Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

new(falco/config): add new configurations for http_output #2458

Merged
merged 1 commit into from
Mar 30, 2023

Conversation

alacuku
Copy link
Member

@alacuku alacuku commented Mar 27, 2023

What type of PR is this?

Uncomment one (or more) /kind <> lines:

/kind bug

/kind cleanup

/kind design

/kind documentation

/kind failing-test

/kind feature

/kind release

Any specific area of the project related to this PR?

Uncomment one (or more) /area <> lines:

/area build

/area engine

/area tests

/area proposals

/area CI

What this PR does / why we need it:
Falco now accepts user-provided Certificates and CA certificate stores that are used to verify the remote server to which the http_output is sent.

Four new config fields are available under the http_output section in falco.yaml configuration file:

 # Tell Falco to not verify the remote server.
insecure: false
# Path to the CA certificate that can verify the remote server. 
ca_cert: ""
# Path to a specific file that will be used as the CA certificate store.
ca_bundle: ""
# Path to a folder that will be used as the CA certificate store. CA certificate need to be
# stored as indivitual PEM files in this directory.
ca_path: "/etc/ssl/certs"

Furthermore, this PR decouples Falco as a consumer of the libcurl from the libs. Making the certificate paths configurable at startup time allows Falco to support https endpoints in every scenario as far as a valid certificate is provided for the remote server.

Which issue(s) this PR fixes:

Fixes #2274
Fixes #2448

Special notes for your reviewer:

Does this PR introduce a user-facing change?:

new(falco/config): add new configurations for http_output that allow custom CA certificates and stores.

@jasondellaluce
Copy link
Contributor

/milestone 0.35.0

@poiana poiana added this to the 0.35.0 milestone Mar 27, 2023
userspace/falco/configuration.cpp Outdated Show resolved Hide resolved
userspace/falco/outputs_http.cpp Show resolved Hide resolved
falco.yaml Show resolved Hide resolved
Support for user provided CA certificate that can verify the remote server. Users
can provide path to the CA certiface store by providing a path to the dir or to the
CA store file. If needed users can decide to tell Falco to not verify the server.

Signed-off-by: Aldo Lacuku <[email protected]>
@alacuku alacuku force-pushed the kcl/http_output-certificates branch from 46d46b1 to ba3e236 Compare March 30, 2023 07:58
Copy link
Contributor

@jasondellaluce jasondellaluce left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@poiana
Copy link
Contributor

poiana commented Mar 30, 2023

LGTM label has been added.

Git tree hash: 4752520c7702e95bc2b42d4a9c48cdbf40e03477

Copy link
Member

@Andreagit97 Andreagit97 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve
thank you for this!

@poiana
Copy link
Contributor

poiana commented Mar 30, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: alacuku, Andreagit97, jasondellaluce

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [Andreagit97,jasondellaluce]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana poiana merged commit 31335d3 into falcosecurity:master Mar 30, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Archived in project
4 participants