b32a343fff
* security bug reported by Austin Morton: Seccomp filters are copied into /run/firejail/mnt, and are writable within the jail. A malicious process can modify files from inside the jail. Processes that are later joined to the jail will not have seccomp filters applied. * memory-deny-write-execute now also blocks memfd_create * add private-cwd option to control working directory within jail * blocking system D-Bus socket with --nodbus * bringing back Centos 6 support * drop support for flatpak/snap packages * new profiles: crow, nyx, mypaint, celluoid, nano, transgui, mpdris2 * new profiles: sysprof, simplescreenrecorder, geekbench, xfce4-mixer * new profiles: pavucontrol, d-feet, seahorse, secret-tool, gnome-keyring * new profiles: regextester, hardinfo, gnome-system-log, gnome-nettool * new profiles: netactview, redshift, devhelp, assogiate, subdownloader * new profiles: font-manager, exfalso, gconf-editor, dconf-editor * new profiles: sysprof-cli, seahorse-tool, secret-tool, dconf, gsettings * new profiles: code-oss, pragha, Maelstrom, ostrichriders, bzflag * new profiles: freeciv, lincity-ng, megaglest, openttd, crawl, crawl-tiles * new profiles: teeworlds, torcs, tremulous, warsow, lugaru, manaplus * new profiles: pioneer, scorched3d, widelands, freemind, kid3, kid3-qt * new profiles: kid3-cli, nomacs, freecol, opencity, openclonk, slashem * new profiles: vultureseye, vulturesclaw, anki, cheese, utox, mp3splt * new profiles: oggsplt, flacsplt, gramps, newsboat, freeoffice-planmaker * new profiles: autokey-gtk, autokey-qt, autokey-run, autokey-shell * new profiles: freeoffice-presentations, freeoffice-textmaker, mp3wrap * new profiles: inkview, meteo-qt, mp3splt-gtk, ktouch, yelp, cantata OBS-URL: https://build.opensuse.org/package/show/Virtualization/firejail?expand=0&rev=18
83 lines
2.6 KiB
RPMSpec
83 lines
2.6 KiB
RPMSpec
#
|
|
# spec file for package firejail
|
|
#
|
|
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
|
|
#
|
|
# All modifications and additions to the file contributed by third parties
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
# upon. The license for this file, and modifications and additions to the
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
# license for the pristine package is not an Open Source License, in which
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
# published by the Open Source Initiative.
|
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
|
#
|
|
|
|
|
|
Name: firejail
|
|
Version: 0.9.60
|
|
Release: 0
|
|
Summary: Linux namepaces sandbox program
|
|
License: GPL-2.0-only
|
|
Group: Productivity/Security
|
|
Url: https://firejail.wordpress.com/
|
|
Source0: http://downloads.sourceforge.net/%{name}/%{name}-%{version}.tar.xz
|
|
Source1: http://downloads.sourceforge.net/%{name}/%{name}-%{version}.tar.xz.asc
|
|
BuildRequires: fdupes
|
|
BuildRequires: gcc-c++
|
|
BuildRequires: libapparmor-devel
|
|
Requires(pre): shadow
|
|
PreReq: permissions
|
|
|
|
%description
|
|
Firejail is a SUID sandbox program that reduces the risk of security
|
|
breaches by restricting the running environment of untrusted applications
|
|
using Linux namespaces and seccomp-bpf. It includes sandbox profiles for
|
|
many existing applications like Iceweasel/Mozilla Firefox and Chromium.
|
|
|
|
Firejail also expands the restricted shell facility found in bash by adding
|
|
Linux namespace support. It supports sandboxing specific users upon login.
|
|
|
|
%prep
|
|
%setup -q
|
|
sed -i '1s/^#!\/usr\/bin\/env /#!\/usr\/bin\//' contrib/fj-mkdeb.py contrib/fjclip.py contrib/fjdisplay.py contrib/fjresize.py
|
|
|
|
%build
|
|
%configure --docdir=%{_docdir}/%{name} \
|
|
--enable-apparmor
|
|
make %{?_smp_mflags} VERBOSE=1
|
|
|
|
%pre
|
|
getent group firejail >/dev/null || groupadd -r firejail
|
|
exit 0
|
|
|
|
%install
|
|
%make_install
|
|
%fdupes -s %{buildroot}
|
|
|
|
%post
|
|
%set_permissions %{_bindir}/firejail
|
|
|
|
%verifyscript
|
|
%verify_permissions -e %{_bindir}/firejail
|
|
|
|
%files
|
|
%attr(4750,root,firejail) %verify(not user group mode) %{_bindir}/firejail
|
|
%{_bindir}/firecfg
|
|
%{_bindir}/firemon
|
|
%{_datadir}/bash-completion
|
|
%{_libdir}/%{name}
|
|
%doc %{_docdir}/%{name}
|
|
%{_mandir}/man1/*
|
|
%{_mandir}/man5/*
|
|
%dir %{_sysconfdir}/%{name}
|
|
%config %{_sysconfdir}/%{name}/*
|
|
%config %{_sysconfdir}/apparmor.d/firejail-default
|
|
%config %{_sysconfdir}/apparmor.d/local/firejail-local
|
|
%dir %{_sysconfdir}/apparmor.d
|
|
%dir %{_sysconfdir}/apparmor.d/local
|
|
|
|
%changelog
|