 @@ func fetchDebianHeadersURLFromRelease(baseURL string, kr kernelrelease.KernelRel
|
||||||
matchExtraGroupCommon := "common"
|
matchExtraGroupCommon := "common"
|
||||||
|
|
||||||
// match for kernel versions like 4.19.0-6-cloud-amd64
|
// match for kernel versions like 4.19.0-6-cloud-amd64
|
||||||
if strings.Contains(kr.FullExtraversion, "-cloud") {
|
supportedExtraFlavors := []string{"cloud", "rt", "rpi"}
|
||||||
extraVersionPartial = strings.TrimSuffix(extraVersionPartial, "-cloud")
|
for _, supportedExtraFlavor := range supportedExtraFlavors {
|
||||||
matchExtraGroup = "cloud-" + matchExtraGroup
|
if strings.Contains(kr.FullExtraversion, "-"+supportedExtraFlavor) {
|
||||||
|
extraVersionPartial = strings.TrimSuffix(extraVersionPartial, "-"+supportedExtraFlavor)
|
||||||
|
matchExtraGroup = supportedExtraFlavor + "-" + matchExtraGroup
|
||||||
|
|
||||||
|
// rpi and rt have a different common package, named `common-{rt,rpi}`
|
||||||
|
if supportedExtraFlavor == "rt" || supportedExtraFlavor == "rpi" {
|
||||||
|
matchExtraGroupCommon += "-" + supportedExtraFlavor
|
||||||
|
}
|
||||||
|
break
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// download index
|
// download index
|
||||||
|
@ -147,19 +155,19 @@ func fetchDebianHeadersURLFromRelease(baseURL string, kr kernelrelease.KernelRel
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
defer resp.Body.Close()
|
defer resp.Body.Close()
|
||||||
body, err := ioutil.ReadAll(resp.Body)
|
body, err := io.ReadAll(resp.Body)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
bodyStr := string(body)
|
bodyStr := string(body)
|
||||||
|
|
||||||
// look for kernel headers
|
// look for kernel headers
|
||||||
fullregex := fmt.Sprintf(rmatch, kr.Version, kr.PatchLevel, kr.Sublevel,
|
fullregex := fmt.Sprintf(rmatch, kr.Major, kr.Minor, kr.Patch,
|
||||||
extraVersionPartial, matchExtraGroup, kr.Architecture.String())
|
extraVersionPartial, matchExtraGroup, kr.Architecture.String())
|
||||||
pattern := regexp.MustCompile(fullregex)
|
pattern := regexp.MustCompile(fullregex)
|
||||||
matches := pattern.FindStringSubmatch(bodyStr)
|
matches := pattern.FindStringSubmatch(bodyStr)
|
||||||
if len(matches) < 1 {
|
if len(matches) < 1 {
|
||||||
fullregex = fmt.Sprintf(rmatchNew, matchExtraGroup, kr.Version, kr.PatchLevel, kr.Sublevel,
|
fullregex = fmt.Sprintf(rmatchNew, matchExtraGroup, kr.Major, kr.Minor, kr.Patch,
|
||||||
extraVersionPartial, kr.Architecture.String())
|
extraVersionPartial, kr.Architecture.String())
|
||||||
pattern = regexp.MustCompile(fullregex)
|
pattern = regexp.MustCompile(fullregex)
|
||||||
matches = pattern.FindStringSubmatch(bodyStr)
|
matches = pattern.FindStringSubmatch(bodyStr)
|
||||||
|
@ -169,12 +177,12 @@ func fetchDebianHeadersURLFromRelease(baseURL string, kr kernelrelease.KernelRel
|
||||||
}
|
}
|
||||||
|
|
||||||
// look for kernel headers common
|
// look for kernel headers common
|
||||||
fullregexCommon := fmt.Sprintf(rmatch, kr.Version, kr.PatchLevel, kr.Sublevel,
|
fullregexCommon := fmt.Sprintf(rmatch, kr.Major, kr.Minor, kr.Patch,
|
||||||
extraVersionPartial, matchExtraGroupCommon, kr.Architecture.String())
|
extraVersionPartial, matchExtraGroupCommon, kr.Architecture.String())
|
||||||
patternCommon := regexp.MustCompile(fullregexCommon)
|
patternCommon := regexp.MustCompile(fullregexCommon)
|
||||||
matchesCommon := patternCommon.FindStringSubmatch(bodyStr)
|
matchesCommon := patternCommon.FindStringSubmatch(bodyStr)
|
||||||
if len(matchesCommon) < 1 {
|
if len(matchesCommon) < 1 {
|
||||||
fullregexCommon = fmt.Sprintf(rmatchNew, matchExtraGroupCommon, kr.Version, kr.PatchLevel, kr.Sublevel,
|
fullregexCommon = fmt.Sprintf(rmatchNew, matchExtraGroupCommon, kr.Major, kr.Minor, kr.Patch,
|
||||||
extraVersionPartial, kr.Architecture.String())
|
extraVersionPartial, kr.Architecture.String())
|
||||||
patternCommon = regexp.MustCompile(fullregexCommon)
|
patternCommon = regexp.MustCompile(fullregexCommon)
|
||||||
matchesCommon = patternCommon.FindStringSubmatch(bodyStr)
|
matchesCommon = patternCommon.FindStringSubmatch(bodyStr)
|
||||||
|
@ -192,9 +200,9 @@ func fetchDebianHeadersURLFromRelease(baseURL string, kr kernelrelease.KernelRel
|
||||||
func debianKbuildURLFromRelease(kr kernelrelease.KernelRelease) (string, error) {
|
func debianKbuildURLFromRelease(kr kernelrelease.KernelRelease) (string, error) {
|
||||||
rmatch := `href="(linux-kbuild-%d\.%d.*%s\.deb)"`
|
rmatch := `href="(linux-kbuild-%d\.%d.*%s\.deb)"`
|
||||||
|
|
||||||
kbuildPattern := regexp.MustCompile(fmt.Sprintf(rmatch, kr.Version, kr.PatchLevel, kr.Architecture.String()))
|
kbuildPattern := regexp.MustCompile(fmt.Sprintf(rmatch, kr.Major, kr.Minor, kr.Architecture.String()))
|
||||||
baseURL := "http://mirrors.kernel.org/debian/pool/main/l/linux/"
|
baseURL := "http://mirrors.kernel.org/debian/pool/main/l/linux/"
|
||||||
if kr.Version == 3 {
|
if kr.Major == 3 {
|
||||||
baseURL = "http://mirrors.kernel.org/debian/pool/main/l/linux-tools/"
|
baseURL = "http://mirrors.kernel.org/debian/pool/main/l/linux-tools/"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -215,11 +223,3 @@ func debianKbuildURLFromRelease(kr kernelrelease.KernelRelease) (string, error)
|
||||||
|
|
||||||
return fmt.Sprintf("%s%s", baseURL, match[1]), nil
|
return fmt.Sprintf("%s%s", baseURL, match[1]), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func debianLLVMVersionFromKernelRelease(kr kernelrelease.KernelRelease) string {
|
|
||||||
switch kr.Version {
|
|
||||||
case 5:
|
|
||||||
return "12"
|
|
||||||
}
|
|
||||||
return "7"
|
|
||||||
}
|
|
||||||
|
|
|
@ -0,0 +1,105 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
//go:embed templates/fedora_kernel.sh
|
||||||
|
var fedoraKernelTemplate string
|
||||||
|
|
||||||
|
//go:embed templates/fedora.sh
|
||||||
|
var fedoraTemplate string
|
||||||
|
|
||||||
|
// TargetTypeFedora identifies the Fedora target.
|
||||||
|
const TargetTypeFedora Type = "fedora"
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeFedora] = &fedora{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// fedora is a driverkit target.
|
||||||
|
type fedora struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
type fedoraTemplateData struct {
|
||||||
|
KernelDownloadURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *fedora) Name() string {
|
||||||
|
return TargetTypeFedora.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *fedora) TemplateKernelUrlsScript() string { return fedoraKernelTemplate }
|
||||||
|
|
||||||
|
func (c *fedora) TemplateScript() string {
|
||||||
|
return fedoraTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *fedora) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
|
||||||
|
// fedora FullExtraversion looks like "-200.fc36.x86_64"
|
||||||
|
// need to get the "fc36" out of the middle
|
||||||
|
fedoraVersion := strings.Split(kr.FullExtraversion, ".")[1]
|
||||||
|
|
||||||
|
// trim off the "fc" from fedoraVersion
|
||||||
|
version := strings.Trim(fedoraVersion, "fc")
|
||||||
|
|
||||||
|
// template the kernel info into all possible URL strings
|
||||||
|
urls := []string{
|
||||||
|
fmt.Sprintf( // updates
|
||||||
|
"https://mirrors.kernel.org/fedora/updates/%s/Everything/%s/Packages/k/kernel-devel-%s%s.rpm",
|
||||||
|
version,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
),
|
||||||
|
fmt.Sprintf( // releases
|
||||||
|
"https://mirrors.kernel.org/fedora/releases/%s/Everything/%s/os/Packages/k/kernel-devel-%s%s.rpm",
|
||||||
|
version,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
),
|
||||||
|
fmt.Sprintf( // development
|
||||||
|
"https://mirrors.kernel.org/fedora/development/%s/Everything/%s/os/Packages/k/kernel-devel-%s%s.rpm",
|
||||||
|
version,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
),
|
||||||
|
fmt.Sprintf( // updates-archive
|
||||||
|
"https://fedoraproject-updates-archive.fedoraproject.org/fedora/%s/%s/kernel-devel-%s%s.rpm",
|
||||||
|
version,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
),
|
||||||
|
}
|
||||||
|
|
||||||
|
// return out all possible urls
|
||||||
|
return urls, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *fedora) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return fedoraTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,17 +1,33 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
_ "embed"
|
_ "embed"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
"text/template"
|
|
||||||
|
|
||||||
|
"github.com/blang/semver/v4"
|
||||||
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
//go:embed templates/flatcar_kernel.sh
|
||||||
|
var flatcarKernelTemplate string
|
||||||
|
|
||||||
//go:embed templates/flatcar.sh
|
//go:embed templates/flatcar.sh
|
||||||
var flatcarTemplate string
|
var flatcarTemplate string
|
||||||
|
|
||||||
|
@ -19,77 +35,79 @@ var flatcarTemplate string
|
||||||
const TargetTypeFlatcar Type = "flatcar"
|
const TargetTypeFlatcar Type = "flatcar"
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
BuilderByTarget[TargetTypeFlatcar] = &flatcar{}
|
byTarget[TargetTypeFlatcar] = &flatcar{}
|
||||||
|
}
|
||||||
|
|
||||||
|
type flatcarTemplateData struct {
|
||||||
|
KernelDownloadURL string
|
||||||
}
|
}
|
||||||
|
|
||||||
// flatcar is a driverkit target.
|
// flatcar is a driverkit target.
|
||||||
type flatcar struct {
|
type flatcar struct {
|
||||||
|
info *flatcarReleaseInfo
|
||||||
}
|
}
|
||||||
|
|
||||||
// Script compiles the script to build the kernel module and/or the eBPF probe.
|
func (f *flatcar) Name() string {
|
||||||
func (c flatcar) Script(cfg Config, kr kernelrelease.KernelRelease) (string, error) {
|
return TargetTypeFlatcar.String()
|
||||||
t := template.New(string(TargetTypeFlatcar))
|
}
|
||||||
parsed, err := t.Parse(flatcarTemplate)
|
|
||||||
if err != nil {
|
func (f *flatcar) TemplateKernelUrlsScript() string {
|
||||||
return "", err
|
return flatcarKernelTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *flatcar) TemplateScript() string {
|
||||||
|
return flatcarTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *flatcar) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
if err := f.fillFlatcarInfos(kr); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return fetchFlatcarKernelURLS(f.info.KernelVersion), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *flatcar) KernelTemplateData(kr kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
// This happens when `kernelurls` option is passed,
|
||||||
|
// therefore URLs() method is not called.
|
||||||
|
if f.info == nil {
|
||||||
|
if err := f.fillFlatcarInfos(kr); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return flatcarTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *flatcar) GCCVersion(_ kernelrelease.KernelRelease) semver.Version {
|
||||||
|
return f.info.GCCVersion
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *flatcar) fillFlatcarInfos(kr kernelrelease.KernelRelease) error {
|
||||||
if kr.Extraversion != "" {
|
if kr.Extraversion != "" {
|
||||||
return "", fmt.Errorf("unexpected extraversion: %s", kr.Extraversion)
|
return fmt.Errorf("unexpected extraversion: %s", kr.Extraversion)
|
||||||
}
|
}
|
||||||
|
|
||||||
// convert string to int
|
// convert string to int
|
||||||
if kr.Version < 1500 {
|
if kr.Major < 1500 {
|
||||||
return "", fmt.Errorf("not a valid flatcar release version: %d", kr.Version)
|
return fmt.Errorf("not a valid flatcar release version: %d", kr.Major)
|
||||||
}
|
|
||||||
flatcarVersion := kr.Fullversion
|
|
||||||
flatcarInfo, err := fetchFlatcarMetadata(kr)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
}
|
||||||
|
|
||||||
kconfUrls, err := getResolvingURLs(fetchFlatcarKernelConfigURL(kr.Architecture, flatcarInfo.Channel, kr.Fullversion))
|
var err error
|
||||||
if err != nil {
|
f.info, err = fetchFlatcarMetadata(kr)
|
||||||
return "", err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
var urls []string
|
func fetchFlatcarKernelURLS(kernelVersion string) []string {
|
||||||
if cfg.KernelUrls == nil {
|
kv := kernelrelease.FromString(kernelVersion)
|
||||||
// Check (and filter) existing kernels before continuing
|
return []string{fetchVanillaKernelURLFromKernelVersion(kv)}
|
||||||
urls, err = getResolvingURLs(fetchFlatcarKernelURLS(flatcarInfo.KernelVersion))
|
|
||||||
} else {
|
|
||||||
urls, err = getResolvingURLs(cfg.KernelUrls)
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
td := flatcarTemplateData{
|
|
||||||
DriverBuildDir: DriverDirectory,
|
|
||||||
ModuleDownloadURL: moduleDownloadURL(cfg),
|
|
||||||
KernelDownloadURL: urls[0],
|
|
||||||
GCCVersion: flatcarGccVersion(flatcarInfo.GCCVersion),
|
|
||||||
FlatcarVersion: flatcarVersion,
|
|
||||||
FlatcarChannel: flatcarInfo.Channel,
|
|
||||||
KernelConfigURL: kconfUrls[0],
|
|
||||||
ModuleDriverName: cfg.DriverName,
|
|
||||||
ModuleFullPath: ModuleFullPath,
|
|
||||||
BuildModule: len(cfg.Build.ModuleFilePath) > 0,
|
|
||||||
BuildProbe: len(cfg.Build.ProbeFilePath) > 0,
|
|
||||||
}
|
|
||||||
|
|
||||||
buf := bytes.NewBuffer(nil)
|
|
||||||
err = parsed.Execute(buf, td)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
return buf.String(), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func fetchFlatcarMetadata(kr kernelrelease.KernelRelease) (*flatcarReleaseInfo, error) {
|
func fetchFlatcarMetadata(kr kernelrelease.KernelRelease) (*flatcarReleaseInfo, error) {
|
||||||
flatcarInfo := flatcarReleaseInfo{}
|
flatcarInfo := flatcarReleaseInfo{}
|
||||||
flatcarVersion := kr.Fullversion
|
flatcarVersion := kr.Fullversion
|
||||||
packageIndexUrl, err := getResolvingURLs(fetchFlatcarPackageListURL(kr.Architecture, flatcarVersion))
|
packageIndexUrl, err := GetResolvingURLs(fetchFlatcarPackageListURL(kr.Architecture, flatcarVersion))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -124,7 +142,10 @@ func fetchFlatcarMetadata(kr kernelrelease.KernelRelease) (*flatcarReleaseInfo,
|
||||||
kernelVersion = strings.Split(kernelVersion, "-")[0]
|
kernelVersion = strings.Split(kernelVersion, "-")[0]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
flatcarInfo.GCCVersion = gccVersion
|
flatcarInfo.GCCVersion, err = semver.ParseTolerant(gccVersion)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
flatcarInfo.KernelVersion = kernelVersion
|
flatcarInfo.KernelVersion = kernelVersion
|
||||||
|
|
||||||
return &flatcarInfo, nil
|
return &flatcarInfo, nil
|
||||||
|
@ -144,43 +165,8 @@ func fetchFlatcarPackageListURL(architecture kernelrelease.Architecture, flatcar
|
||||||
return urls
|
return urls
|
||||||
}
|
}
|
||||||
|
|
||||||
func fetchFlatcarKernelConfigURL(architecture kernelrelease.Architecture, flatcarChannel, flatcarVersion string) []string {
|
|
||||||
return []string{fmt.Sprintf("https://%s.release.flatcar-linux.net/%s-usr/%s/flatcar_production_image_kernel_config.txt", flatcarChannel, architecture.String(), flatcarVersion)}
|
|
||||||
}
|
|
||||||
|
|
||||||
func fetchFlatcarKernelURLS(kernelVersion string) []string {
|
|
||||||
kv := kernelrelease.FromString(kernelVersion)
|
|
||||||
return []string{fmt.Sprintf("https://cdn.kernel.org/pub/linux/kernel/v%d.x/linux-%s.tar.xz", kv.Version, kv.Fullversion)}
|
|
||||||
}
|
|
||||||
|
|
||||||
type flatcarReleaseInfo struct {
|
type flatcarReleaseInfo struct {
|
||||||
Channel string
|
Channel string
|
||||||
GCCVersion string
|
GCCVersion semver.Version
|
||||||
KernelVersion string
|
KernelVersion string
|
||||||
}
|
}
|
||||||
|
|
||||||
type flatcarTemplateData struct {
|
|
||||||
DriverBuildDir string
|
|
||||||
ModuleDownloadURL string
|
|
||||||
KernelDownloadURL string
|
|
||||||
GCCVersion string
|
|
||||||
FlatcarVersion string
|
|
||||||
FlatcarChannel string
|
|
||||||
KernelConfigURL string
|
|
||||||
ModuleDriverName string
|
|
||||||
ModuleFullPath string
|
|
||||||
BuildModule bool
|
|
||||||
BuildProbe bool
|
|
||||||
}
|
|
||||||
|
|
||||||
func flatcarGccVersion(gccVersion string) string {
|
|
||||||
// reuse kernelrelease version parsing for gcc
|
|
||||||
gv := kernelrelease.FromString(gccVersion)
|
|
||||||
switch gv.Version {
|
|
||||||
case 7:
|
|
||||||
return "6"
|
|
||||||
default:
|
|
||||||
// builder doesn't support anything newer than 8 right now
|
|
||||||
return "8"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
|
@ -0,0 +1,263 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"github.com/falcosecurity/falcoctl/pkg/output"
|
||||||
|
"os"
|
||||||
|
"regexp"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/blang/semver/v4"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
"github.com/falcosecurity/falcoctl/pkg/oci/repository"
|
||||||
|
"gopkg.in/yaml.v3"
|
||||||
|
)
|
||||||
|
|
||||||
|
type YAMLImage struct {
|
||||||
|
Target string `yaml:"target"`
|
||||||
|
GCCVersions []string `yaml:"gcc_versions"` // we expect images to internally link eg: gcc5 to gcc5.0.0
|
||||||
|
Name string `yaml:"name"`
|
||||||
|
Arch string `yaml:"arch"`
|
||||||
|
Tag string `yaml:"tag"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type YAMLImagesList struct {
|
||||||
|
Images []YAMLImage `yaml:"images"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type Image struct {
|
||||||
|
Target Type
|
||||||
|
GCCVersion semver.Version // we expect images to internally link eg: gcc5 to gcc5.0.0
|
||||||
|
Name string
|
||||||
|
}
|
||||||
|
|
||||||
|
type ImagesLister interface {
|
||||||
|
LoadImages(printer *output.Printer) []Image
|
||||||
|
}
|
||||||
|
|
||||||
|
type FileImagesLister struct {
|
||||||
|
FilePath string
|
||||||
|
Arch string
|
||||||
|
Tag string
|
||||||
|
Target string
|
||||||
|
}
|
||||||
|
|
||||||
|
type RepoImagesLister struct {
|
||||||
|
*repository.Repository
|
||||||
|
}
|
||||||
|
|
||||||
|
type ImageKey string
|
||||||
|
|
||||||
|
func (i *Image) toKey() ImageKey {
|
||||||
|
return ImageKey(i.Target.String() + "_" + i.GCCVersion.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
type ImagesMap map[ImageKey]Image
|
||||||
|
|
||||||
|
var tagReg *regexp.Regexp
|
||||||
|
|
||||||
|
func (im ImagesMap) findImage(target Type, gccVers semver.Version) (Image, bool) {
|
||||||
|
targetImage := Image{
|
||||||
|
Target: target,
|
||||||
|
GCCVersion: gccVers,
|
||||||
|
}
|
||||||
|
// Try to find specific image for specific target first
|
||||||
|
if img, ok := im[targetImage.toKey()]; ok {
|
||||||
|
return img, true
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fallback at "any" target that offers specific gcc
|
||||||
|
targetImage.Target = "any"
|
||||||
|
if img, ok := im[targetImage.toKey()]; ok {
|
||||||
|
return img, true
|
||||||
|
}
|
||||||
|
return Image{}, false
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewFileImagesLister(filePath string, build *Build) (*FileImagesLister, error) {
|
||||||
|
return &FileImagesLister{
|
||||||
|
FilePath: filePath,
|
||||||
|
Arch: kernelrelease.Architecture(build.Architecture).ToNonDeb(),
|
||||||
|
Tag: build.builderImageTag(),
|
||||||
|
Target: build.TargetType.String(),
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *FileImagesLister) LoadImages(printer *output.Printer) []Image {
|
||||||
|
var (
|
||||||
|
res []Image
|
||||||
|
imageList YAMLImagesList
|
||||||
|
)
|
||||||
|
|
||||||
|
// loop over lines in file to print them
|
||||||
|
fileData, err := os.ReadFile(f.FilePath)
|
||||||
|
if err != nil {
|
||||||
|
printer.Logger.Warn("error opening builder repo file",
|
||||||
|
printer.Logger.Args("err", err.Error(), "filepath", f.FilePath))
|
||||||
|
return res
|
||||||
|
}
|
||||||
|
|
||||||
|
err = yaml.Unmarshal(fileData, &imageList)
|
||||||
|
if err != nil {
|
||||||
|
printer.Logger.Warn("error unmarshalling builder repo file",
|
||||||
|
printer.Logger.Args("err", err.Error(), "filepath", f.FilePath))
|
||||||
|
return res
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, image := range imageList.Images {
|
||||||
|
// Values checks
|
||||||
|
if image.Arch != f.Arch {
|
||||||
|
printer.Logger.Debug("skipping wrong-arch image",
|
||||||
|
printer.Logger.Args("filepath", f.FilePath, "image", image))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if image.Tag != f.Tag {
|
||||||
|
printer.Logger.Debug("skipping wrong-tag image",
|
||||||
|
printer.Logger.Args("filepath", f.FilePath, "image", image))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if image.Target != "any" && image.Target != f.Target {
|
||||||
|
printer.Logger.Debug("skipping wrong-target image",
|
||||||
|
printer.Logger.Args("filepath", f.FilePath, "image", image))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if image.Name == "" {
|
||||||
|
printer.Logger.Debug("skipping empty name image",
|
||||||
|
printer.Logger.Args("filepath", f.FilePath, "image", image))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if len(image.GCCVersions) == 0 {
|
||||||
|
printer.Logger.Debug("expected at least 1 gcc version",
|
||||||
|
printer.Logger.Args("filepath", f.FilePath, "image", image))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, gcc := range image.GCCVersions {
|
||||||
|
buildImage := Image{
|
||||||
|
Name: image.Name,
|
||||||
|
Target: Type(image.Target),
|
||||||
|
GCCVersion: mustParseTolerant(gcc),
|
||||||
|
}
|
||||||
|
res = append(res, buildImage)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return res
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRepoImagesLister(repo string, build *Build) (*RepoImagesLister, error) {
|
||||||
|
// Lazy inizialization
|
||||||
|
if tagReg == nil {
|
||||||
|
imageTag := build.builderImageTag()
|
||||||
|
// Create the proper regexes to load "any" and target-specific images for requested arch
|
||||||
|
arch := kernelrelease.Architecture(build.Architecture).ToNonDeb()
|
||||||
|
targetFmt := fmt.Sprintf("^(?P<target>%s|any)-%s(?P<gccVers>(_gcc[0-9]+.[0-9]+.[0-9]+)+)-%s$", build.TargetType.String(), arch, imageTag)
|
||||||
|
tagReg = regexp.MustCompile(targetFmt)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get the registry URL from repository.
|
||||||
|
registry, err := getRegistryFromRef(repo)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
repoOCI, err := repository.NewRepository(repo,
|
||||||
|
repository.WithPlainHTTP(build.RegistryPlainHTTP),
|
||||||
|
repository.WithClient(build.ClientForRegistry(registry)))
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &RepoImagesLister{repoOCI}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (repo *RepoImagesLister) LoadImages(printer *output.Printer) []Image {
|
||||||
|
tags, err := repo.Tags(context.Background())
|
||||||
|
if err != nil {
|
||||||
|
printer.Logger.Warn("skipping repo",
|
||||||
|
printer.Logger.Args("repo", repo.Reference, "err", err.Error()))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var res []Image
|
||||||
|
for _, t := range tags {
|
||||||
|
img := fmt.Sprintf("%s:%s", repo.Reference, t)
|
||||||
|
match := tagReg.FindStringSubmatch(t)
|
||||||
|
if len(match) == 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
target string
|
||||||
|
gccVers []string
|
||||||
|
)
|
||||||
|
for i, name := range tagReg.SubexpNames() {
|
||||||
|
if i > 0 && i <= len(match) {
|
||||||
|
switch name {
|
||||||
|
case "gccVers":
|
||||||
|
gccVers = strings.Split(match[i], "_gcc")
|
||||||
|
gccVers = gccVers[1:] // remove initial whitespace
|
||||||
|
case "target":
|
||||||
|
target = match[i]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Note: we store "any" target images as "any",
|
||||||
|
// instead of adding them to the target,
|
||||||
|
// because we always prefer specific target images,
|
||||||
|
// and we cannot guarantee here that any subsequent docker repos
|
||||||
|
// does not provide a target-specific image that offers same gcc version
|
||||||
|
for _, gccVer := range gccVers {
|
||||||
|
// If user set a fixed gcc version, only load images that provide it.
|
||||||
|
buildImage := Image{
|
||||||
|
GCCVersion: mustParseTolerant(gccVer),
|
||||||
|
Name: img,
|
||||||
|
Target: Type(target),
|
||||||
|
}
|
||||||
|
res = append(res, buildImage)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return res
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *Build) LoadImages() {
|
||||||
|
for _, imagesLister := range b.ImagesListers {
|
||||||
|
for _, image := range imagesLister.LoadImages(b.Printer) {
|
||||||
|
// User forced a gcc version? Only load images matching the requested gcc version.
|
||||||
|
if b.GCCVersion != "" && b.GCCVersion != image.GCCVersion.String() {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
// Skip if key already exists: we have a descending prio list of docker repos!
|
||||||
|
if _, ok := b.Images[image.toKey()]; !ok {
|
||||||
|
b.Images[image.toKey()] = image
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(b.Images) == 0 {
|
||||||
|
b.Printer.Logger.Fatal("Could not load any builder image. Leaving.")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// getRegistryFromRef extracts the registry from a ref string.
|
||||||
|
func getRegistryFromRef(ref string) (string, error) {
|
||||||
|
index := strings.Index(ref, "/")
|
||||||
|
if index <= 0 {
|
||||||
|
return "", fmt.Errorf("cannot extract registry name from ref %q", ref)
|
||||||
|
}
|
||||||
|
|
||||||
|
return ref[0:index], nil
|
||||||
|
}
|
|
@ -0,0 +1,311 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/falcosecurity/falcoctl/pkg/output"
|
||||||
|
"github.com/pterm/pterm"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
"os"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/blang/semver/v4"
|
||||||
|
"github.com/docker/docker/testutil/registry"
|
||||||
|
"gotest.tools/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
var imagesTests = []struct {
|
||||||
|
yamlData string
|
||||||
|
jsonData string
|
||||||
|
expected []Image
|
||||||
|
}{
|
||||||
|
// Test that multiple gcc versions are correctly mapped to multiple images
|
||||||
|
{
|
||||||
|
yamlData: `
|
||||||
|
images:
|
||||||
|
- name: foo/test:any-x86_64_gcc8.0.0_gcc6.0.0_gcc5.0.0_gcc4.9.0_gcc4.8.0-latest
|
||||||
|
target: any
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 8.0.0
|
||||||
|
- 6.0.0
|
||||||
|
- 5.0.0
|
||||||
|
- 4.9.0
|
||||||
|
- 4.8.0
|
||||||
|
`,
|
||||||
|
jsonData: `
|
||||||
|
{
|
||||||
|
"name": "foo/test",
|
||||||
|
"tags": [
|
||||||
|
"any-x86_64_gcc8.0.0_gcc6.0.0_gcc5.0.0_gcc4.9.0_gcc4.8.0-latest"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
`,
|
||||||
|
expected: []Image{
|
||||||
|
{
|
||||||
|
Target: "any",
|
||||||
|
GCCVersion: semver.MustParse("8.0.0"),
|
||||||
|
Name: "foo/test:any-x86_64_gcc8.0.0_gcc6.0.0_gcc5.0.0_gcc4.9.0_gcc4.8.0-latest",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Target: "any",
|
||||||
|
GCCVersion: semver.MustParse("6.0.0"),
|
||||||
|
Name: "foo/test:any-x86_64_gcc8.0.0_gcc6.0.0_gcc5.0.0_gcc4.9.0_gcc4.8.0-latest",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Target: "any",
|
||||||
|
GCCVersion: semver.MustParse("5.0.0"),
|
||||||
|
Name: "foo/test:any-x86_64_gcc8.0.0_gcc6.0.0_gcc5.0.0_gcc4.9.0_gcc4.8.0-latest",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Target: "any",
|
||||||
|
GCCVersion: semver.MustParse("4.9.0"),
|
||||||
|
Name: "foo/test:any-x86_64_gcc8.0.0_gcc6.0.0_gcc5.0.0_gcc4.9.0_gcc4.8.0-latest",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Target: "any",
|
||||||
|
GCCVersion: semver.MustParse("4.8.0"),
|
||||||
|
Name: "foo/test:any-x86_64_gcc8.0.0_gcc6.0.0_gcc5.0.0_gcc4.9.0_gcc4.8.0-latest",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// Test that arm64 is correctly skipped on amd64 images listing
|
||||||
|
{
|
||||||
|
yamlData: `
|
||||||
|
images:
|
||||||
|
- name: foo/test:any-x86_64_gcc8.0.0-latest
|
||||||
|
target: any
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 8.0.0
|
||||||
|
- name: foo/test:any-aarch64_gcc8.0.0-latest
|
||||||
|
target: any
|
||||||
|
arch: aarch64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 8.0.0
|
||||||
|
`,
|
||||||
|
jsonData: `
|
||||||
|
{
|
||||||
|
"name": "foo/test",
|
||||||
|
"tags": [
|
||||||
|
"any-x86_64_gcc8.0.0-latest",
|
||||||
|
"any-aarch64_gcc8.0.0-latest"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
`,
|
||||||
|
expected: []Image{
|
||||||
|
{
|
||||||
|
Target: "any",
|
||||||
|
GCCVersion: semver.MustParse("8.0.0"),
|
||||||
|
Name: "foo/test:any-x86_64_gcc8.0.0-latest",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// Test empty gcc versions image is skipped
|
||||||
|
{
|
||||||
|
yamlData: `
|
||||||
|
images:
|
||||||
|
- name: foo/test:any-x86_64_gcc8.0.0-latest
|
||||||
|
target: any
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 8.0.0
|
||||||
|
- name: bar/test:any-x86_64-latest
|
||||||
|
target: any
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
`,
|
||||||
|
jsonData: `
|
||||||
|
{
|
||||||
|
"name": "foo/test",
|
||||||
|
"tags": [
|
||||||
|
"any-x86_64_gcc8.0.0-latest",
|
||||||
|
"any-x86_64-latest"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
`,
|
||||||
|
expected: []Image{
|
||||||
|
{
|
||||||
|
Target: "any",
|
||||||
|
GCCVersion: semver.MustParse("8.0.0"),
|
||||||
|
Name: "foo/test:any-x86_64_gcc8.0.0-latest",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// Test wrong target image is skipped
|
||||||
|
{
|
||||||
|
yamlData: `
|
||||||
|
images:
|
||||||
|
- name: foo/test:centos-x86_64_gcc8.0.0-latest
|
||||||
|
target: centos
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 8.0.0
|
||||||
|
- name: foo/test:wrongtarget-x86_64_gcc6.0.0-latest
|
||||||
|
target: wrongtarget
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 6.0.0
|
||||||
|
`,
|
||||||
|
jsonData: `
|
||||||
|
{
|
||||||
|
"name": "foo/test",
|
||||||
|
"tags": [
|
||||||
|
"centos-x86_64_gcc8.0.0-latest",
|
||||||
|
"wrongtarget-x86_64_gcc8.0.0-latest"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
`,
|
||||||
|
expected: []Image{
|
||||||
|
{
|
||||||
|
Target: "centos",
|
||||||
|
GCCVersion: semver.MustParse("8.0.0"),
|
||||||
|
Name: "foo/test:centos-x86_64_gcc8.0.0-latest",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// Test empty name image is skipped
|
||||||
|
{
|
||||||
|
yamlData: `
|
||||||
|
images:
|
||||||
|
- name: foo/test:any-x86_64_gcc8.0.0-latest
|
||||||
|
target: any
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 8.0.0
|
||||||
|
- target: any
|
||||||
|
arch: x86_64
|
||||||
|
tag: latest
|
||||||
|
gcc_versions:
|
||||||
|
- 6.0.0
|
||||||
|
`,
|
||||||
|
jsonData: "",
|
||||||
|
expected: []Image{
|
||||||
|
{
|
||||||
|
Target: "any",
|
||||||
|
GCCVersion: semver.MustParse("8.0.0"),
|
||||||
|
Name: "foo/test:any-x86_64_gcc8.0.0-latest",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// Test empty list returned for yaml/json with no images
|
||||||
|
{
|
||||||
|
yamlData: `
|
||||||
|
images:
|
||||||
|
`,
|
||||||
|
jsonData: `
|
||||||
|
{
|
||||||
|
"name": "foo/test",
|
||||||
|
"tags": [
|
||||||
|
]
|
||||||
|
}
|
||||||
|
`,
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
// Test empty list returned for malformed yaml/json answer
|
||||||
|
{
|
||||||
|
yamlData: `
|
||||||
|
images:
|
||||||
|
* name: foo/test
|
||||||
|
target: any
|
||||||
|
arch: x86_64
|
||||||
|
gcc_versions:
|
||||||
|
* 8.0.0
|
||||||
|
`,
|
||||||
|
jsonData: "malformedresponse",
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFileImagesLister(t *testing.T) {
|
||||||
|
printer := output.NewPrinter(pterm.LogLevelInfo, pterm.LogFormatterColorful, os.Stdout)
|
||||||
|
|
||||||
|
// setup images file
|
||||||
|
f, err := os.CreateTemp(t.TempDir(), "imagetest")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.Remove(f.Name())
|
||||||
|
|
||||||
|
lister, err := NewFileImagesLister(f.Name(), &Build{
|
||||||
|
TargetType: Type("centos"),
|
||||||
|
Architecture: "amd64",
|
||||||
|
BuilderImage: "auto:latest",
|
||||||
|
})
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
for _, test := range imagesTests {
|
||||||
|
if test.yamlData == "" {
|
||||||
|
t.Log("Skipping unsuitable test for FileImagesLister")
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
err = f.Truncate(0)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
_, err = f.Seek(0, io.SeekStart)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
_, err = f.WriteString(test.yamlData)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
assert.DeepEqual(t, test.expected, lister.LoadImages(printer))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRepoImagesLister(t *testing.T) {
|
||||||
|
printer := output.NewPrinter(pterm.LogLevelInfo, pterm.LogFormatterColorful, os.Stdout)
|
||||||
|
|
||||||
|
mock, err := registry.NewMock(t)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
defer mock.Close()
|
||||||
|
|
||||||
|
lister, err := NewRepoImagesLister(mock.URL()+"/foo/test", &Build{
|
||||||
|
TargetType: Type("centos"),
|
||||||
|
Architecture: "amd64",
|
||||||
|
BuilderImage: "auto:latest",
|
||||||
|
RegistryPlainHTTP: true,
|
||||||
|
})
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
for _, test := range imagesTests {
|
||||||
|
if test.jsonData == "" {
|
||||||
|
t.Log("Skipping unsuitable test for RepoImagesLister")
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update expected names adding the mocked server URL as prefix
|
||||||
|
for idx, _ := range test.expected {
|
||||||
|
test.expected[idx].Name = mock.URL() + "/" + test.expected[idx].Name
|
||||||
|
}
|
||||||
|
|
||||||
|
mock.RegisterHandler("/v2/foo/test/tags/list", func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
w.Write([]byte(test.jsonData))
|
||||||
|
})
|
||||||
|
assert.DeepEqual(t, test.expected, lister.LoadImages(printer))
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,106 @@
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
"fmt"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
"path/filepath"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NOTE: since this is only used by local build,
|
||||||
|
// it is not exposed in `target` array,
|
||||||
|
// so no init() function to register it is present.
|
||||||
|
|
||||||
|
//go:embed templates/local.sh
|
||||||
|
var localTemplate string
|
||||||
|
|
||||||
|
type LocalBuilder struct {
|
||||||
|
GccPath string
|
||||||
|
UseDKMS bool
|
||||||
|
SrcDir string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) Name() string {
|
||||||
|
return "local"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) TemplateKernelUrlsScript() string {
|
||||||
|
panic("cannot be called on local builder")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) TemplateScript() string {
|
||||||
|
return localTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) URLs(_ kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) MinimumURLs() int {
|
||||||
|
// We don't need any url
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
type localTemplateData struct {
|
||||||
|
commonTemplateData
|
||||||
|
UseDKMS bool
|
||||||
|
DownloadSrc bool
|
||||||
|
DriverVersion string
|
||||||
|
KernelRelease string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) KernelTemplateData(_ kernelrelease.KernelRelease, _ []string) interface{} {
|
||||||
|
panic("cannot be called on local builder")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) TemplateData(c Config, kr kernelrelease.KernelRelease) interface{} {
|
||||||
|
return localTemplateData{
|
||||||
|
commonTemplateData: commonTemplateData{
|
||||||
|
DriverBuildDir: l.GetDriverBuildDir(),
|
||||||
|
ModuleDriverName: c.DriverName,
|
||||||
|
ModuleFullPath: l.GetModuleFullPath(c, kr),
|
||||||
|
BuildModule: len(c.ModuleFilePath) > 0,
|
||||||
|
BuildProbe: len(c.ProbeFilePath) > 0,
|
||||||
|
GCCVersion: l.GccPath,
|
||||||
|
CmakeCmd: fmt.Sprintf(cmakeCmdFmt,
|
||||||
|
c.DriverName,
|
||||||
|
c.DriverName,
|
||||||
|
c.DriverVersion,
|
||||||
|
c.DriverVersion,
|
||||||
|
c.DriverVersion,
|
||||||
|
c.DeviceName,
|
||||||
|
c.DeviceName,
|
||||||
|
c.DriverVersion),
|
||||||
|
},
|
||||||
|
UseDKMS: l.UseDKMS,
|
||||||
|
DownloadSrc: len(l.SrcDir) == 0, // if no srcdir is provided, download src!
|
||||||
|
DriverVersion: c.DriverVersion,
|
||||||
|
KernelRelease: c.KernelRelease,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) GetModuleFullPath(c Config, kr kernelrelease.KernelRelease) string {
|
||||||
|
if l.UseDKMS {
|
||||||
|
// When using dkms, we will use a GLOB to match the pattern; ModuleFullPath won't be used in the templated script anyway.
|
||||||
|
return fmt.Sprintf("/var/lib/dkms/%s/%s/%s/%s/module/%s.*", c.DriverName, c.DriverVersion, kr.String(), kr.Architecture.ToNonDeb(), c.DriverName)
|
||||||
|
}
|
||||||
|
if l.SrcDir != "" {
|
||||||
|
return filepath.Join(l.SrcDir, fmt.Sprintf("%s.ko", c.DriverName))
|
||||||
|
}
|
||||||
|
return c.ToDriverFullPath()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) GetProbeFullPath(c Config) string {
|
||||||
|
if l.SrcDir != "" {
|
||||||
|
return filepath.Join(l.SrcDir, "bpf", "probe.o")
|
||||||
|
}
|
||||||
|
return c.ToProbeFullPath()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (l *LocalBuilder) GetDriverBuildDir() string {
|
||||||
|
driverBuildDir := DriverDirectory
|
||||||
|
if l.SrcDir != "" {
|
||||||
|
driverBuildDir = l.SrcDir
|
||||||
|
}
|
||||||
|
return driverBuildDir
|
||||||
|
}
|
|
@ -0,0 +1,56 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/blang/semver/v4"
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TargetTypeMinikube identifies the Minikube target.
|
||||||
|
const TargetTypeMinikube Type = "minikube"
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeMinikube] = &minikube{
|
||||||
|
vanilla{},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type minikube struct {
|
||||||
|
vanilla
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *minikube) Name() string {
|
||||||
|
return TargetTypeMinikube.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *minikube) KernelTemplateData(kr kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return vanillaTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
KernelLocalVersion: kr.FullExtraversion,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *minikube) GCCVersion(kr kernelrelease.KernelRelease) semver.Version {
|
||||||
|
// The supported versions of minikube use kernels > 4.19.
|
||||||
|
switch kr.Major {
|
||||||
|
case 5:
|
||||||
|
return semver.Version{Major: 10}
|
||||||
|
case 4:
|
||||||
|
return semver.Version{Major: 8}
|
||||||
|
default:
|
||||||
|
return semver.Version{Major: 12}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,272 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
//go:embed templates/opensuse_kernel.sh
|
||||||
|
var opensuseKernelTemplate string
|
||||||
|
|
||||||
|
//go:embed templates/opensuse.sh
|
||||||
|
var opensuseTemplate string
|
||||||
|
|
||||||
|
// TargetTypeOpenSUSE identifies the OpenSUSE target.
|
||||||
|
const TargetTypeOpenSUSE Type = "opensuse"
|
||||||
|
|
||||||
|
// We need:
|
||||||
|
// kernel-default-devel-*-{arch}
|
||||||
|
// kernel-devel-*-noarch
|
||||||
|
const opensuseMinimumURLs = 2
|
||||||
|
|
||||||
|
// base URLs to begin searches
|
||||||
|
var baseURLs []string = []string{
|
||||||
|
// general releases, leap releases
|
||||||
|
"https://mirrors.edge.kernel.org/opensuse/distribution",
|
||||||
|
"http://download.opensuse.org/distribution",
|
||||||
|
"https://download.opensuse.org/repositories/Kernel:",
|
||||||
|
// some releases are stored at the top level specifically
|
||||||
|
"http://download.opensuse.org",
|
||||||
|
}
|
||||||
|
|
||||||
|
// all known releases - will need to expand as more are added
|
||||||
|
var releases = []string{
|
||||||
|
// openSUSE leap
|
||||||
|
"43.2",
|
||||||
|
"15.0",
|
||||||
|
"15.1",
|
||||||
|
"15.2",
|
||||||
|
"15.3",
|
||||||
|
"15.4",
|
||||||
|
"15.5",
|
||||||
|
"15.6",
|
||||||
|
// other releases
|
||||||
|
"HEAD",
|
||||||
|
"stable",
|
||||||
|
"tumbleweed",
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeOpenSUSE] = &opensuse{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// opensuse is a driverkit target.
|
||||||
|
type opensuse struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
type opensuseTemplateData struct {
|
||||||
|
KernelDownloadURLs []string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *opensuse) MinimumURLs() int {
|
||||||
|
return opensuseMinimumURLs
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *opensuse) Name() string {
|
||||||
|
return TargetTypeOpenSUSE.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *opensuse) TemplateKernelUrlsScript() string {
|
||||||
|
return opensuseKernelTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *opensuse) TemplateScript() string {
|
||||||
|
return opensuseTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *opensuse) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
|
||||||
|
// SUSE requires 2 urls: a kernel-default-devel*{arch}.rpm and a kernel-devel*noarch.rpm
|
||||||
|
kernelDefaultDevelPattern := fmt.Sprintf("kernel-default-devel-%s%s.rpm", kr.Fullversion, kr.FullExtraversion)
|
||||||
|
kernelDevelNoArchPattern := strings.ReplaceAll( // need to replace architecture string with "noarch"
|
||||||
|
fmt.Sprintf("kernel-devel-%s%s.rpm", kr.Fullversion, kr.FullExtraversion),
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
"noarch",
|
||||||
|
)
|
||||||
|
|
||||||
|
// get all possible URLs
|
||||||
|
possibleURLs := buildURLs(kr, kernelDefaultDevelPattern, kernelDevelNoArchPattern)
|
||||||
|
|
||||||
|
// trim the list to only resolving URLs
|
||||||
|
urls, err := GetResolvingURLs(possibleURLs)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// ensure there is at least one URL of each required package type
|
||||||
|
if validateURLs(urls, kernelDefaultDevelPattern, kernelDevelNoArchPattern) {
|
||||||
|
return urls, nil
|
||||||
|
} else {
|
||||||
|
return nil, fmt.Errorf(
|
||||||
|
"missing one of the required package types: [ kernel-default-devel, kernel-devel*noarch ]: %v",
|
||||||
|
urls,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// build all possible url combinations from base URLs and releases
|
||||||
|
func buildURLs(kr kernelrelease.KernelRelease, kernelDefaultDevelPattern string, kernelDevelNoArchPattern string) []string {
|
||||||
|
|
||||||
|
possibleURLs := []string{}
|
||||||
|
for _, release := range releases {
|
||||||
|
for _, baseURL := range baseURLs {
|
||||||
|
|
||||||
|
possibleURLs = append(
|
||||||
|
possibleURLs,
|
||||||
|
// leap urls
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/leap/%s/repo/oss/%s/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kernelDefaultDevelPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf( // noarch
|
||||||
|
"%s/leap/%s/repo/oss/noarch/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kernelDevelNoArchPattern,
|
||||||
|
),
|
||||||
|
// other urls
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/%s/repo/oss/%s/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kernelDefaultDevelPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf( // noarch
|
||||||
|
"%s/%s/repo/oss/noarch/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kernelDevelNoArchPattern,
|
||||||
|
),
|
||||||
|
// weird opensuse site urls
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/openSUSE-%s/Submit/standard/%s/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kernelDefaultDevelPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/openSUSE-%s/standard/%s/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kernelDefaultDevelPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/openSUSE-%s:/Submit/standard/%s/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kernelDefaultDevelPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/openSUSE-%s:/standard/%s/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kernelDefaultDevelPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/%s/Submit/standard/%s/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kernelDefaultDevelPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/%s/standard/%s/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kernelDefaultDevelPattern,
|
||||||
|
),
|
||||||
|
// weird opensuse site urls - kernel-devel*noarch edition
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/openSUSE-%s/Submit/standard/noarch/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kernelDevelNoArchPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/openSUSE-%s/standard/noarch/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kernelDevelNoArchPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/openSUSE-%s:/Submit/standard/noarch/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kernelDevelNoArchPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/openSUSE-%s:/standard/noarch/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kernelDevelNoArchPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/%s/Submit/standard/noarch/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kernelDevelNoArchPattern,
|
||||||
|
),
|
||||||
|
fmt.Sprintf(
|
||||||
|
"%s/%s/standard/noarch/%s",
|
||||||
|
baseURL,
|
||||||
|
release,
|
||||||
|
kernelDevelNoArchPattern,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return possibleURLs
|
||||||
|
}
|
||||||
|
|
||||||
|
// check to ensure there is at least one URL of each package type
|
||||||
|
func validateURLs(urls []string, kernelDefaultDevelPattern string, kernelDevelNoArchPattern string) bool {
|
||||||
|
|
||||||
|
// setup some flags
|
||||||
|
kernelDefaultDevelFlag := false
|
||||||
|
kernelDevelNoArchFlag := false
|
||||||
|
|
||||||
|
for _, url := range urls {
|
||||||
|
if strings.Contains(url, kernelDefaultDevelPattern) {
|
||||||
|
kernelDefaultDevelFlag = true
|
||||||
|
}
|
||||||
|
if strings.Contains(url, kernelDevelNoArchPattern) {
|
||||||
|
kernelDevelNoArchFlag = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return kernelDefaultDevelFlag && kernelDevelNoArchFlag
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *opensuse) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return opensuseTemplateData{
|
||||||
|
KernelDownloadURLs: urls,
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,132 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
//go:embed templates/oracle_kernel.sh
|
||||||
|
var oracleKernelTemplate string
|
||||||
|
|
||||||
|
//go:embed templates/oracle.sh
|
||||||
|
var oracleTemplate string
|
||||||
|
|
||||||
|
// TargetTypeoracle identifies the oracle target ("ol" is the ID from /etc/os-release that Oracle uses)
|
||||||
|
const TargetTypeoracle Type = "ol"
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeoracle] = &oracle{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// oracle is a driverkit target.
|
||||||
|
type oracle struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
type oracleTemplateData struct {
|
||||||
|
KernelDownloadURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *oracle) Name() string {
|
||||||
|
return TargetTypeoracle.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *oracle) TemplateKernelUrlsScript() string {
|
||||||
|
return oracleKernelTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *oracle) TemplateScript() string {
|
||||||
|
return oracleTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *oracle) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
|
||||||
|
// oracle FullExtraversion looks like "-2047.510.5.5.el7uek.x86_64"
|
||||||
|
// need to get the "el7uek" out of the middle
|
||||||
|
splitVersion := strings.Split(kr.FullExtraversion, ".")
|
||||||
|
oracleVersion := splitVersion[len(splitVersion)-2] // [ "-2047", "510", "5", "5", "el7uek","x86_64" ] want -2
|
||||||
|
|
||||||
|
// trim off the "el" and "uek" from oracleVersion
|
||||||
|
version := strings.Trim(strings.Trim(oracleVersion, "el"), "uek")
|
||||||
|
|
||||||
|
// sometimes Oracle 8 does "8_x" for version, only want the "8"
|
||||||
|
if strings.Contains(version, "_") {
|
||||||
|
version = strings.Split(version, "_")[0]
|
||||||
|
}
|
||||||
|
|
||||||
|
// list of possible UEK versions, which are used in the URL - ex: "UEKR3"
|
||||||
|
// may need to evolve over time if Oracle adds more
|
||||||
|
ueks := []string{"R3", "R4", "R5", "R6", "R7"}
|
||||||
|
|
||||||
|
// template the kernel info into all possible URL strings
|
||||||
|
urls := []string{
|
||||||
|
fmt.Sprintf( // latest (Oracle 7)
|
||||||
|
"http://yum.oracle.com/repo/OracleLinux/OL%s/latest/%s/getPackage/kernel-devel-%s%s.rpm",
|
||||||
|
version,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
),
|
||||||
|
fmt.Sprintf( // latest + baseos (Oracle 8 + 9)
|
||||||
|
"http://yum.oracle.com/repo/OracleLinux/OL%s/baseos/latest/%s/getPackage/kernel-devel-%s%s.rpm",
|
||||||
|
version,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
),
|
||||||
|
fmt.Sprintf( // appstream (Oracle 8 + 9)
|
||||||
|
"http://yum.oracle.com/repo/OracleLinux/OL%s/appstream/%s/getPackage/kernel-devel-%s%s.rpm",
|
||||||
|
version,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
),
|
||||||
|
fmt.Sprintf( // MODRHCK (Oracle 7)
|
||||||
|
"http://yum.oracle.com/repo/OracleLinux/OL%s/MODRHCK/%s/getPackage/kernel-devel-%s%s.rpm",
|
||||||
|
version,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
),
|
||||||
|
}
|
||||||
|
|
||||||
|
// add in all the UEK versions
|
||||||
|
for _, uekVers := range ueks {
|
||||||
|
urls = append(
|
||||||
|
urls,
|
||||||
|
fmt.Sprintf( // UEK versions URL
|
||||||
|
"http://yum.oracle.com/repo/OracleLinux/OL%s/UEK%s/%s/getPackage/kernel-uek-devel-%s%s.rpm",
|
||||||
|
version,
|
||||||
|
uekVers,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// return out all possible urls
|
||||||
|
return urls, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *oracle) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return oracleTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,105 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TargetTypePhoton identifies the Photon target.
|
||||||
|
const TargetTypePhoton Type = "photon"
|
||||||
|
|
||||||
|
//go:embed templates/photonos_kernel.sh
|
||||||
|
var photonKernelTemplate string
|
||||||
|
|
||||||
|
//go:embed templates/photonos.sh
|
||||||
|
var photonTemplate string
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypePhoton] = &photon{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// photon is a driverkit target.
|
||||||
|
type photon struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
type photonTemplateData struct {
|
||||||
|
KernelDownloadURL string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *photon) Name() string {
|
||||||
|
return TargetTypePhoton.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *photon) TemplateKernelUrlsScript() string {
|
||||||
|
return photonKernelTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *photon) TemplateScript() string {
|
||||||
|
return photonTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *photon) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
return fetchPhotonKernelURLS(kr), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *photon) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return photonTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func fetchPhotonKernelURLS(kr kernelrelease.KernelRelease) []string {
|
||||||
|
photonReleases := []string{
|
||||||
|
"3.0",
|
||||||
|
"4.0",
|
||||||
|
"5.0",
|
||||||
|
}
|
||||||
|
|
||||||
|
var urls []string
|
||||||
|
for _, r := range photonReleases {
|
||||||
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
"https://packages.vmware.com/photon/%s/photon_%s_%s/%s/linux-devel-%s%s.x86_64.rpm",
|
||||||
|
r,
|
||||||
|
r,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
"https://packages.vmware.com/photon/%s/photon_release_%s_%s/%s/linux-devel-%s%s.x86_64.rpm",
|
||||||
|
r,
|
||||||
|
r,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
"https://packages.vmware.com/photon/%s/photon_updates_%s_%s/%s/linux-devel-%s%s.x86_64.rpm",
|
||||||
|
r,
|
||||||
|
r,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
}
|
||||||
|
return urls
|
||||||
|
}
|
|
@ -1,12 +1,28 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
_ "embed"
|
_ "embed"
|
||||||
|
|
||||||
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
"text/template"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
|
//go:embed templates/redhat_kernel.sh
|
||||||
|
var redhatKernelTemplate string
|
||||||
|
|
||||||
//go:embed templates/redhat.sh
|
//go:embed templates/redhat.sh
|
||||||
var redhatTemplate string
|
var redhatTemplate string
|
||||||
|
|
||||||
|
@ -18,40 +34,36 @@ type redhat struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
BuilderByTarget[TargetTypeRedhat] = &redhat{}
|
byTarget[TargetTypeRedhat] = &redhat{}
|
||||||
}
|
}
|
||||||
|
|
||||||
type redhatTemplateData struct {
|
type redhatTemplateData struct {
|
||||||
DriverBuildDir string
|
KernelPackage string
|
||||||
KernelPackage string
|
|
||||||
ModuleDownloadURL string
|
|
||||||
ModuleDriverName string
|
|
||||||
ModuleFullPath string
|
|
||||||
BuildModule bool
|
|
||||||
BuildProbe bool
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (v redhat) Script(cfg Config, kr kernelrelease.KernelRelease) (string, error) {
|
func (v *redhat) Name() string {
|
||||||
t := template.New(string(TargetTypeRedhat))
|
return TargetTypeRedhat.String()
|
||||||
parsed, err := t.Parse(redhatTemplate)
|
}
|
||||||
if err != nil {
|
|
||||||
return "", err
|
func (v *redhat) TemplateKernelUrlsScript() string {
|
||||||
}
|
return redhatKernelTemplate
|
||||||
|
}
|
||||||
td := redhatTemplateData{
|
|
||||||
DriverBuildDir: DriverDirectory,
|
func (v *redhat) TemplateScript() string {
|
||||||
KernelPackage: kr.Fullversion + kr.FullExtraversion,
|
return redhatTemplate
|
||||||
ModuleDownloadURL: moduleDownloadURL(cfg),
|
}
|
||||||
ModuleDriverName: cfg.DriverName,
|
|
||||||
ModuleFullPath: ModuleFullPath,
|
func (v *redhat) URLs(_ kernelrelease.KernelRelease) ([]string, error) {
|
||||||
BuildModule: len(cfg.Build.ModuleFilePath) > 0,
|
return nil, nil
|
||||||
BuildProbe: len(cfg.Build.ProbeFilePath) > 0,
|
}
|
||||||
}
|
|
||||||
|
func (v *redhat) MinimumURLs() int {
|
||||||
buf := bytes.NewBuffer(nil)
|
// We don't need any url
|
||||||
err = parsed.Execute(buf, td)
|
return 0
|
||||||
if err != nil {
|
}
|
||||||
return "", err
|
|
||||||
}
|
func (v *redhat) KernelTemplateData(kr kernelrelease.KernelRelease, _ []string) interface{} {
|
||||||
return buf.String(), nil
|
return redhatTemplateData{
|
||||||
|
KernelPackage: kr.Fullversion + kr.FullExtraversion,
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,14 +1,29 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
|
||||||
_ "embed"
|
_ "embed"
|
||||||
"fmt"
|
"fmt"
|
||||||
"text/template"
|
|
||||||
|
|
||||||
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
//go:embed templates/rocky_kernel.sh
|
||||||
|
var rockyKernelTemplate string
|
||||||
|
|
||||||
//go:embed templates/rocky.sh
|
//go:embed templates/rocky.sh
|
||||||
var rockyTemplate string
|
var rockyTemplate string
|
||||||
|
|
||||||
|
@ -16,87 +31,93 @@ var rockyTemplate string
|
||||||
const TargetTypeRocky Type = "rocky"
|
const TargetTypeRocky Type = "rocky"
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
BuilderByTarget[TargetTypeRocky] = &rocky{}
|
byTarget[TargetTypeRocky] = &rocky{}
|
||||||
|
}
|
||||||
|
|
||||||
|
type rockyTemplateData struct {
|
||||||
|
KernelDownloadURL string
|
||||||
}
|
}
|
||||||
|
|
||||||
// rocky is a driverkit target.
|
// rocky is a driverkit target.
|
||||||
type rocky struct {
|
type rocky struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Script compiles the script to build the kernel module and/or the eBPF probe.
|
func (c *rocky) Name() string {
|
||||||
func (c rocky) Script(cfg Config, kr kernelrelease.KernelRelease) (string, error) {
|
return TargetTypeRocky.String()
|
||||||
t := template.New(string(TargetTypeRocky))
|
}
|
||||||
parsed, err := t.Parse(rockyTemplate)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
var urls []string
|
func (c *rocky) TemplateKernelUrlsScript() string {
|
||||||
if cfg.KernelUrls == nil {
|
return rockyKernelTemplate
|
||||||
// Check (and filter) existing kernels before continuing
|
}
|
||||||
urls, err = getResolvingURLs(fetchRockyKernelURLS(kr))
|
|
||||||
} else {
|
|
||||||
urls, err = getResolvingURLs(cfg.KernelUrls)
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
|
|
||||||
td := rockyTemplateData{
|
func (c *rocky) TemplateScript() string {
|
||||||
DriverBuildDir: DriverDirectory,
|
return rockyTemplate
|
||||||
ModuleDownloadURL: moduleDownloadURL(cfg),
|
}
|
||||||
|
|
||||||
|
func (c *rocky) URLs(kr kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
return fetchRockyKernelURLS(kr), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *rocky) KernelTemplateData(_ kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return rockyTemplateData{
|
||||||
KernelDownloadURL: urls[0],
|
KernelDownloadURL: urls[0],
|
||||||
GCCVersion: rockyGccVersionFromKernelRelease(kr),
|
|
||||||
ModuleDriverName: cfg.DriverName,
|
|
||||||
ModuleFullPath: ModuleFullPath,
|
|
||||||
BuildModule: len(cfg.Build.ModuleFilePath) > 0,
|
|
||||||
BuildProbe: len(cfg.Build.ProbeFilePath) > 0,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
buf := bytes.NewBuffer(nil)
|
|
||||||
err = parsed.Execute(buf, td)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
return buf.String(), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func fetchRockyKernelURLS(kr kernelrelease.KernelRelease) []string {
|
func fetchRockyKernelURLS(kr kernelrelease.KernelRelease) []string {
|
||||||
rockyReleases := []string{
|
rockyReleases := []string{
|
||||||
"8",
|
"8",
|
||||||
|
"8.7",
|
||||||
|
"9",
|
||||||
|
"9.1",
|
||||||
|
}
|
||||||
|
|
||||||
|
rockyVaultReleases := []string{
|
||||||
|
"8.3",
|
||||||
|
"8.4",
|
||||||
"8.5",
|
"8.5",
|
||||||
|
"8.6",
|
||||||
|
"9.1",
|
||||||
}
|
}
|
||||||
|
|
||||||
urls := []string{}
|
urls := []string{}
|
||||||
for _, r := range rockyReleases {
|
for _, r := range rockyReleases {
|
||||||
urls = append(urls, fmt.Sprintf(
|
if r >= "9" {
|
||||||
"https://download.rockylinux.org/pub/rocky/%s/BaseOS/%s/os/Packages/k/kernel-devel-%s%s.rpm",
|
urls = append(urls, fmt.Sprintf(
|
||||||
r,
|
"https://download.rockylinux.org/pub/rocky/%s/AppStream/%s/os/Packages/k/kernel-devel-%s%s.rpm",
|
||||||
kr.Architecture.ToNonDeb(),
|
r,
|
||||||
kr.Fullversion,
|
kr.Architecture.ToNonDeb(),
|
||||||
kr.FullExtraversion,
|
kr.Fullversion,
|
||||||
))
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
} else {
|
||||||
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
"https://download.rockylinux.org/pub/rocky/%s/BaseOS/%s/os/Packages/k/kernel-devel-%s%s.rpm",
|
||||||
|
r,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, r := range rockyVaultReleases {
|
||||||
|
if r >= "9" {
|
||||||
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
"https://download.rockylinux.org/vault/rocky/%s/AppStream/%s/os/Packages/k/kernel-devel-%s%s.rpm",
|
||||||
|
r,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
} else {
|
||||||
|
urls = append(urls, fmt.Sprintf(
|
||||||
|
"https://download.rockylinux.org/vault/rocky/%s/BaseOS/%s/os/Packages/k/kernel-devel-%s%s.rpm",
|
||||||
|
r,
|
||||||
|
kr.Architecture.ToNonDeb(),
|
||||||
|
kr.Fullversion,
|
||||||
|
kr.FullExtraversion,
|
||||||
|
))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
return urls
|
return urls
|
||||||
}
|
}
|
||||||
|
|
||||||
type rockyTemplateData struct {
|
|
||||||
DriverBuildDir string
|
|
||||||
ModuleDownloadURL string
|
|
||||||
KernelDownloadURL string
|
|
||||||
GCCVersion string
|
|
||||||
ModuleDriverName string
|
|
||||||
ModuleFullPath string
|
|
||||||
BuildModule bool
|
|
||||||
BuildProbe bool
|
|
||||||
}
|
|
||||||
|
|
||||||
func rockyGccVersionFromKernelRelease(kr kernelrelease.KernelRelease) string {
|
|
||||||
switch kr.Version {
|
|
||||||
case 3:
|
|
||||||
return "5"
|
|
||||||
case 2:
|
|
||||||
return "4.8"
|
|
||||||
}
|
|
||||||
return "8"
|
|
||||||
}
|
|
||||||
|
|
|
@ -0,0 +1,75 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
_ "embed"
|
||||||
|
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
//go:embed templates/sles_kernel.sh
|
||||||
|
var slesKernelTemplate string
|
||||||
|
|
||||||
|
//go:embed templates/sles.sh
|
||||||
|
var slesTemplate string
|
||||||
|
|
||||||
|
// TargetTypeSLES identifies the sles target.
|
||||||
|
const TargetTypeSLES Type = "sles"
|
||||||
|
|
||||||
|
// sles is a driverkit target.
|
||||||
|
type sles struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeSLES] = &sles{}
|
||||||
|
}
|
||||||
|
|
||||||
|
type slesTemplateData struct {
|
||||||
|
KernelPackage string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (v *sles) Name() string {
|
||||||
|
return TargetTypeSLES.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (v *sles) TemplateKernelUrlsScript() string {
|
||||||
|
return slesKernelTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (v *sles) TemplateScript() string {
|
||||||
|
return slesTemplate
|
||||||
|
}
|
||||||
|
|
||||||
|
func (v *sles) URLs(_ kernelrelease.KernelRelease) ([]string, error) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (v *sles) MinimumURLs() int {
|
||||||
|
// We don't need any url
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (v *sles) KernelTemplateData(kr kernelrelease.KernelRelease, _ []string) interface{} {
|
||||||
|
return slesTemplateData{
|
||||||
|
KernelPackage: kr.Fullversion + kr.FullExtraversion,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// sles requires docker to run with `--net=host` for builder images to work
|
||||||
|
// for more info, see the suse container connect README: https://github.com/SUSE/container-suseconnect
|
||||||
|
func (v *sles) BuilderImageNetMode() string {
|
||||||
|
return "host"
|
||||||
|
}
|
|
@ -0,0 +1,43 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package builder
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/falcosecurity/driverkit/pkg/kernelrelease"
|
||||||
|
)
|
||||||
|
|
||||||
|
// TargetTypeTalos identifies the Talos target.
|
||||||
|
const TargetTypeTalos Type = "talos"
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
byTarget[TargetTypeTalos] = &talos{
|
||||||
|
vanilla{},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type talos struct {
|
||||||
|
vanilla
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *talos) Name() string {
|
||||||
|
return TargetTypeTalos.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *talos) KernelTemplateData(kr kernelrelease.KernelRelease, urls []string) interface{} {
|
||||||
|
return vanillaTemplateData{
|
||||||
|
KernelDownloadURL: urls[0],
|
||||||
|
KernelLocalVersion: kr.FullExtraversion,
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,7 +1,21 @@
|
||||||
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
/*
|
||||||
|
Copyright (C) 2023 The Falco Authors.
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
package builder
|
package builder
|
||||||
|
|
||||||
// BuilderByTarget maps targets to their builder.
|
// byTarget maps targets to their builder.
|
||||||
var BuilderByTarget = Targets{}
|
var byTarget = map[Type]Builder{}
|
||||||
|
|
||||||
// Type is a type representing targets.
|
// Type is a type representing targets.
|
||||||
type Type string
|
type Type string
|
||||||
|
@ -9,15 +23,3 @@ type Type string
|
||||||
func (t Type) String() string {
|
func (t Type) String() string {
|
||||||
return string(t)
|
return string(t)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Targets is a type representing the list of the supported targets.
|
|
||||||
type Targets map[Type]Builder
|
|
||||||
|
|
||||||
// Targets returns the list of all the supported targets.
|
|
||||||
func (t Targets) Targets() []string {
|
|
||||||
res := []string{}
|
|
||||||
for k := range t {
|
|
||||||
res = append(res, k.String())
|
|
||||||
}
|
|
||||||
return res
|
|
||||||
}
|
|
||||||
|
|
|
@ -0,0 +1,41 @@
|
||||||
|
#!/bin/bash
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Copyright (C) 2023 The Falco Authors.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
#
|
||||||
|
# Simple script that desperately tries to load the kernel instrumentation by
|
||||||
|
# looking for it in a bunch of ways. Convenient when running Falco inside
|
||||||
|
# a container or in other weird environments.
|
||||||
|
#
|
||||||
|
set -xeuo pipefail
|
||||||
|
|
||||||
|
cd {{ .DriverBuildDir }}
|
||||||
|
mkdir -p build && cd build
|
||||||
|
{{ .CmakeCmd }}
|
||||||
|
|
||||||
|
{{ if .BuildModule }}
|
||||||
|
# Build the module
|
||||||
|
make CC=/usr/bin/gcc-{{ .GCCVersion }} driver
|
||||||
|
strip -g {{ .ModuleFullPath }}
|
||||||
|
# Print results
|
||||||
|
modinfo {{ .ModuleFullPath }}
|
||||||
|
{{ end }}
|
||||||
|
|
||||||
|
{{ if .BuildProbe }}
|
||||||
|
# Build the eBPF probe
|
||||||
|
make bpf
|
||||||
|
ls -l driver/bpf/probe.o
|
||||||
|
{{ end }}
|
|
@ -0,0 +1,35 @@
|
||||||
|
#!/bin/bash
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Copyright (C) 2023 The Falco Authors.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
#
|
||||||
|
# Simple script that desperately tries to load the kernel instrumentation by
|
||||||
|
# looking for it in a bunch of ways. Convenient when running Falco inside
|
||||||
|
# a container or in other weird environments.
|
||||||
|
#
|
||||||
|
set -xeuo pipefail
|
||||||
|
|
||||||
|
# Fetch the kernel
|
||||||
|
mkdir /tmp/kernel-download
|
||||||
|
cd /tmp/kernel-download
|
||||||
|
curl --silent -o kernel-devel.rpm -SL {{ .KernelDownloadURL }}
|
||||||
|
rpm2cpio kernel-devel.rpm | cpio --extract --make-directories
|
||||||
|
rm -Rf /tmp/kernel
|
||||||
|
mkdir -p /tmp/kernel
|
||||||
|
mv usr/src/kernels/*/* /tmp/kernel
|
||||||
|
|
||||||
|
# exit value
|
||||||
|
export KERNELDIR=/tmp/kernel
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue