This document provides the process to create a new Falco release. In addition, it provides information about the versioning of the Falco components. At a high level each Falco release consists of the following main components:
- Falco binary (userspace), includes
modern_bpf
driver object code (kernel space) starting with Falco 0.34.x releases - Falco kernel driver object files, separate artifacts for
kmod
andbpf
drivers, not applicable formodern_bpf
driver (kernel space)- Option 1: Kernel module (
.ko
files) - Option 2: eBPF (
.o
files)
- Option 1: Kernel module (
- Falco config and rules
.yaml
files (userspace) - Falco plugins (userspace - optional)
Note: Starting with Falco 0.34.x releases, the Falco userspace binary includes the
modern_bpf
driver object code during the linking process. This integration is made possible by the CO-RE (Compile Once - Run Everywhere) feature of the modern BPF driver. CO-RE allows the driver to function on kernels that have backported BTF (BPF Type Format) support or have a kernel version >= 5.8. For the olderkmod
andbpf
drivers, separate artifacts are released for the kernel space. This is because these drivers need to be explicitly compiled for the specific kernel release, using the exact kernel headers. This approach ensures that Falco can support a wide range of environments, including multiple kernel versions, distributions, and architectures. (seelibs
driver - kernel version support matrix).
The Falco Project manages the release of both the Falco userspace binary and pre-compiled Falco kernel drivers for the most popular kernel versions and distros. The build and publish process is managed by the test-infra repo.
The Falco userspace executable includes bundled dependencies, so that it can be run from anywhere.
Falco publishes all sources, enabling users to audit the project's integrity and build kernel drivers for custom or unsupported kernels/distributions, specifically for non-modern BPF drivers (see driverkit for more information).
Finally, the release process follows a transparent process described in more detail in the following sections and the official Falco guide and documentation provide rich information around building, installing and using Falco.
The Falco project publishes all sources and the Falco userspace binaries as GitHub releases.
- Falco Releases
tgz
,rpm
anddeb
Falco binary packages (contains sources, including driver sources, Falco rules as well as k8saudit and cloudtrail plugins)tgz
,zip
source code
- Libs Releases
tgz
,zip
source code
- Driver Releases, marked with
+driver
build metadata.tgz
,zip
source code
- Falco Rules Releases
tgz
,zip
source code, each ruleset is tagged separately in a mono-repo fashion, see the rules release guidelines
Alternatively Falco binaries or plugins can be downloaded from the Falco Artifacts repo.
Note: This section specifically applies to non-modern BPF drivers.
The Falco Project publishes all drivers for each release for popular kernel versions / distros and x86_64
and aarch64
architectures to the Falco project's managed Artifacts repo. The Artifacts repo follows standard directory level conventions. The respective driver object file is prefixed by distro and named / versioned by kernel release - $(uname -r)
. Pre-compiled drivers are released with a best effort notice. This is because gcc (kmod
) and clang (bpf
) compilers sometimes fail to build the artifacts for a specific kernel version. More details around driver versioning and driver compatibility are provided in the Falco Components Versioning section. Short preview: If you use the standard Falco setup leveraging driver-loader, driver-loader script will fetch the kernel space artifact (object file) corresponding to the default DRIVER_VERSION
Falco was shipped with.
- Falco Artifacts Repo Drivers Root
- Option 1: Kernel module (
.ko
files) - all under same driver version directory - Option 2: eBPF (
.o
files) - all under same driver version directory
- Option 1: Kernel module (
Falco follows a release schedule of three times per year, with releases expected at the end of January, May, and September. Hotfix releases are issued as needed.
Changes and new features are organized into milestones. The milestone corresponding to the next version represents the content that will be included in the upcoming release.
The release process is mostly automated, requiring only a few manual steps to initiate and complete.
Moreover, we assign owners for each release (typically pairing a new person with an experienced one). Assignees and due dates for releases are proposed during the weekly community call.
At a high level each Falco release needs to follow a pre-determined sequencing of releases and build order:
- [1 - 3]
libs
(+driver
) andplugins
components releases - [4] Falco driver pre-compiled object files push to Falco's Artifacts repo
- [5] Falco userspace binary release
Assignees are responsible for creating a Falco GitHub issue to track the release tasks and monitor the progress of the release. This issue serves as a central point for communication and provides updates on the release dates. You can refer to the Falco v0.35 release or Libs Release (0.11.0+5.0.1+driver) issues as examples/templates for creating the release issue.
Finally, on the proposed due date, the assignees for the upcoming release proceed with the processes described below.
Before proceeding with the release, make sure to complete the following preparatory steps, which can be easily done using the GitHub UI:
- Find the previous release date (
YYYY-MM-DD
) by looking at the Falco releases - Check the release note block of every PR matching the
is:pr is:merged closed:>YYYY-MM-DD
filter- Ensure the release note block follows the commit convention, otherwise fix its content
- If the PR has no milestone, assign it to the milestone currently undergoing release
- Check issues without a milestone (using
is:pr is:merged no:milestone closed:>YYYY-MM-DD
filter ) and add them to the milestone currently undergoing release - Double-check that there are no more merged PRs without the target milestone assigned with the
is:pr is:merged no:milestone closed:>YYYY-MM-DD
filter, if any, update those missing
- Move the tasks not completed to a new minor milestone
Assuming we are releasing a non-patch version (like: Falco 0.34.0), a new release branch needs to be created.
Its naming will be release/M.m.x
; for example: release/0.34.x
.
The same branch will then be used for any eventual cherry pick for patch releases.
For patch releases, instead, the release/M.m.x
branch should already be in place; no more steps are needed.
Double check that any PR that should be part of the tag has been cherry-picked from master!
The release PR is meant to be made against the respective release/M.m.x
branch, then cherry-picked on master.
- Double-check if any hard-coded version number is present in the code, it should be not present anywhere:
- If any, manually correct it then open an issue to automate version number bumping later
- Versions table in the
README.md
updates itself automatically
- Generate the change log using rn2md:
- Execute
rn2md -o falcosecurity -m <version> -r falco
- In case
rn2md
emits error try to generate an GitHub OAuth access token and provide it with the-t
flag
- Execute
- Add the latest changes on top the previous
CHANGELOG.md
- Submit a PR with the above modifications
- Await PR approval
- Close the completed milestone as soon as the PR is merged into the release branch
- Cherry pick the PR on master too
Core maintainers and/or the release manager can decide to publish pre-releases at any time before the final release is live for development and testing purposes.
The prerelease tag must be formatted as M.m.p-r
where r
is the prerelease version information (e.g. 0.35.0-rc1
.)
To do so:
- Draft a new release
- Use
M.m.p-r
both as tag version and release title. - Check the "Set as a pre-release" checkbox and make sure "Set as the latest release" is unchecked
- It is recommended to add a brief description so that other contributors will understand the reason why the prerelease is published
- Publish the prerelease!
- The release pipeline will start automatically. Packages will be uploaded to the
-dev
bucket and container images will be tagged with the specified tag.
In order to check the status of the release pipeline click on the GitHub Actions tab in the Falco repository and filter by release.
Assume M.m.p
is the new version.
-
Use
M.m.p
both as tag version and release title -
Use the following template to fill the release description:
<!-- Substitute M.m.p with the current release version --> | Packages | Download | | -------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | | rpm-x86_64 | [![rpm](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/rpm/falco-M.m.p-x86_64.rpm) | | deb-x86_64 | [![deb](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/deb/stable/falco-M.m.p-x86_64.deb) | | tgz-x86_64 | [![tgz](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/bin/x86_64/falco-M.m.p-x86_64.tar.gz) | | rpm-aarch64 | [![rpm](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/rpm/falco-M.m.p-aarch64.rpm) | | deb-aarch64 | [![deb](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/deb/stable/falco-M.m.p-aarch64.deb) | | tgz-aarch64 | [![tgz](https://img.shields.io/badge/Falco-M.m.p-%2300aec7?style=flat-square)](https://download.falco.org/packages/bin/aarch64/falco-M.m.p-aarch64.tar.gz) | | Images | | --------------------------------------------------------------------------- | | `docker pull docker.io/falcosecurity/falco:M.m.p` | | `docker pull public.ecr.aws/falcosecurity/falco:M.m.p` | | `docker pull docker.io/falcosecurity/falco-driver-loader:M.m.p` | | `docker pull docker.io/falcosecurity/falco-no-driver:M.m.p` | <changelog> <!-- Substitute <changelog> with the one generated by [rn2md](https://github.com/leodido/rn2md) --> ### Statistics | Merged PRs | Number | | --------------- | ------ | | Not user-facing | x | | Release note | x | | Total | x | <!-- Calculate stats and fill the above table --> #### Release Manager <github handle> <!-- Substitute GitHub handle with the release manager's one -->
-
Finally, publish the release!
-
The release pipeline will start automatically upon publication and all packages and container images will be uploaded to the stable repositories.
In order to check the status of the release pipeline click on the GitHub Actions tab in the Falco repository and filter by release.
For each release we archive the meeting notes in git for historical purposes.
- The notes from the Falco meetings can be found here.
- Note: There may be other notes from working groups that can optionally be added as well as needed.
- Add the entire content of the document to a new file in github.com/falcosecurity/community/tree/master/meeting-notes as a new file labeled
release-M.m.p.md
- Open up a pull request with the new change.
Announce the new release to the world!
- Publish a blog on Falco website (example)
- Send an announcement to cncf-falco-dev@lists.cncf.io (plain text, please)
- Let folks in the slack #falco channel know about a new release came out
- IFF the on going release introduces a new minor version, archive a snapshot of the Falco website
This section provides more details around the versioning of the components that make up Falco's core. It can also be a useful guide for the uninitiated to be more informed about Falco's source. Because libs
makes up the greater portion of the source code of the Falco binary and is the home of each of the kernel drivers and engines, the libs release doc is an excellent additional resource. In addition, the plugins release doc provides similar details around Falco's plugins. SHA256
checksums are provided throughout Falco's source code to empower the end user to perform integrity checks. All Falco releases also contain the sources as part of the packages.
- Falco version is a git tag (
x.y.z
), see Procedures section. Note that the Falco version is a sem-ver-like schema, but not fully compatible with sem-ver. - FALCO_ENGINE_VERSION is not sem-ver and must be bumped either when a backward incompatible change has been introduced to the rules files syntax and loading logic, and/or when
FALCO_ENGINE_CHECKSUM
has changed. The checksum is computed by considering the available rules fields (see currently supported Falco fields), the event types (see currently supported Falco events), and the supported driver schema version. A checksum indicates that something was not available in previous engine versions. See the rules release guidelines to understand how this affects the versioning of Falco rules. Breaking changes introduced in the Falco engine are not necessarily tied to the drivers or libs versions. The version number must be incremented every time and only when a single change or an atomic group of changes - which meet the criteria described above - is included in themaster
branch. Thus, a version bump can occur multiple times during the development and testing phases of a given release cycle. A given version bump must not group multiple changes that occurred sporadically during the release cycle. - During development and release preparation, libs and driver reference commits are often bumped in Falco's cmake setup (falcosecurity-libs cmake and driver cmake) in order to merge new Falco features. In practice, they are mostly bumped at the same time referencing the same
libs
commit. However, for the official Falco buildFALCOSECURITY_LIBS_VERSION
flag that references the stable libs version is used (read below). - Similarly, Falco plugins versions are bumped in Falco's cmake setup (plugins cmake) and those versions are the ones used for the Falco release.
- At release time Plugin, Libs and Driver versions are compatible with Falco.
- If you use the standard Falco setup leveraging driver-loader, driver-loader script will fetch the kernel space artifact (object file) corresponding to the default
DRIVER_VERSION
Falco was shipped with (read more below under Libs).
Falco version: x.y.z (sem-ver like)
Libs version: x.y.z (sem-ver like)
Plugin API: x.y.z (sem-ver like)
Engine: x
Driver:
API version: x.y.z (sem-ver)
Schema version: x.y.z (sem-ver)
Default driver: x.y.z+driver (sem-ver like, indirectly encodes compatibility range in addition to default version Falco is shipped with)
- Libs version is a git tag (
x.y.z
) and when building Falco the libs version is set via theFALCOSECURITY_LIBS_VERSION
flag (see above). - The driver version is not directly linked to the userspace components of the Falco binary. This is because of the clear separation between userspace and kernel space, which adds an additional layer of complexity. To address this, the concept of a
Default driver
has been introduced, allowing for implicit declaration of compatible driver versions. For example, if the default driver version is5.0.1+driver
, Falco works with all driver versions >= 5.0.1 and < 6.0.0. This is a consequence of how the driver version is constructed starting from theDriver API version
andDriver Schema version
. Driver API and Schema versions are explained in the respective libs driver doc -> Falco'sdriver-loader
will always fetch the default driver, therefore a Falco release is always "shipped" with the driver version corresponding to the default driver. - See libs release doc for more information.
- Plugins version is a git tag (
x.y.z
) - See plugins release doc for more information.
- Rulesets are versioned individually through git tags
- See rules release doc for more information.
- See plugins release doc for more information about plugins rulesets.