- Update to version 0.9.64:
* replaced --nowrap option with --wrap in firemon * The blocking action of seccomp filters has been changed from killing the process to returning EPERM to the caller. To get the previous behaviour, use --seccomp-error-action=kill or syscall:kill syntax when constructing filters, or override in /etc/firejail/firejail.config file. * Fine-grained D-Bus sandboxing with xdg-dbus-proxy. xdg-dbus-proxy must be installed, if not D-Bus access will be allowed. With this version nodbus is deprecated, in favor of dbus-user none and dbus-system none and will be removed in a future version. * DHCP client support * firecfg only fix dektop-files if started with sudo * SELinux labeling support * custom 32-bit seccomp filter support * restrict ${RUNUSER} in several profiles * blacklist shells such as bash in several profiles * whitelist globbing * mkdir and mkfile support for /run/user directory * support ignore for include * --include on the command line * splitting up media players whitelists in whitelist-players.inc * new condition: HAS_NOSOUND * new profiles: gfeeds, firefox-x11, tvbrowser, rtv, clipgrab, muraster * new profiles: gnome-passwordsafe, bibtex, gummi, latex, mupdf-x11-curl * new profiles: pdflatex, tex, wpp, wpspdf, wps, et, multimc, mupdf-x11 * new profiles: gnome-hexgl, com.github.johnfactotum.Foliate, mupdf-gl, mutool * new profiles: desktopeditors, impressive, planmaker18, planmaker18free * new profiles: presentations18, presentations18free, textmaker18, teams * new profiles: textmaker18free, xournal, gnome-screenshot, ripperX OBS-URL: https://build.opensuse.org/package/show/Virtualization/firejail?expand=0&rev=32
This commit is contained in:
parent
0d233a7a59
commit
7ad2a2419a
@ -1,78 +0,0 @@
|
|||||||
From 609be4fda2dda5557de864eba814c42fe2f40dca Mon Sep 17 00:00:00 2001
|
|
||||||
From: smitsohu <smitsohu@gmail.com>
|
|
||||||
Date: Sun, 9 Feb 2020 11:30:31 +0100
|
|
||||||
Subject: [PATCH] openSUSE fix: mount private-etc on /usr/etc as well
|
|
||||||
|
|
||||||
see issue #3145
|
|
||||||
---
|
|
||||||
src/firejail/fs_etc.c | 3 ++-
|
|
||||||
src/firejail/sandbox.c | 1 +
|
|
||||||
src/include/rundefs.h | 1 +
|
|
||||||
3 files changed, 4 insertions(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/src/firejail/fs_etc.c b/src/firejail/fs_etc.c
|
|
||||||
index 7b7813926..76bcb751e 100644
|
|
||||||
--- a/src/firejail/fs_etc.c
|
|
||||||
+++ b/src/firejail/fs_etc.c
|
|
||||||
@@ -145,7 +145,8 @@ void fs_private_dir_list(const char *private_dir, const char *private_run_dir, c
|
|
||||||
// nothing to do if directory does not exist
|
|
||||||
struct stat s;
|
|
||||||
if (stat(private_dir, &s) == -1) {
|
|
||||||
- fmessage("Cannot find %s\n", private_dir);
|
|
||||||
+ if (arg_debug)
|
|
||||||
+ printf("Cannot find %s\n", private_dir);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
diff --git a/src/firejail/sandbox.c b/src/firejail/sandbox.c
|
|
||||||
index 96ad30bed..4f53cafcc 100644
|
|
||||||
--- a/src/firejail/sandbox.c
|
|
||||||
+++ b/src/firejail/sandbox.c
|
|
||||||
@@ -855,6 +855,7 @@ int sandbox(void* sandbox_arg) {
|
|
||||||
fwarning("private-etc feature is disabled in overlay\n");
|
|
||||||
else {
|
|
||||||
fs_private_dir_list("/etc", RUN_ETC_DIR, cfg.etc_private_keep);
|
|
||||||
+ fs_private_dir_list("/usr/etc", RUN_USR_ETC_DIR, cfg.etc_private_keep); // openSUSE
|
|
||||||
// create /etc/ld.so.preload file again
|
|
||||||
if (need_preload)
|
|
||||||
fs_trace_preload();
|
|
||||||
diff --git a/src/include/rundefs.h b/src/include/rundefs.h
|
|
||||||
index 7f9c68be2..1cfeee28d 100644
|
|
||||||
--- a/src/include/rundefs.h
|
|
||||||
+++ b/src/include/rundefs.h
|
|
||||||
@@ -42,6 +42,7 @@
|
|
||||||
#define RUN_NONEWPRIVS_CFG RUN_MNT_DIR "/nonewprivs"
|
|
||||||
#define RUN_HOME_DIR RUN_MNT_DIR "/home"
|
|
||||||
#define RUN_ETC_DIR RUN_MNT_DIR "/etc"
|
|
||||||
+#define RUN_USR_ETC_DIR RUN_MNT_DIR "/usretc"
|
|
||||||
#define RUN_OPT_DIR RUN_MNT_DIR "/opt"
|
|
||||||
#define RUN_SRV_DIR RUN_MNT_DIR "/srv"
|
|
||||||
#define RUN_BIN_DIR RUN_MNT_DIR "/bin"
|
|
||||||
From cd184e9919bb67fb88ee6208c395682f5f0ba764 Mon Sep 17 00:00:00 2001
|
|
||||||
From: smitsohu <smitsohu@gmail.com>
|
|
||||||
Date: Sun, 9 Feb 2020 11:33:57 +0100
|
|
||||||
Subject: [PATCH] openSUSE fix: search login.defs in /usr/etc, too
|
|
||||||
|
|
||||||
see issue #3145
|
|
||||||
---
|
|
||||||
src/lib/firejail_user.c | 7 +++++--
|
|
||||||
1 file changed, 5 insertions(+), 2 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/lib/firejail_user.c b/src/lib/firejail_user.c
|
|
||||||
index dbf2ca94b..2e03ce0e0 100644
|
|
||||||
--- a/src/lib/firejail_user.c
|
|
||||||
+++ b/src/lib/firejail_user.c
|
|
||||||
@@ -43,8 +43,11 @@ static void init_uid_gid_min(void) {
|
|
||||||
|
|
||||||
// read the real values from login.def
|
|
||||||
FILE *fp = fopen("/etc/login.defs", "r");
|
|
||||||
- if (!fp)
|
|
||||||
- goto errexit;
|
|
||||||
+ if (!fp) {
|
|
||||||
+ fp = fopen("/usr/etc/login.defs", "r"); // openSUSE
|
|
||||||
+ if (!fp)
|
|
||||||
+ goto errexit;
|
|
||||||
+ }
|
|
||||||
|
|
||||||
char buf[MAXBUF];
|
|
||||||
while (fgets(buf, MAXBUF, fp)) {
|
|
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:2a2738bded0d4c96ea17094dacdba175516a193d50ce3e743fce7ac1ade7260c
|
|
||||||
size 382780
|
|
@ -1,11 +0,0 @@
|
|||||||
-----BEGIN PGP SIGNATURE-----
|
|
||||||
|
|
||||||
iQEzBAABCgAdFiEE+VEWSZX1xABqc0EeLMs2rfxYSacFAl86gd4ACgkQLMs2rfxY
|
|
||||||
SadQgAf+PMlVCZ+CYNxPoKVV+iXntZTbYrHkfcofVqY4A6ADKUelDb/BEHuuoR5R
|
|
||||||
92FMUnN3bh11sMG/NAwqOX5kCNtl33EMYf9xv5dVAf/H5GZjNjYak93Lpu9wJFOD
|
|
||||||
NWSAqIqEEWzCov5mJ5+yLdtCJ+Cvx7cMrumod26MzFnGVxXXGvaq8mljGQt7Muxy
|
|
||||||
pVEyDwcHIjKKYjSvzP3o1038NuI8My9Gl7Wz/ZCGhkUL1j9u0kYktk7gt3/fE/ju
|
|
||||||
QM3f7ZmCsJIrCmHF++3Va1a/U3z6UQaxNTmJ0XyqqzdZ6xv1+WuGXPAfwgdLaxht
|
|
||||||
RxipeRnr6o/MaeNGOGPNhiNF+4vY4A==
|
|
||||||
=A5n+
|
|
||||||
-----END PGP SIGNATURE-----
|
|
3
firejail-0.9.64.tar.xz
Normal file
3
firejail-0.9.64.tar.xz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:e53bab074e6c97609a3486d2055e44094025e32b217f374c06dd9e3285e7f2fd
|
||||||
|
size 419464
|
11
firejail-0.9.64.tar.xz.asc
Normal file
11
firejail-0.9.64.tar.xz.asc
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
|
||||||
|
iQEzBAABCgAdFiEE+VEWSZX1xABqc0EeLMs2rfxYSacFAl+RloMACgkQLMs2rfxY
|
||||||
|
Sadk1wf+OLyTh2JJrZtUztKOxltQVbQ9srPFBxAn2Y/ax4ulv7E9gnEtayuRTNOn
|
||||||
|
GFNoHf2db4M2i15JS9iLAyfjn0vjbp47O4Hk+5ir3DVsptWVm2anAtwH3Q0wXZaK
|
||||||
|
Q43E9m++imClKs0WMLWfepVXs6QF3o8hfGKZmv/jjnepgDf/ceD7lN8EHpen2QuE
|
||||||
|
+dcQOpqCLPEGLOsLXugT4lH/9YoYvpHXPEzKvaYpv6BS2PPhwgM3RbLfeQiBlFn2
|
||||||
|
DMkeNEp4YUvYnKP9zdGVRpXf2rRBK4izDf39IIb+WTZbUWSMDpZp+ppv5RJ37uah
|
||||||
|
rgLsqFF+0wAwZqPOsakx4ikjKSWFVA==
|
||||||
|
=jU+V
|
||||||
|
-----END PGP SIGNATURE-----
|
@ -1,37 +0,0 @@
|
|||||||
Note: this patch is backported/modified - upstream moved the AppArmor profile
|
|
||||||
to etc/apparmor/firejail-default in the meantime
|
|
||||||
-- cboltz, 2020-10-26
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
commit bba750c73469ea315d859464ddd19e495d830a72
|
|
||||||
Author: Kristóf Marussy <kristof@marussy.com>
|
|
||||||
Date: Sat Oct 10 13:27:42 2020 +0200
|
|
||||||
|
|
||||||
Fix AppArmor 3.0 support (closes #3659)
|
|
||||||
|
|
||||||
AppArmor introduces the @{run} variable, which is used in
|
|
||||||
<abstractions/dbus-strict> and <abstractions/dbus-session-strict> among
|
|
||||||
other places. Thus, we follow suit of the built-in profiles and #include
|
|
||||||
<tunables/global>, which includes <tunables/run> in AppArmor 3.0,
|
|
||||||
defining the variable.
|
|
||||||
|
|
||||||
As <tunables/global> exists in previous versions of AppArmor, too, this
|
|
||||||
patch does not introduce a backward-compatibility issue with Apparmor
|
|
||||||
2.x.
|
|
||||||
|
|
||||||
diff --git a/etc/apparmor/firejail-default b/etc/apparmor/firejail-default
|
|
||||||
index 68e20d9b..e396ae7d 100644
|
|
||||||
--- a/etc/firejail-default
|
|
||||||
+++ b/etc/firejail-default
|
|
||||||
@@ -2,6 +2,10 @@
|
|
||||||
# Generic Firejail AppArmor profile
|
|
||||||
#########################################
|
|
||||||
|
|
||||||
+# AppArmor 3.0 uses the @{run} variable in <abstractions/dbus-strict>
|
|
||||||
+# and <abstractions/dbus-session-strict>.
|
|
||||||
+#include <tunables/global>
|
|
||||||
+
|
|
||||||
##########
|
|
||||||
# A simple PID declaration based on Ubuntu's @{pid}
|
|
||||||
# Ubuntu keeps it under tunables/kernelvars and include it via tunables/global.
|
|
@ -1,3 +1,62 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Sun Nov 1 16:58:56 UTC 2020 - Sebastian Wagner <sebix+novell.com@sebix.at>
|
||||||
|
|
||||||
|
- Update to version 0.9.64:
|
||||||
|
* replaced --nowrap option with --wrap in firemon
|
||||||
|
* The blocking action of seccomp filters has been changed from
|
||||||
|
killing the process to returning EPERM to the caller. To get the
|
||||||
|
previous behaviour, use --seccomp-error-action=kill or
|
||||||
|
syscall:kill syntax when constructing filters, or override in
|
||||||
|
/etc/firejail/firejail.config file.
|
||||||
|
* Fine-grained D-Bus sandboxing with xdg-dbus-proxy.
|
||||||
|
xdg-dbus-proxy must be installed, if not D-Bus access will be allowed.
|
||||||
|
With this version nodbus is deprecated, in favor of dbus-user none and
|
||||||
|
dbus-system none and will be removed in a future version.
|
||||||
|
* DHCP client support
|
||||||
|
* firecfg only fix dektop-files if started with sudo
|
||||||
|
* SELinux labeling support
|
||||||
|
* custom 32-bit seccomp filter support
|
||||||
|
* restrict ${RUNUSER} in several profiles
|
||||||
|
* blacklist shells such as bash in several profiles
|
||||||
|
* whitelist globbing
|
||||||
|
* mkdir and mkfile support for /run/user directory
|
||||||
|
* support ignore for include
|
||||||
|
* --include on the command line
|
||||||
|
* splitting up media players whitelists in whitelist-players.inc
|
||||||
|
* new condition: HAS_NOSOUND
|
||||||
|
* new profiles: gfeeds, firefox-x11, tvbrowser, rtv, clipgrab, muraster
|
||||||
|
* new profiles: gnome-passwordsafe, bibtex, gummi, latex, mupdf-x11-curl
|
||||||
|
* new profiles: pdflatex, tex, wpp, wpspdf, wps, et, multimc, mupdf-x11
|
||||||
|
* new profiles: gnome-hexgl, com.github.johnfactotum.Foliate, mupdf-gl, mutool
|
||||||
|
* new profiles: desktopeditors, impressive, planmaker18, planmaker18free
|
||||||
|
* new profiles: presentations18, presentations18free, textmaker18, teams
|
||||||
|
* new profiles: textmaker18free, xournal, gnome-screenshot, ripperX
|
||||||
|
* new profiles: sound-juicer, com.github.dahenson.agenda, gnome-pomodoro
|
||||||
|
* new profiles: gnome-todo, x2goclient, iagno, kmplayer, penguin-command
|
||||||
|
* new profiles: frogatto, gnome-mines, gnome-nibbles, lightsoff, warmux
|
||||||
|
* new profiles: ts3client_runscript.sh, ferdi, abiword, four-in-a-row
|
||||||
|
* new profiles: gnome-mahjongg, gnome-robots, gnome-sudoku, gnome-taquin
|
||||||
|
* new profiles: gnome-tetravex, blobwars, gravity-beams-and-evaporating-stars
|
||||||
|
* new profiles: hyperrogue, jumpnbump-menu, jumpnbump, magicor, mindless
|
||||||
|
* new profiles: mirrormagic, mrrescue, scorched3d-wrapper, scorchwentbonkers
|
||||||
|
* new profiles: seahorse-adventures, wordwarvi, xbill, gnome-klotski
|
||||||
|
* new profiles: swell-foop, fdns, five-or-more, steam-runtime
|
||||||
|
* new profiles: nicotine, plv, mocp, apostrophe, quadrapassel, dino-im
|
||||||
|
* new profiles: hitori, bijiben, gnote, gnubik, ZeGrapher, xonotic-sdl-wrapper
|
||||||
|
* new profiles: gapplication, openarena_ded, element-desktop, cawbird
|
||||||
|
* new profiles: freetube, strawberry, jitsi-meet-desktop
|
||||||
|
* new profiles: homebank, mattermost-desktop, newsflash, com.gitlab.newsflash
|
||||||
|
* new profiles: sushi, xfce4-screenshooter, org.gnome.NautilusPreviewer, lyx
|
||||||
|
* new profiles: minitube, nuclear, mtpaint, minecraft-launcher, gnome-calendar
|
||||||
|
* new profiles: vmware, git-cola, otter-browser, kazam, menulibre, musictube
|
||||||
|
* new profiles: onboard, fractal, mirage, quaternion, spectral, man, psi
|
||||||
|
* new profiles: smuxi-frontend-gnome, balsa, kube, trojita, youtube
|
||||||
|
* new profiles: youtubemusic-nativefier, cola, dbus-send, notify-send
|
||||||
|
* new profiles: qrencode, ytmdesktop, twitch
|
||||||
|
* new profiles: xournalpp, chromium-freeworld, equalx
|
||||||
|
- remove firejail-0.9.62-fix-usr-etc.patch, included upstream
|
||||||
|
- remove firejail-apparmor-3.0.diff, included upstream
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Mon Oct 26 22:34:02 UTC 2020 - Christian Boltz <suse-beta@cboltz.de>
|
Mon Oct 26 22:34:02 UTC 2020 - Christian Boltz <suse-beta@cboltz.de>
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
|
|
||||||
|
|
||||||
Name: firejail
|
Name: firejail
|
||||||
Version: 0.9.62.4
|
Version: 0.9.64
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Linux namepaces sandbox program
|
Summary: Linux namepaces sandbox program
|
||||||
License: GPL-2.0-only
|
License: GPL-2.0-only
|
||||||
@ -25,10 +25,6 @@ Group: Productivity/Security
|
|||||||
URL: https://firejail.wordpress.com/
|
URL: https://firejail.wordpress.com/
|
||||||
Source0: http://downloads.sourceforge.net/%{name}/%{name}-%{version}.tar.xz
|
Source0: http://downloads.sourceforge.net/%{name}/%{name}-%{version}.tar.xz
|
||||||
Source1: http://downloads.sourceforge.net/%{name}/%{name}-%{version}.tar.xz.asc
|
Source1: http://downloads.sourceforge.net/%{name}/%{name}-%{version}.tar.xz.asc
|
||||||
# PATCH-FIX-OPENSUSE firejail-0.9.62-fix-usr-etc.patch -- https://github.com/netblue30/firejail/issues/3145 two patches combined, source see file
|
|
||||||
Patch0: firejail-0.9.62-fix-usr-etc.patch
|
|
||||||
# PATCH-FIX-UPSTREAM firejail-apparmor-3.0.diff -- https://github.com/netblue30/firejail/issues/3659
|
|
||||||
Patch1: firejail-apparmor-3.0.diff
|
|
||||||
BuildRequires: fdupes
|
BuildRequires: fdupes
|
||||||
BuildRequires: gcc-c++
|
BuildRequires: gcc-c++
|
||||||
BuildRequires: libapparmor-devel
|
BuildRequires: libapparmor-devel
|
||||||
@ -46,8 +42,6 @@ Linux namespace support. It supports sandboxing specific users upon login.
|
|||||||
|
|
||||||
%prep
|
%prep
|
||||||
%setup -q
|
%setup -q
|
||||||
%patch0 -p1
|
|
||||||
%patch1 -p1
|
|
||||||
sed -i '1s/^#!\/usr\/bin\/env /#!\/usr\/bin\//' contrib/fj-mkdeb.py contrib/fjclip.py contrib/fjdisplay.py contrib/fjresize.py contrib/sort.py
|
sed -i '1s/^#!\/usr\/bin\/env /#!\/usr\/bin\//' contrib/fj-mkdeb.py contrib/fjclip.py contrib/fjdisplay.py contrib/fjresize.py contrib/sort.py
|
||||||
|
|
||||||
%build
|
%build
|
||||||
@ -70,6 +64,7 @@ exit 0
|
|||||||
%verify_permissions -e %{_bindir}/firejail
|
%verify_permissions -e %{_bindir}/firejail
|
||||||
|
|
||||||
%files
|
%files
|
||||||
|
%license COPYING
|
||||||
%attr(4750,root,firejail) %verify(not user group mode) %{_bindir}/firejail
|
%attr(4750,root,firejail) %verify(not user group mode) %{_bindir}/firejail
|
||||||
%{_bindir}/firecfg
|
%{_bindir}/firecfg
|
||||||
%{_bindir}/firemon
|
%{_bindir}/firemon
|
||||||
@ -84,5 +79,10 @@ exit 0
|
|||||||
%config %{_sysconfdir}/apparmor.d/local/firejail-default
|
%config %{_sysconfdir}/apparmor.d/local/firejail-default
|
||||||
%dir %{_sysconfdir}/apparmor.d
|
%dir %{_sysconfdir}/apparmor.d
|
||||||
%dir %{_sysconfdir}/apparmor.d/local
|
%dir %{_sysconfdir}/apparmor.d/local
|
||||||
|
%dir %{_datadir}/vim/vimfiles
|
||||||
|
%dir %{_datadir}/vim/vimfiles/ftdetect
|
||||||
|
%dir %{_datadir}/vim/vimfiles/syntax
|
||||||
|
%{_datadir}/vim/vimfiles/ftdetect/firejail.vim
|
||||||
|
%{_datadir}/vim/vimfiles/syntax/firejail.vim
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
Loading…
Reference in New Issue
Block a user