8000 wip: new(falcoctl): add automatic signature verification for drivers by LucaGuerra · Pull Request #733 · falcosecurity/falcoctl · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

wip: new(falcoctl): add automatic signature verification for drivers #733

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

LucaGuerra
Copy link
Contributor

What type of PR is this?

Uncomment one (or more) /kind <> lines:

/kind feature

Any specific area of the project related to this PR?

Uncomment one (or more) /area <> lines:

/area cli

What this PR does / why we need it:

This adds two new command line options to falcoctl driver

  • --pubkey allows you to specify a public key for signature verification. By default, it is the Falco public key used to sign packages: https://falco.org/repo/falcosecurity-packages.asc
  • --no-verify skips signature verification. By default signature verification is enforced.

If the signature cannot be verified and driver build is allowed, the driver will be built locally.

This PR is still WIP because signatures are not yet present in the Falco repo. I am currently working to add them.

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

… verification

Signed-off-by: Luca Guerra <luca@guerra.sh>
@poiana
Copy link
Contributor
poiana commented Feb 14, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: LucaGuerra
Once this PR has been reviewed and has the lgtm label, please assign alacuku for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana poiana requested a review from zuc February 14, 2025 11:43
@poiana poiana added the size/XL label Feb 14, 2025
@@ -0,0 +1,82 @@
-----BEGIN PGP PRIVATE KEY BLOCK-----
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note for the reviewer: this key is technically unused, however it is useful to have it if in the future we want to add some other test that are signed by the same entity as the other tests.

Obviously, like the filename says, this is a test key and its sole purpose is to run these tests.

Comment on lines +249 to +250
// {"valid remote pubkey", "testdata/hello.txt", "https://raw.githubusercontent.com/LucaGuerra/falcoctl/8875a534256686a936213b8b8dc5bbf74b5febfc/internal/signature/testdata/key.pub", true},
// {"invalid remote pubkey", "testdata/hello.txt", "https://raw.githubusercontent.com/LucaGuerra/falcoctl/8875a534256686a936213b8b8dc5bbf74b5febfc/internal/signature/testdata/does_not_exist.pub", false},
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note for the reviewer: These are disabled until the PR is merged, then, we can update the URL with the right repo and commit hash

…ut fails

Signed-off-by: Luca Guerra <luca@guerra.sh>
Signed-off-by: Luca Guerra <luca@guerra.sh>
@poiana
Copy link
Contributor
poiana commented May 25, 2025

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

@poiana
Copy link
Contributor
poiana commented Jun 24, 2025

Stale issues rot after 30d of inactivity.

Mark the issue as fresh with /remove-lifecycle rotten.

Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle rotten

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Todo
Development

Successfully merging this pull request may close these issues.

2 participants
0