-
Notifications
You must be signed in to change notification settings - Fork 61
PEP-578 Audit Hooks for Stackless #303
Comments
I created pull request #304. I fixed the documentation for auditing events
I tried to follow these recommendations.
I added code to raises the following auditing events:
|
I skimmed over the PIP but still am not entirely sure what its for. Is it security? Or just monitoring? |
Was a bit distracted from Stackless during the last few days.
Well both. For security reasons if you operate a large data center (or a could) you want to be able analyze your log files for any anomalies. If an attacker gains control over a Python interpreter, he can do everything and - without auditing hooks - without any traces in the logs. Therefore it is a real advantage, if you can
PEP-578 is fairly generic and does not specify concrete criteria where to add audit hooks to the code. Therefore I had to find my own criteria:
Up to now I didn't add any auditing events to monitor tasklet scheduling or channel operations. Up to now my applications don't need them and I'm not sure about the criteria when to create them. Is this reasonable? Should we add this reasoning to the documentation? Where? |
Ok, this explains it well. I think it is reasonable to produce similar auditing events as regular python does for similar activity. |
C-Python 3.8 adds various Audit Hooks, see. Various Stackless APIs could be used to bypaas those hooks. Therefore Stckless sould add appropriate calls of PySys_Audit() to relevant C-functions (mostly
__reduce__()
and__setstate__()
,tasklet.frame
,tasklet.cstate
,cstack.\_\_str\_\_
,cstack.startaddr
,cframe.*
, ).C-Python Hooks to be considered
Stackless already creates the events
sys.setprofile
andsys.settrace
The text was updated successfully, but these errors were encountered: