Skip to content

Latest commit

 

History

History
252 lines (167 loc) · 20.3 KB

RELEASE.md

File metadata and controls

252 lines (167 loc) · 20.3 KB

Falco Release Process

Overview

This document provides the process to create a new Falco release. In addition, it provides information about the versioning of the Falco components. At a high level each Falco release consists of the following main components:

  • Falco binary (userspace), includes modern_bpf driver object code (kernel space) starting with Falco 0.34.x releases
  • Falco kernel driver object files, separate artifacts for kmod and bpf drivers, not applicable for modern_bpf driver (kernel space)
    • Option 1: Kernel module (.ko files)
    • Option 2: eBPF (.o files)
  • Falco config and rules .yaml files (userspace)
  • Falco plugins (userspace - optional)

Note: Starting with Falco 0.34.x releases, the Falco userspace binary includes the modern_bpf driver object code during the linking process. This integration is made possible by the CO-RE (Compile Once - Run Everywhere) feature of the modern BPF driver. CO-RE allows the driver to function on kernels that have backported BTF (BPF Type Format) support or have a kernel version >= 5.8. For the older kmod and bpf drivers, separate artifacts are released for the kernel space. This is because these drivers need to be explicitly compiled for the specific kernel release, using the exact kernel headers. This approach ensures that Falco can support a wide range of environments, including multiple kernel versions, distributions, and architectures. (see libs driver - kernel version support matrix).

The Falco Project manages the release of both the Falco userspace binary and pre-compiled Falco kernel drivers for the most popular kernel versions and distros. The build and publish process is managed by the test-infra repo.

The Falco userspace executable includes bundled dependencies, so that it can be run from anywhere.

Falco publishes all sources, enabling users to audit the project's integrity and build kernel drivers for custom or unsupported kernels/distributions, specifically for non-modern BPF drivers (see driverkit for more information).

Finally, the release process follows a transparent process described in more detail in the following sections and the official Falco guide and documentation provide rich information around building, installing and using Falco.

Falco Binaries, Rules and Sources Artifacts - Quick Links

The Falco project publishes all sources and the Falco userspace binaries as GitHub releases.

Alternatively Falco binaries or plugins can be downloaded from the Falco Artifacts repo.

Falco Drivers Artifacts Repo - Quick Links

Note: This section specifically applies to non-modern BPF drivers.

The Falco Project publishes all drivers for each release for popular kernel versions / distros and x86_64 and aarch64 architectures to the Falco project's managed Artifacts repo. The Artifacts repo follows standard directory level conventions. The respective driver object file is prefixed by distro and named / versioned by kernel release - $(uname -r). Pre-compiled drivers are released with a best effort notice. This is because gcc (kmod) and clang (bpf) compilers sometimes fail to build the artifacts for a specific kernel version. More details around driver versioning and driver compatibility are provided in the Falco Components Versioning section. Short preview: If you use the standard Falco setup leveraging driver-loader, driver-loader script will fetch the kernel space artifact (object file) corresponding to the default DRIVER_VERSION Falco was shipped with.

  • Falco Artifacts Repo Drivers Root
    • Option 1: Kernel module (.ko files) - all under same driver version directory
    • Option 2: eBPF (.o files) - all under same driver version directory

Timeline

Falco follows a release schedule of three times per year, with releases expected at the end of January, May, and September. Hotfix releases are issued as needed.

Changes and new features are organized into milestones. The milestone corresponding to the next version represents the content that will be included in the upcoming release.

Procedures

The release process is mostly automated, requiring only a few manual steps to initiate and complete.

Moreover, we assign owners for each release (typically pairing a new person with an experienced one). Assignees and due dates for releases are proposed during the weekly community call.

At a high level each Falco release needs to follow a pre-determined sequencing of releases and build order:

  • [1 - 3] libs (+ driver) and plugins components releases
  • [4] Falco driver pre-compiled object files push to Falco's Artifacts repo
  • [5] Falco userspace binary release

Assignees are responsible for creating a Falco GitHub issue to track the release tasks and monitor the progress of the release. This issue serves as a central point for communication and provides updates on the release dates. You can refer to the Falco v0.35 release or Libs Release (0.11.0+5.0.1+driver) issues as examples/templates for creating the release issue.

Finally, on the proposed due date, the assignees for the upcoming release proceed with the processes described below.

Pre-Release Checklist

Before proceeding with the release, make sure to complete the following preparatory steps, which can be easily done using the GitHub UI:

1. Release notes

  • Find the previous release date (YYYY-MM-DD) by looking at the Falco releases
  • Check the release note block of every PR matching the is:pr is:merged closed:>YYYY-MM-DD filter
    • Ensure the release note block follows the commit convention, otherwise fix its content
    • If the PR has no milestone, assign it to the milestone currently undergoing release
  • Check issues without a milestone (using is:pr is:merged no:milestone closed:>YYYY-MM-DD filter ) and add them to the milestone currently undergoing release
  • Double-check that there are no more merged PRs without the target milestone assigned with the is:pr is:merged no:milestone closed:>YYYY-MM-DD filter, if any, update those missing

2. Milestones

3. Release branch

Assuming we are releasing a non-patch version (like: Falco 0.34.0), a new release branch needs to be created.
Its naming will be release/M.m.x; for example: release/0.34.x.
The same branch will then be used for any eventual cherry pick for patch releases.

For patch releases, instead, the release/M.m.x branch should already be in place; no more steps are needed.
Double check that any PR that should be part of the tag has been cherry-picked from master!

4. Release PR

The release PR is meant to be made against the respective release/M.m.x branch, then cherry-picked on master.

  • Double-check if any hard-coded version number is present in the code, it should be not present anywhere:
    • If any, manually correct it then open an issue to automate version number bumping later
    • Versions table in the README.md updates itself automatically
  • Generate the change log using rn2md:
    • Execute rn2md -o falcosecurity -m <version> -r falco
    • In case rn2md emits error try to generate an GitHub OAuth access token and provide it with the -t flag
  • Add the latest changes on top the previous CHANGELOG.md
  • Submit a PR with the above modifications
  • Await PR approval
  • Close the completed milestone as soon as the PR is merged into the release branch
  • Cherry pick the PR on master too

Publishing Pre-Releases (RCs and tagged development versions)

Core maintainers and/or the release manager can decide to publish pre-releases at any time before the final release is live for development and testing purposes.

The prerelease tag must be formatted as M.m.p-rwhere r is the prerelease version information (e.g. 0.35.0-rc1.)

To do so:

  • Draft a new release
  • Use M.m.p-r both as tag version and release title.
  • Check the "Set as a pre-release" checkbox and make sure "Set as the latest release" is unchecked
  • It is recommended to add a brief description so that other contributors will understand the reason why the prerelease is published
  • Publish the prerelease!
  • The release pipeline will start automatically. Packages will be uploaded to the -dev bucket and container images will be tagged with the specified tag.

In order to check the status of the release pipeline click on the GitHub Actions tab in the Falco repository and filter by release.

Release

Assume M.m.p is the new version.

1. Create the release with GitHub

  • Draft a new release

  • Use M.m.p both as tag version and release title

  • Use the following template to fill the release description:

    <!-- Substitute M.m.p with the current release version -->
    
    | Packages | Download                                                                                                                                               |
    | -------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ |
    | rpm-x86_64      | [![rpm](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/rpm/falco-M.m.p-x86_64.rpm)        |
    | deb-x86_64      | [![deb](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/deb/stable/falco-M.m.p-x86_64.deb) |
    | tgz-x86_64      | [![tgz](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/bin/x86_64/falco-M.m.p-x86_64.tar.gz) |
    | rpm-aarch64      | [![rpm](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/rpm/falco-M.m.p-aarch64.rpm)        |
    | deb-aarch64      | [![deb](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/deb/stable/falco-M.m.p-aarch64.deb) |
    | tgz-aarch64      | [![tgz](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/bin/aarch64/falco-M.m.p-aarch64.tar.gz) |
    
    | Images                                                                      |
    | --------------------------------------------------------------------------- |
    | `docker pull docker.io/falcosecurity/falco:M.m.p`                           |
    | `docker pull public.ecr.aws/falcosecurity/falco:M.m.p`                      |
    | `docker pull docker.io/falcosecurity/falco-driver-loader:M.m.p`             |
    | `docker pull docker.io/falcosecurity/falco-no-driver:M.m.p`                 |
    
    <changelog>
    
    <!-- Substitute <changelog> with the one generated by [rn2md](https://github.com/leodido/rn2md) -->
    
    ### Statistics
    
    | Merged PRs      | Number |
    | --------------- | ------ |
    | Not user-facing | x      |
    | Release note    | x      |
    | Total           | x      |
    
    <!-- Calculate stats and fill the above table -->
    
    #### Release Manager <github handle>
    
    <!-- Substitute GitHub handle with the release manager's one -->
    
  • Finally, publish the release!

  • The release pipeline will start automatically upon publication and all packages and container images will be uploaded to the stable repositories.

In order to check the status of the release pipeline click on the GitHub Actions tab in the Falco repository and filter by release.

2. Update the meeting notes

For each release we archive the meeting notes in git for historical purposes.

Post-Release tasks

Announce the new release to the world!

Falco Components Versioning

This section provides more details around the versioning of the components that make up Falco's core. It can also be a useful guide for the uninitiated to be more informed about Falco's source. Because libs makes up the greater portion of the source code of the Falco binary and is the home of each of the kernel drivers and engines, the libs release doc is an excellent additional resource. In addition, the plugins release doc provides similar details around Falco's plugins. SHA256 checksums are provided throughout Falco's source code to empower the end user to perform integrity checks. All Falco releases also contain the sources as part of the packages.

Falco repo (this repo)

  • Falco version is a git tag (x.y.z), see Procedures section. Note that the Falco version is a sem-ver-like schema, but not fully compatible with sem-ver.
  • FALCO_ENGINE_VERSION is not sem-ver and must be bumped either when a backward incompatible change has been introduced to the rules files syntax and loading logic, and/or when FALCO_ENGINE_CHECKSUM has changed. The checksum is computed by considering the available rules fields (see currently supported Falco fields), the event types (see currently supported Falco events), and the supported driver schema version. A checksum indicates that something was not available in previous engine versions. See the rules release guidelines to understand how this affects the versioning of Falco rules. Breaking changes introduced in the Falco engine are not necessarily tied to the drivers or libs versions. The version number must be incremented every time and only when a single change or an atomic group of changes - which meet the criteria described above - is included in the master branch. Thus, a version bump can occur multiple times during the development and testing phases of a given release cycle. A given version bump must not group multiple changes that occurred sporadically during the release cycle.
  • During development and release preparation, libs and driver reference commits are often bumped in Falco's cmake setup (falcosecurity-libs cmake and driver cmake) in order to merge new Falco features. In practice, they are mostly bumped at the same time referencing the same libs commit. However, for the official Falco build FALCOSECURITY_LIBS_VERSION flag that references the stable libs version is used (read below).
  • Similarly, Falco plugins versions are bumped in Falco's cmake setup (plugins cmake) and those versions are the ones used for the Falco release.
  • At release time Plugin, Libs and Driver versions are compatible with Falco.
  • If you use the standard Falco setup leveraging driver-loader, driver-loader script will fetch the kernel space artifact (object file) corresponding to the default DRIVER_VERSION Falco was shipped with (read more below under Libs).
Falco version: x.y.z (sem-ver like)
Libs version:  x.y.z (sem-ver like)
Plugin API:    x.y.z (sem-ver like)
Engine:        x
Driver:
  API version:    x.y.z (sem-ver)
  Schema version: x.y.z (sem-ver)
  Default driver: x.y.z+driver (sem-ver like, indirectly encodes compatibility range in addition to default version Falco is shipped with)

Libs repo

  • Libs version is a git tag (x.y.z) and when building Falco the libs version is set via the FALCOSECURITY_LIBS_VERSION flag (see above).
  • The driver version is not directly linked to the userspace components of the Falco binary. This is because of the clear separation between userspace and kernel space, which adds an additional layer of complexity. To address this, the concept of a Default driver has been introduced, allowing for implicit declaration of compatible driver versions. For example, if the default driver version is 5.0.1+driver, Falco works with all driver versions >= 5.0.1 and < 6.0.0. This is a consequence of how the driver version is constructed starting from the Driver API version and Driver Schema version. Driver API and Schema versions are explained in the respective libs driver doc -> Falco's driver-loader will always fetch the default driver, therefore a Falco release is always "shipped" with the driver version corresponding to the default driver.
  • See libs release doc for more information.

Plugins repo

Rules repo