Accepting request 522777 from home:avindra
- Update to version 0.9.50: * New features: - per-profile disable-mnt (--disable-mnt) - per-profile support to set X11 Xephyr screen size (--xephyr-screen) - private /lib directory (--private-lib) - disable CDROM/DVD drive (--nodvd) - disable DVB devices (--notv) - --profile.print * modif: --output split in two commands, --output and --output-stderr * set xpra-attach yes in /etc/firejail/firejail.config * Enhancements: - print all seccomp filters under --debug - /proc/sys mounting - rework IP address assingment for --net options - support for newer Xpra versions (2.1+) - - all profiles use a standard layout style - create /usr/local for firecfg if the directory doesn't exist - allow full paths in --private-bin * New seccomp features: - --memory-deny-write-execute - seccomp post-exec - block secondary architecture (--seccomp.block_secondary) - seccomp syscall groups - print all seccomp filters under --debug - default seccomp list update * new profiles: curl, mplayer2, SMPlayer, Calibre, ebook-viewer, KWrite, Geary, Liferea, peek, silentarmy, IntelliJ IDEA, Android Studio, electron, riot-web, Extreme Tux Racer, Frozen Bubble, Open Invaders, Pingus, Simutrans, SuperTux telegram-desktop, arm, rambox, apktool, baobab, dex2jar, gitg, hashcat, obs, picard, remmina, sdat2img, soundconverter truecraft, gnome-twitch, tuxguitar, musescore, neverball sqlitebrowse, Yandex Browser, minetest OBS-URL: https://build.opensuse.org/request/show/522777 OBS-URL: https://build.opensuse.org/package/show/Virtualization/firejail?expand=0&rev=8
This commit is contained in:
parent
a872b3d7c4
commit
c320ca99e4
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:637da4221ff91c351020de15ef07a7b4f72bc015255be74cbbeb898bba254709
|
|
||||||
size 257592
|
|
3
firejail-0.9.50.tar.xz
Normal file
3
firejail-0.9.50.tar.xz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:c15475b7ec8b42ee8707f03207bef9ba92d801fc61fd8d1e0f8cfc03833bb800
|
||||||
|
size 279488
|
@ -1,3 +1,41 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Sat Sep 9 14:40:29 UTC 2017 - aavindraa@gmail.com
|
||||||
|
|
||||||
|
- Update to version 0.9.50:
|
||||||
|
* New features:
|
||||||
|
- per-profile disable-mnt (--disable-mnt)
|
||||||
|
- per-profile support to set X11 Xephyr screen size (--xephyr-screen)
|
||||||
|
- private /lib directory (--private-lib)
|
||||||
|
- disable CDROM/DVD drive (--nodvd)
|
||||||
|
- disable DVB devices (--notv)
|
||||||
|
- --profile.print
|
||||||
|
* modif: --output split in two commands, --output and --output-stderr
|
||||||
|
* set xpra-attach yes in /etc/firejail/firejail.config
|
||||||
|
* Enhancements:
|
||||||
|
- print all seccomp filters under --debug
|
||||||
|
- /proc/sys mounting
|
||||||
|
- rework IP address assingment for --net options
|
||||||
|
- support for newer Xpra versions (2.1+) -
|
||||||
|
- all profiles use a standard layout style
|
||||||
|
- create /usr/local for firecfg if the directory doesn't exist
|
||||||
|
- allow full paths in --private-bin
|
||||||
|
* New seccomp features:
|
||||||
|
- --memory-deny-write-execute
|
||||||
|
- seccomp post-exec
|
||||||
|
- block secondary architecture (--seccomp.block_secondary)
|
||||||
|
- seccomp syscall groups
|
||||||
|
- print all seccomp filters under --debug
|
||||||
|
- default seccomp list update
|
||||||
|
* new profiles:
|
||||||
|
curl, mplayer2, SMPlayer, Calibre, ebook-viewer, KWrite,
|
||||||
|
Geary, Liferea, peek, silentarmy, IntelliJ IDEA,
|
||||||
|
Android Studio, electron, riot-web, Extreme Tux Racer,
|
||||||
|
Frozen Bubble, Open Invaders, Pingus, Simutrans, SuperTux
|
||||||
|
telegram-desktop, arm, rambox, apktool, baobab, dex2jar, gitg,
|
||||||
|
hashcat, obs, picard, remmina, sdat2img, soundconverter
|
||||||
|
truecraft, gnome-twitch, tuxguitar, musescore, neverball
|
||||||
|
sqlitebrowse, Yandex Browser, minetest
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue Aug 15 15:47:49 CEST 2017 - tiwai@suse.de
|
Tue Aug 15 15:47:49 CEST 2017 - tiwai@suse.de
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# spec file for package firejail
|
# spec file for package firejail
|
||||||
#
|
#
|
||||||
# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
|
# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||||
#
|
#
|
||||||
# All modifications and additions to the file contributed by third parties
|
# All modifications and additions to the file contributed by third parties
|
||||||
# remain the property of their copyright owners, unless otherwise agreed
|
# remain the property of their copyright owners, unless otherwise agreed
|
||||||
@ -17,7 +17,7 @@
|
|||||||
|
|
||||||
|
|
||||||
Name: firejail
|
Name: firejail
|
||||||
Version: 0.9.48
|
Version: 0.9.50
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Linux namepaces sandbox program
|
Summary: Linux namepaces sandbox program
|
||||||
License: GPL-2.0
|
License: GPL-2.0
|
||||||
@ -25,8 +25,8 @@ Group: Productivity/Security
|
|||||||
Url: https://firejail.wordpress.com/
|
Url: https://firejail.wordpress.com/
|
||||||
Source0: %{name}-%{version}.tar.xz
|
Source0: %{name}-%{version}.tar.xz
|
||||||
Source1: %{name}.rpmlintrc
|
Source1: %{name}.rpmlintrc
|
||||||
BuildRequires: libapparmor-devel
|
|
||||||
BuildRequires: gcc-c++
|
BuildRequires: gcc-c++
|
||||||
|
BuildRequires: libapparmor-devel
|
||||||
Requires(pre): permissions
|
Requires(pre): permissions
|
||||||
|
|
||||||
%description
|
%description
|
||||||
@ -35,7 +35,7 @@ breaches by restricting the running environment of untrusted applications
|
|||||||
using Linux namespaces and seccomp-bpf. It includes sandbox profiles for
|
using Linux namespaces and seccomp-bpf. It includes sandbox profiles for
|
||||||
many existing applications like Iceweasel/Mozilla Firefox and Chromium.
|
many existing applications like Iceweasel/Mozilla Firefox and Chromium.
|
||||||
|
|
||||||
Firejail also expands the restricted shell facility found in bash by adding
|
Firejail also expands the restricted shell facility found in bash by adding
|
||||||
Linux namespace support. It supports sandboxing specific users upon login.
|
Linux namespace support. It supports sandboxing specific users upon login.
|
||||||
|
|
||||||
%prep
|
%prep
|
||||||
@ -47,7 +47,7 @@ Linux namespace support. It supports sandboxing specific users upon login.
|
|||||||
make %{?_smp_mflags} VERBOSE=1
|
make %{?_smp_mflags} VERBOSE=1
|
||||||
|
|
||||||
%install
|
%install
|
||||||
make %{?_smp_mflags} DESTDIR=%{buildroot} install
|
%make_install
|
||||||
|
|
||||||
%post
|
%post
|
||||||
/sbin/ldconfig
|
/sbin/ldconfig
|
||||||
@ -59,7 +59,6 @@ make %{?_smp_mflags} DESTDIR=%{buildroot} install
|
|||||||
%postun -p /sbin/ldconfig
|
%postun -p /sbin/ldconfig
|
||||||
|
|
||||||
%files
|
%files
|
||||||
%defattr(-,root,root)
|
|
||||||
%verify(not user group mode) %{_bindir}/firejail
|
%verify(not user group mode) %{_bindir}/firejail
|
||||||
%{_bindir}/firecfg
|
%{_bindir}/firecfg
|
||||||
%{_bindir}/firemon
|
%{_bindir}/firemon
|
||||||
@ -70,6 +69,6 @@ make %{?_smp_mflags} DESTDIR=%{buildroot} install
|
|||||||
%{_mandir}/man5/*
|
%{_mandir}/man5/*
|
||||||
%dir %{_sysconfdir}/%{name}
|
%dir %{_sysconfdir}/%{name}
|
||||||
%config %{_sysconfdir}/%{name}/*
|
%config %{_sysconfdir}/%{name}/*
|
||||||
/etc/apparmor.d
|
%{_sysconfdir}/apparmor.d
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
Loading…
Reference in New Issue
Block a user