-
Notifications
You must be signed in to change notification settings - Fork 912
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(userspace/engine): actually make m_filter_all_event_types useful by properly using it as fallback when no filter event types is provided #1875
Conversation
…by properly using it as fallback when no filter event types is provided. Signed-off-by: Federico Di Pierro <[email protected]>
Closing and reopening to trigger the CI |
@leogr: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/reopen |
@leogr: Reopened this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/milestone 0.31.1 |
@leogr: The provided milestone is not valid for this repository. Milestones in this repository: [ Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Signed-off-by: Federico Di Pierro <[email protected]>
/milestone 0.31.0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: FedeDP, leogr The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
LGTM label has been added. Git tree hash: f5626f16540d311539964ef38bc9e4b2e7514046
|
What type of PR is this?
/kind bug
Any specific area of the project related to this PR?
/area build
/area engine
What this PR does / why we need it:
Experimenting together with @jasondellaluce and @leogr a possible solution for falcosecurity/plugins#57
The issue was that
m_filter_all_event_types
was actually unused: forsyscalls
event source, we always have am_filter_by_event_type
value for the filter, event ifevt.type
is missing in the condition: in fact when it is missing, a default set of "all events" is used.For k8s audit logs the bug is not appearing because its filter check provides a default
evttypes()
impl that basically means "force-use any event type", even when negated.Plugins filter checks instead is returning
PPME_PLUGINEVENT_E
as only possible event associated; but, when rule condition gets negated, there is no other set of event type possible and thus the filter check gets added tom_filter_all_event_types
.Unfortunately, the old check in
ruleset_filters::run
:prevented it to actually run the filterchecks stored in
m_filter_all_event_types
, de facto making it useless.Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Edit by @leogr: we also bumped the json plugin version to include a fix for falcosecurity/plugins#56
Does this PR introduce a user-facing change?: