New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reload rules while profiling #990
Conversation
@@ -197,7 +197,7 @@ def __pack_main_content(self, page: UIPage): | |||
page.dispose() | |||
return | |||
|
|||
if self.__page: | |||
if self.__page is not None: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cause of split view when navigating away from rule view after Events was mixed in.
The type after Event mixin must not have had a bool ability. It also didnt have a string rep, perhaps that was one in the same with the bool rep.
Checking for not None
here is appropriate regardless, since there is not a valid bool rep of a page.
Allow rules to be loaded dynamically into a profiling session. This allows for a better test / update cycle while profiling as the profiler does not have to be shutdown to update rules. This also adds a new concept, the "Rule Identity", which provides a sha256 hash of the rule database to allow change monitoring across both profiler and systemd daemon execution. This hash is based on the compiled rules to provide a precise content based hash. Closes ctc-oss#985 Closes ctc-oss#989 # Conflicts: # crates/pyo3/Cargo.toml
## [v1.3.0](https://github.com/ctc-oss/fapolicy-analyzer/releases/tag/v1.3.0) - 2024-02-11 ### Added - Allow rules to be loaded dynamically into a profiling session ([#990](#990)) - Added syntax highlighting to the fapolicyd config editor ([#991](#991)) ### Packaging - Use digest crate for sha256 hashing, removing need for ring crate. ([#984](#984)) - Add a version number to the PDF user guide content and filename. ([#995](#995))
Allow rules to be loaded dynamically into a profiling session.
This allows for a better test / update cycle while profiling as the profiler does not have to be shutdown to update rules.
This also adds a new concept, the "Rule Identity", which provides a sha256 hash of the rule database to allow change monitoring across both profiler and systemd daemon execution. This hash is based on the compiled rules to provide a precise content based hash.
Closes #985
Closes #989