forked from pool/usbguard
4a3b892fb1
27 Commits
Author | SHA256 | Message | Date | |
---|---|---|---|---|
Robert Frohl
|
8668e38fa0 |
Accepting request 1179062 from home:rfrohl:branches:hardware
usbguard 1.1.3 OBS-URL: https://build.opensuse.org/request/show/1179062 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=54 |
||
5aca8e45f3 |
Accepting request 1148255 from home:dimstar:rpm4.20:u
Prepare for RPM 4.20 OBS-URL: https://build.opensuse.org/request/show/1148255 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=52 |
|||
Robert Frohl
|
c1f7454901 |
add reference to changes
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=50 |
||
Robert Frohl
|
0b0f97bb14 |
Accepting request 1074918 from home:rfrohl:branches:hardware
fix build failure with gcc13 OBS-URL: https://build.opensuse.org/request/show/1074918 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=48 |
||
Robert Frohl
|
688674e16b |
Accepting request 1001230 from home:rfrohl:branches:hardware
update usbguard to 1.1.2 OBS-URL: https://build.opensuse.org/request/show/1001230 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=46 |
||
8bb169538d |
Accepting request 967012 from home:dimstar:Factory
- When running autoreconf, do it complete so that it does not trip over different versions of libtool being used. OBS-URL: https://build.opensuse.org/request/show/967012 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=44 |
|||
Robert Frohl
|
73e354530b |
add aduit bug to changes
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=42 |
||
Robert Frohl
|
b803948d8d |
Accepting request 962187 from home:rfrohl:branches:hardware
usbguard 1.1.1 OBS-URL: https://build.opensuse.org/request/show/962187 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=41 |
||
Robert Frohl
|
68467d6ec2 |
Accepting request 958318 from home:rfrohl:branches:hardware
usbguard: enable dbus OBS-URL: https://build.opensuse.org/request/show/958318 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=40 |
||
Robert Frohl
|
437c1f575c |
Accepting request 957563 from home:rfrohl:branches:hardware
usbguard: fix build with older gcc versions OBS-URL: https://build.opensuse.org/request/show/957563 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=38 |
||
Robert Frohl
|
cb107280be |
Accepting request 957398 from home:rfrohl:branches:hardware
update usbguard to 1.1.0 OBS-URL: https://build.opensuse.org/request/show/957398 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=37 |
||
Robert Frohl
|
f7a0bd3e33 |
Accepting request 910356 from home:rfrohl:branches:hardware
usbguard: move pid file from /var/run to /run OBS-URL: https://build.opensuse.org/request/show/910356 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=36 |
||
Robert Frohl
|
2455cd58a7 |
Accepting request 862951 from home:rfrohl:branches:hardware
update usbguard to 1.0.0 OBS-URL: https://build.opensuse.org/request/show/862951 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=34 |
||
Robert Frohl
|
689d34a151 |
Accepting request 839195 from home:pgajdos:remove-aspell
- drop useless build dependency on aspell (aspell is going to be removed from tumbleweed) OBS-URL: https://build.opensuse.org/request/show/839195 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=32 |
||
Robert Frohl
|
c7b4289521 |
Accepting request 819798 from home:rfrohl:branches:hardware
workaround for deamon startup problem in leap 15.2 OBS-URL: https://build.opensuse.org/request/show/819798 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=30 |
||
Robert Frohl
|
5ca1e79f69 |
Accepting request 815239 from home:rfrohl:branches:hardware
update usbguard to verion 0.7.8 OBS-URL: https://build.opensuse.org/request/show/815239 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=28 |
||
Tomáš Chvátal
|
c66df247a5 |
Accepting request 768870 from home:StefanBruens:branches:devel:libraries:c_c++
- update to 0.7.6 + Added missing options in manpage usbguard-daemon(8) + Extended the functionality of allow/block/reject commands The command can handle rule as a param and not only its ID e.g. in case of allow, command will allow each device that matches provided rule + Added debug info for malformed descriptors + Changed default backend to uevent + Fixed handling of add uevents during scanning Now we are sure that the enumeration is completed before processing any uevent we are trying to avoid a race where the kernel is still enumerating the devices and send the uevent while the parent is being authorised + Silenced 'bind' and 'unbind' uevents - Remove PEGTL build dependency, the package already uses the bundled version, and there is hardly any reason to unbundle a template (header only) library. - Remove Qt5 build dependencies, Qt applet is a separate package. - Use pkgconfig(udev) instead of udev-devel to allow shortcut via udev-mini. - update to 0.7.5 - Added daemon configuration option HidePII - Added check to avoid conflict between ASAN and TSAN - Added daemon configuration option for authorized_default - Added devpath option to generate-policy - Added # line comments to the rule grammar - Added ImplicitPolicyTarget to get/set parameter methods - Added option to filter rules by label when listing - Added the label attribute to rule - Added PropertyParameterChanged signal - Added support for portX/connect_type attribute - Added temporary option to append-rule - Added versioning to DBus service - Added optional LDAP support - Fixed invalid return value in Rule::Attribute::setSolveEqualsOrdered - Fixed KeyValueParser to validate keys only when known names are set - Fixed uninitialized variables found by coverity - Fixes and cleanups based on LGTM.com report - Hardened systemd service - Rename ListRules parameter 'query' to 'label' - Skip empty lines in usbguard-rule-parser - The proof-of-concept Qt applet was removed. It is going to be maintained in a simplified form as a separate project. Removed: usbguard-applet-qt_desktop_menu_categories.patch Modified: usbguard-pthread.patch - Updated usbguard.keyring to add new gpg key for upstream: 5A2EC3932A983910 - link against libpthread to make it build (bsc#1141377) - added usbguard-pthread.patch - Run spec-cleaner - Add the missing systemd build requirement. - use upstream usbguard.service instead of hardcoded version (bsc#1120969) - Fix RPM groups. Avoid pointless shelling out to /bin/rm. - changed zsh completion location - added rpmlint for zero size rules.conf - added signature verification of tarball - add usbguard-0.7.4.tar.gz.sig - add usbguard.keyring - update to 0.7.4 - Changed Fixed conditional manual page generation & installation - update to 0.7.3 - Changed usbguard-daemon will now exit with an error if it fails to open a logging file or audit event file. Modified the present device enumeration algorithm to be more reliable. Enumeration timeouts won't cause usbguard-daemon process to exit anymore. - Added umockdev based device manager capable of simulating devices based on umockdev-record files. - update to 0.7.2 - Changed Fixed memory leaks in usbguard::Hash class. Fixed file descriptor leaks in usbguard::SysFSDevice class. Skip audit backend logging when no backend was set. - Added Added zsh completion & other scripts to the distribution tarball. - update to 0.7.1 - Added CLI: usbguard watch command now includes an -e <path> option to run an executable for every received event. Event data are passed to the executable via environment variables. usbguard-daemon: added "-K" option which can disable logging to console. Added zsh autocompletion support. usbguard-daemon: added "-f" option which enabled double-fork daemonization procedure. Added AuditBackend usbguard-daemon configuration option for selecting audit log backend. Linux Audit support via new LinuxAudit backend. Added missing RuleCondition.hpp header file to the public API headers. - Changed Qt Applet: disabled session management usbguard-daemon console logging output is enabled by default now. Previously, the -k option had to be passed to enable the output. Replaced --enable-maintainer-mode configure option with --enable-full-test-suite option. When the new option is not used during the configure phase, only a basic set of test is run during the make check phase. usbguard-daemon now opens configuration in read-only mode Fixed UEventDeviceManager to work with Linux Kernel >= 4.13 Refactored audit logging to support different audit log backends Made the configuration parser strict. Unknown directives and wrong syntax will cause an error. - Added usbguard-applet-qt package to allow easier user interaction - Added usbguard-applet-qt_desktop_menu_categories.patch to fix category - Updated usbguard-daemon.conf to upstream version - Removed obsolte patch usbguard-fixes.patch - Added rules.conf, fixing bsc#1071076 - updated to 0.7.0 - Added Added InsertedDevicePolicy configuration option to control the policy method for inserted devices. Added RestoreControllerDeviceState configuration option. Added DeviceManagerBackend configuration option. This option can be used to select from several device manager backend implementations. Implemented an uevent based device manager backend. Added setParameter, getParameter IPC (incl. D-Bus) methods. Added set-parameter, get-parameter CLI subcommands. Qt Applet: Added Spanish (es_AR) translation. Create empty rules.conf file at install time (make install). Support for numeric UID/GID values in IPCAllowedUsers and IPCAllowedGroups settings. If bash completion support is detected at configure time, install the bash completion script during make install. Added new configuration setting: IPCAccessControlFiles. IPC access is now configurable down to a section and privilege level per user and/or group. Added add-user, remove-user usbuard CLI subcommands for creating, removing IPC access control files. Added AuditFilePath configuration option for setting the location of the USBGuard audit events log file path. If set, the usbguard-daemon will log policy and device related actions and whether they succeeded or not. - Removed Removed UDev based device manager backend and UDev related dependencies. Removed UDev development files/API dependecy - Changed Reset Linux root hub bcdDevice value before updating device hash. This is a backwards incompatible change because it changes how the device hash is computed for Linux root hub devices. Refactored low-level USB device handling into SysFSDevice class which represents a device in the /sys filesystem (sysfs). Removed usage of readdir_r because it's obsolete. Replaced with readdir with the assumption that its usage is thread-safe if the directory handle passed to it is not shared between threads. Extended test suite with use case tests. Install the usbguard-daemon configuration and policy file with strict file permissions to prevent policy leaks. Fixed several memory leaks. Don't pre-resolve user and group names in IPCAllowedUsers and IPCAllowedGroups settings. Instead, resolve the name during the IPC authentication phase. - Updated to 0.6.2 Wait for disconnect in IPCClient dtor if needed Qt Applet: Fixed loading of decision method and default decision settings - Updated to 0.6.1 - Changed Refactored logging subsystem Fixed handling of IPC disconnect in the IPCClient class Qt Applet: Fixed handling of main window minimization and maximization Fixed building on architectures that don't provide required atomic operations. The libatomic emulation library will be used in such cases. Fixed several typos in the documentation - Added Implemented a simple internal logger Access to the logger via public API Improved logging coverage. Logging output can be enabled either via CLI options or by setting the USBGUARD_DEBUG environment variable to 1. Qt Applet: UI translation support. Qt Applet: Czech (cs_CZ) translation - Removed Removed spdlog dependency - .... ommitted changes from 0.5* series .. - split off a library package libusbguard0 - a daemon and framework and tools to guard against bad usb devices. OBS-URL: https://build.opensuse.org/request/show/768870 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=26 |
||
Robert Frohl
|
c37d0514e9 |
Accepting request 745119 from home:rfrohl:branches:hardware
update usbguard to 0.7.5 OBS-URL: https://build.opensuse.org/request/show/745119 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=25 |
||
6756f90bb2 |
- link against libpthread to make it build (bsc#1141377)
- added usbguard-pthread.patch OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=23 |
|||
Robert Frohl
|
86671b15a1 |
Accepting request 704757 from home:cgiboudeaux:branches:hardware
- Run spec-cleaner - Add the missing systemd build requirement. OBS-URL: https://build.opensuse.org/request/show/704757 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=14 |
||
4dcea42899 |
Accepting request 666303 from home:rfrohl:branches:hardware
use upstream usbguard.service instead of hardcoded version (bsc#1120969) OBS-URL: https://build.opensuse.org/request/show/666303 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=12 |
|||
Tomáš Chvátal
|
8560fbf779 |
Accepting request 647070 from home:jengelh:branches:hardware
- Fix RPM groups. Avoid pointless shelling out to /bin/rm. OBS-URL: https://build.opensuse.org/request/show/647070 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=10 |
||
7d16704a91 |
Accepting request 641402 from home:rfrohl:branches:hardware
Added bug reference OBS-URL: https://build.opensuse.org/request/show/641402 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=8 |
|||
Ismail Dönmez
|
4f98c80325 |
Accepting request 640778 from home:rfrohl:branches:hardware
- Update to 0.7.4 - Updated build dependencies for new version - Added signature verification of tarball - Added usbguard-applet-qt package to allow easier user interaction - Added usbguard-applet-qt_desktop_menu_categories.patch to fix category - Updated usbguard-daemon.conf to upstream version - Removed obsolte patch usbguard-fixes.patch - Added rpmlint for zero size rules.conf old: hardware/usbguard new: home:rfrohl:branches:hardware/usbguard rev None Index: usbguard-daemon.conf =================================================================== --- usbguard-daemon.conf (revision 5) +++ usbguard-daemon.conf (revision 5) @@ -34,7 +34,7 @@ # * apply-policy - evaluate the ruleset for every present # device # -PresentDevicePolicy=keep +PresentDevicePolicy=apply-policy # # Present controller policy. @@ -49,7 +49,49 @@ # * apply-policy - evaluate the ruleset for every present # device # -PresentControllerPolicy=allow +PresentControllerPolicy=keep + +# +# Inserted device policy. +# +# How to treat USB devices that are already connected +# *after* the daemon starts. One of: +# +# * block - deauthorize every present device +# * reject - remove every present device +# * apply-policy - evaluate the ruleset for every present +# device +# +InsertedDevicePolicy=apply-policy + +# +# Restore controller device state. +# +# The USBGuard daemon modifies some attributes of controller +# devices like the default authorization state of new child device +# instances. Using this setting, you can controll whether the +# daemon will try to restore the attribute values to the state +# before modificaton on shutdown. +# +# SECURITY CONSIDERATIONS: If set to true, the USB authorization +# policy could be bypassed by performing some sort of attack on the +# daemon (via a local exploit or via a USB device) to make it shutdown +# and restore to the operating-system default state (known to be permissive). +# +RestoreControllerDeviceState=false + +# +# Device manager backend +# +# Which device manager backend implementation to use. One of: +# +# * uevent - Netlink based implementation which uses sysfs to scan for present +# devices and an uevent netlink socket for receiving USB device +# related events. +# * umockdev - umockdev based device manager capable of simulating devices based +# on umockdev-record files. Useful for testing. +# +DeviceManagerBackend=uevent #!!! WARNING: It's good practice to set at least one of the !!! #!!! two options bellow. If none of them are set, !!! @@ -65,6 +107,7 @@ # # IPCAllowedUsers=username1 username2 ... # +IPCAllowedUsers=root # # Groups allowed to use the IPC interface. @@ -74,4 +117,57 @@ # # IPCAllowedGroups=groupname1 groupname2 ... # -IPCAllowedGroups=wheel +IPCAllowedGroups= + +# +# IPC access control definition files path. +# +# The files at this location will be interpreted by the daemon +# as access control definition files. The (base)name of a file +# should be in the form: +# +# [user][:<group>] +# +# and should contain lines in the form: +# +# <section>=[privilege] ... +# +# This way each file defines who is able to connect to the IPC +# bus and what privileges he has. +# +IPCAccessControlFiles=/etc/usbguard/IPCAccessControl.d/ + +# +# Generate device specific rules including the "via-port" +# attribute. +# +# This option modifies the behavior of the allowDevice +# action. When instructed to generate a permanent rule, +# the action can generate a port specific rule. Because +# some systems have unstable port numbering, the generated +# rule might not match the device after rebooting the system. +# +# If set to false, the generated rule will still contain +# the "parent-hash" attribute which also defines an association +# to the parent device. See usbguard-rules.conf(5) for more +# details. +# +DeviceRulesWithPort=false + +# +# USBGuard Audit events log backend +# +# One of: +# +# * FileAudit - Log audit events into a file specified by +# AuditFilePath setting (see below) +# * LinuxAudit - Log audit events using the Linux Audit +# subsystem (using audit_log_user_message) +# +AuditBackend=FileAudit + +# +# USBGuard audit events log file path. +# +AuditFilePath=/var/log/usbguard/usbguard-audit.log + Index: usbguard.changes =================================================================== --- usbguard.changes (revision 5) +++ usbguard.changes (revision 5) @@ -1,4 +1,67 @@ ------------------------------------------------------------------- +Tue Oct 9 09:48:44 UTC 2018 - Robert Frohl <rfrohl@suse.com> + +- changed zsh completion location +- added rpmlint for zero size rules.conf + +------------------------------------------------------------------- +Tue Oct 9 08:05:02 UTC 2018 - Robert Frohl <rfrohl@suse.com> + +- added signature verification of tarball + - add usbguard-0.7.4.tar.gz.sig + - add usbguard.keyring + +------------------------------------------------------------------- +Mon Oct 8 14:19:55 UTC 2018 - Robert Frohl <rfrohl@suse.com> + +- update to 0.7.4 + - Changed + Fixed conditional manual page generation & installation + +- update to 0.7.3 + - Changed + usbguard-daemon will now exit with an error if it fails to open a logging file or audit event file. + Modified the present device enumeration algorithm to be more reliable. Enumeration timeouts won't cause usbguard-daemon process to exit anymore. + + - Added + umockdev based device manager capable of simulating devices based on umockdev-record files. + +- update to 0.7.2 + - Changed + Fixed memory leaks in usbguard::Hash class. + Fixed file descriptor leaks in usbguard::SysFSDevice class. + Skip audit backend logging when no backend was set. + + - Added + Added zsh completion & other scripts to the distribution tarball. + +- update to 0.7.1 + - Added + CLI: usbguard watch command now includes an -e <path> option to run an executable for every received event. Event data are passed to the executable via environment variables. + usbguard-daemon: added "-K" option which can disable logging to console. + Added zsh autocompletion support. + usbguard-daemon: added "-f" option which enabled double-fork daemonization procedure. + Added AuditBackend usbguard-daemon configuration option for selecting audit log backend. + Linux Audit support via new LinuxAudit backend. + Added missing RuleCondition.hpp header file to the public API headers. + + - Changed + Qt Applet: disabled session management + usbguard-daemon console logging output is enabled by default now. Previously, the -k option had to be passed to enable the output. + Replaced --enable-maintainer-mode configure option with --enable-full-test-suite option. When the new option is not used during the configure phase, only a basic set of test is run during the make check phase. + usbguard-daemon now opens configuration in read-only mode + Fixed UEventDeviceManager to work with Linux Kernel >= 4.13 + Refactored audit logging to support different audit log backends + Made the configuration parser strict. Unknown directives and wrong syntax will cause an error. + + +- Added usbguard-applet-qt package to allow easier user interaction +- Added usbguard-applet-qt_desktop_menu_categories.patch to fix category +- Updated usbguard-daemon.conf to upstream version +- Removed obsolte patch usbguard-fixes.patch + + +------------------------------------------------------------------- Wed Sep 6 10:48:23 UTC 2017 - meissner@suse.com - updated to 0.7.0 @@ -34,7 +97,7 @@ Don't pre-resolve user and group names in IPCAllowedUsers and IPCAllowedGroups settings. Instead, resolve the name during the IPC authentication phase. - Updated to 0.6.2 - + Wait for disconnect in IPCClient dtor if needed Qt Applet: Fixed loading of decision method and default decision settings Index: usbguard.spec =================================================================== --- usbguard.spec (revision 5) +++ usbguard.spec (revision 5) @@ -1,7 +1,7 @@ # # spec file for package usbguard # -# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -12,7 +12,7 @@ # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. -# Please submit bugfixes or comments via http://bugs.opensuse.org/ +# Please submit bugfixes or comments via https://bugs.opensuse.org/ # @@ -21,34 +21,47 @@ %define lname libusbguard0 Name: usbguard -Version: 0.6.2 +Version: 0.7.4 Release: 0 Summary: A tool for implementing USB device usage policy ## Not installed # src/ThirdParty/Catch: Boost Software License - Version 1.0 -License: GPL-2.0+ -Group: System Environment/Daemons -Url: https://dkopecek.github.io/usbguard -Source0: https://github.com/dkopecek/usbguard/archive/usbguard-%{version}.tar.gz -Source1: usbguard-daemon.conf -Source2: usbguard.service -Patch0: usbguard-fixes.patch +License: GPL-2.0-or-later +Group: System/Daemons +URL: https://usbguard.github.io +Source0: https://github.com/USBGuard/usbguard/releases/download/usbguard-%{version}/usbguard-%{version}.tar.gz +Source1: https://github.com/USBGuard/usbguard/releases/download/usbguard-%{version}/usbguard-%{version}.tar.gz.sig +Source2: usbguard.keyring +Source3: usbguard-daemon.conf +Source4: usbguard.service +Source5: usbguard-rpmlintrc +Patch0: usbguard-applet-qt_desktop_menu_categories.patch %{?systemd_requires} +BuildRequires: asciidoc +BuildRequires: aspell +BuildRequires: audit-devel +BuildRequires: autoconf +BuildRequires: automake +BuildRequires: bash-completion-devel +BuildRequires: dbus-1-glib-devel BuildRequires: gcc-c++ -BuildRequires: autoconf automake libtool +BuildRequires: hicolor-icon-theme +BuildRequires: libQt5Widgets-devel BuildRequires: libcap-ng-devel -BuildRequires: pegtl-devel -BuildRequires: dbus-1-glib-devel -BuildRequires: libxml2-devel -BuildRequires: libxslt-devel -BuildRequires: polkit-devel BuildRequires: libqb-devel -BuildRequires: libudev-devel +BuildRequires: libqt5-linguist-devel +BuildRequires: libqt5-qtsvg-devel BuildRequires: libseccomp-devel BuildRequires: libsodium-devel +BuildRequires: libtool +BuildRequires: libudev-devel +BuildRequires: libxml2-devel +BuildRequires: libxslt-devel +BuildRequires: pegtl-devel +BuildRequires: polkit-devel #BuildRequires: spdlog-static -BuildRequires: protobuf-devel +BuildRequires: protobuf-devel %description The USBGuard software framework helps to protect your computer against rogue USB @@ -57,7 +70,7 @@ %package -n %lname Summary: Library for implementing USB device usage policy -Group: System Environment/Daemons +Group: System/Daemons %description -n %lname The USBGuard software framework helps to protect your computer against rogue USB @@ -66,7 +79,7 @@ %package devel Summary: Development files for %{name} -Group: Development/Libraries +Group: Development/Libraries/C and C++ Requires: %lname = %{version} Requires: %{name} = %{version} Requires: libstdc++-devel @@ -78,18 +91,28 @@ %package tools Summary: USBGuard Tools -Group: Applications/System +Group: System/Management Requires: %{name} = %{version}-%{release} %description tools The %{name}-tools package contains optional tools from the USBGuard software framework. +%package applet-qt +Summary: USBGuard Qt 5.x Applet +Group: System/Management +Requires: %{name} = %{version}-%{release} +Obsoletes: usbguard-applet-qt <= 0.3 + +%description applet-qt +The %{name}-applet-qt package contains an optional Qt 5.x desktop applet +for interacting with the USBGuard daemon component. + %prep -%setup -q -n usbguard-usbguard-%version +%setup -q -n usbguard-%version %patch0 -p1 # Remove bundled library sources before build -#rm -rf src/ThirdParty/{json,spdlog} +#rm -rf src/ThirdParty/{Catch,PEGTL} %build mkdir -p ./m4 @@ -97,9 +120,10 @@ %configure \ --disable-silent-rules \ - --with-bundled-json \ - --with-bundled-spdlog \ --with-bundled-catch \ + --with-bundled-pegtl \ + --enable-systemd \ + --with-gui-qt=qt5 \ --without-dbus \ --disable-static @@ -116,14 +140,18 @@ # Install configuration mkdir -p %{buildroot}%{_sysconfdir}/usbguard -install -p -m 644 %{SOURCE1} %{buildroot}%{_sysconfdir}/usbguard/usbguard-daemon.conf +install -p -m 600 %{SOURCE3} %{buildroot}%{_sysconfdir}/usbguard/usbguard-daemon.conf # Install systemd unit mkdir -p %{buildroot}%{_unitdir} -install -p -m 644 %{SOURCE2} %{buildroot}%{_unitdir}/usbguard.service +install -p -m 644 %{SOURCE4} %{buildroot}%{_unitdir}/usbguard.service + +# zsh completion, currently needs manual intervention +mkdir -p %{buildroot}%{_datadir}/zsh/site-functions/ +install -p -m 644 scripts/usbguard-zsh-completion %{buildroot}%{_datadir}/zsh/site-functions/_usbguard # Cleanup -find %{buildroot} -name '*.la' -delete +find %{buildroot} \( -name '*.la' -o -name '*.a' \) -exec rm -f {} ';' %preun %service_del_preun usbguard.service @@ -142,22 +170,23 @@ %files %defattr(-,root,root,-) -%doc README.md +%doc README.adoc CHANGELOG.md %license LICENSE %{_sbindir}/usbguard-daemon +%dir %{_localstatedir}/log/usbguard %dir %{_sysconfdir}/usbguard %{_sbindir}/rcusbguard -%config(noreplace) %{_sysconfdir}/usbguard/usbguard-daemon.conf +%dir %{_sysconfdir}/usbguard/IPCAccessControl.d +%config(noreplace) %attr(0600,-,-) %{_sysconfdir}/usbguard/usbguard-daemon.conf +%config(noreplace) %attr(0600,-,-) %{_sysconfdir}/usbguard/rules.conf %{_unitdir}/usbguard.service %{_datadir}/man/man8/usbguard-daemon.8.gz -%{_datadir}/man/man8/usbguard-dbus.8.gz %{_datadir}/man/man5/usbguard-daemon.conf.5.gz %{_datadir}/man/man5/usbguard-rules.conf.5.gz -#{_sbindir}/usbguard-dbus -#/usr/share/dbus-1/system-services/org.usbguard.service -#dir /usr/share/dbus-1/system.d -#/usr/share/dbus-1/system.d/org.usbguard.conf -#/usr/share/polkit-1/actions/org.usbguard.policy +%{_datadir}/bash-completion/completions/usbguard +%dir %{_datadir}/zsh +%dir %{_datadir}/zsh/site-functions +%{_datadir}/zsh/site-functions/_usbguard %files -n %lname %defattr(-,root,root,-) @@ -176,4 +205,14 @@ %{_bindir}/usbguard-rule-parser %{_datadir}/man/man1/usbguard.1.gz +%files applet-qt +%defattr(-,root,root,-) +%{_bindir}/usbguard-applet-qt +%{_mandir}/man1/usbguard-applet-qt.1.gz +%{_datadir}/applications/usbguard-applet-qt.desktop +%dir %{_datadir}/icons/hicolor +%dir %{_datadir}/icons/hicolor/scalable +%dir %{_datadir}/icons/hicolor/scalable/apps +%{_datadir}/icons/hicolor/scalable/apps/usbguard-icon.svg + %changelog Index: usbguard-0.7.4.tar.gz =================================================================== Binary file usbguard-0.7.4.tar.gz (revision 5) added Index: usbguard-0.7.4.tar.gz.sig =================================================================== --- usbguard-0.7.4.tar.gz.sig (added) +++ usbguard-0.7.4.tar.gz.sig (revision 5) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2 + +iQIcBAABCAAGBQJbRtwMAAoJEDKid+oJFNJMdvkQANXmEUzCVnFkeEvQZfgFVhYv +thHufD5G8b01GkJGBYICjl7IdYTmdKaGkuHoNer3SZee8WHjtK3WukxCgJ4q7p9d +teSQw+U8NEyZOrM25dc+FkI1bj+qYf1v1hh8AKDCWU+bR9J+5EDKNtsL/M84hvXO +zv44JTH2CsWiM97/dt1pWJbPzCJV+PB4o4nEX2Q1NMh0fv3vlebiX4Sv9vTo7oWi +tl8cnm2m9jR9wsQS9I1+WHo+iGChCnf64mLohF7RQy1mYysXDkHBVBd56qHSpTXy +KGFj3TFmRUNXSW2FBK6d5ZwDtHjwz4Ram53KBknw2NpOk1mV0h26LxA/7TzzwFNN +sdhhpPc63bE3otqL8Uz5ldeyO+rtPQj8orb8euss5vtWi1uZ/UTPQJlaAd0rm33O +v9sw4wAr3u8m8brCE2b1RVtzVaCYvWnIjo7SPcNxNKD/2J4u2TirvFGNx+7SQIAl ++J9oS+Gc6Zmv2rtWb8Ayjy/0HXpiIiADsgaBpx92DbJL5cpd8IbGEN1s2sfb389T +/nzLkdJeFmk0PGRgv+wtc4fFA6AlZSZ0+fZSbz/ubbsoA/6Fhvgu9lVems8LAUtK +87tgvoZbbG7BKCO1FN/6t5pwvU0psWEbzUd5eu7ifIy2Zp9SNPS5Qis7bIA7k+A3 +GlKLLSAVUrp1mM4WIFsa +=chtE +-----END PGP SIGNATURE----- Index: usbguard-applet-qt_desktop_menu_categories.patch =================================================================== --- usbguard-applet-qt_desktop_menu_categories.patch (added) +++ usbguard-applet-qt_desktop_menu_categories.patch (revision 5) @@ -0,0 +1,12 @@ +Index: usbguard-0.7.4/src/GUI.Qt/usbguard-applet-qt.desktop.in +=================================================================== +--- usbguard-0.7.4.orig/src/GUI.Qt/usbguard-applet-qt.desktop.in ++++ usbguard-0.7.4/src/GUI.Qt/usbguard-applet-qt.desktop.in +@@ -6,6 +6,6 @@ Comment=USBGuard Qt Applet + TryExec=usbguard-applet-qt + Exec=usbguard-applet-qt + Icon=usbguard-icon +-Categories=System; ++Categories=System;Security; + Keywords=USB;USBGuard;Applet;Qt; + X-Desktop-File-Install-Version=@VERSION@ Index: usbguard-rpmlintrc =================================================================== --- usbguard-rpmlintrc (added) +++ usbguard-rpmlintrc (revision 5) @@ -0,0 +1,2 @@ +# usbguard ships zero length rules.conf by default +addFilter("zero-length /etc/usbguard/rules.conf") Index: usbguard.keyring =================================================================== --- usbguard.keyring (added) +++ usbguard.keyring (revision 5) @@ -0,0 +1,187 @@ +-----BEGIN PGP PUBLIC KEY BLOCK----- + +mQINBFl1/A8BEACeJdXstYB0gOj2LdvIL/wwusjCc/TwEs295Hqgq8qhN78Z4LXS +HHO2r3VAQWMQN/0hmNb5MacrSjWMfv1wgTfAnRuEiV1UvgM9p5wEYYUc/Oy31vxb +ZVUmyLyiFOwnL6pPP9rK3Z/LXP1gZmKAV0GmHL1c8Va1ZvTDJk9cIx565k0cDvnb +RAI6mWnD1EXiwfh6ygkruOZ406kQ4CEQvKVM6mTd0eFuzU9C0SQUI5SZiXsuKY4D +8eB9W/exKP2+02cbu8qjyginJhRTQUzNrVH0MUkV4r+s0LIGxCN/GTp6riI8svlR +oSKt+7ISGbm5Srxy/KBsebkVGWpm9eiyQMYExOqmhfAwAdvw4r7BkAL/CCuX7f4u +dHoJIqSCaXyY8lXEvDq8eLEm0Ty2ntfB1bWT+kfd2bEzQcKQXFporGh9VWyuAPs4 +G1nNvZjM1VgkLRrDyLYrTdt+MizAnjqc5ZzBEqLVfYHU1pfgYPuAtSIqkCh0JnVH +J1JLxGjTx2AideeW1CKC6gCoIL55+/JrK7dKR5P/j5s+Kk8pOrOkQkkLvMf//PrF +lqBj1CYKrGsqccg0SeCwFIr3nCofji1W+vyZRbAxWz0c/Rev1eJc2k9rUOh61a64 +mXfZnUuh2pGP5gB1hHkmlvY2+S/CUs7HB8bV5NPme7b5JMwcYrRIrHSDxQARAQAB +tCNEYW5pZWwgS29wZcSNZWsgPGRuazE2MThAZ21haWwuY29tPokBMwQQAQgAHRYh +BB/mNI7eqCWiKXDlxI3TBA8SPMP0BQJbcLU5AAoJEI3TBA8SPMP0TUsIALHp7c6W +MznqWzWyHQiKGJxYH2iaKwoBXUQzurscocR7fRZaJTdXcrAjw+YiKwdLVyQEqZIn +eCujPIQIt1hxVro1Jq32kYIvPlQWSz8yykQVL/TExIDyVueLU1A6JnNBQLvP2XDV +sM8BJc8rtoWC/1wc2Vps6f8QS0oE0G/ocZ1uV0Gj0XEH8zJ+0m/K0uw9YnX5XgTY +qeiFgz4nUqRxfxfRY494eQS0OzBp7j2iiQMnmw4YMgU+DiURvYuTHVpBHVMlnhHr +jU5JpIiTw6VnJgeLKC9+aWabmaxdOS3Gq5D+fVarZXMYBttWB5kncvfMIBSVUwZy +WKlSo3MyrrLo8OCJATMEEAEIAB0WIQRswFHTwdmkr54mDFjT45SsdE4uuwUCW3ha +DQAKCRDT45SsdE4uu8fUB/0VZxBevmc4jetXxFh2+9cmtXOYLuhUjQa2/OwRmEO6 +INVYzgkcm/BCNCQ8aYUEcyof/LJHH6nsVMLHs83STjAlkHUVjmJfMz8mm2szIuhH +UGWaTbE+cCdAA+dJA2qqhObL1Q9ZDkcIF2H+4Wc5RJFPqif7wN2TzivLdMuckO1p +fQV8TWBODc4K+GW3jwKmhL+/UZ8LNfERSPI6D14AQ+2qnkAB3zPEL0gRpzzmv2EU +ZZBxNvDMbK/EGaJfiJxI737QA8P0I9Igy905Zd8am9IxbPt/M2g1CrR5ateVxjTG +a5Mc18gW1RhCfXo21k1YvDZLIQR6m9vVcRHwz51Pq8GPiQEzBBABCAAdFiEE9n59 +boAPJA6D68hn/2rJpkZN8JwFAlr5kDwACgkQ/2rJpkZN8Jyv7Qf/bXBBoU2i911p +vEDNx1p0GB3SRa+JUhXpzSJHkM7O4a1PmPRaEBiX5fy4pNwWeJ4V6s1dwK8GDUTm +C+FZZCj42OlbxaiZ+nYkKKmOUpP5S1oqPGjCwmJ03MYqoV2i7Ht7Dh9XCxyLQiKf +pynlKRpnUaUNyWKVdCQHkH1bIrKhVRhGqLpQ748OnOdCdTVfrzTEZA/NzFEMaFIe +tLOR75pWKvsxd/qu1P6IGHdaI2SF1Bry7EnZoUSXjfnmaYo/mblx15ZsRH3tzIbR +TWJUm88UJJMNiDN0dZ3V3fyyX/cbWP39HrdAJLcrl9yKj/hskp0J4POfECickdHv +C5YhwzEuO4kCVAQTAQoAPhYhBEMMGSiWAVfMRfob66oGEgUwrgRmBQJZdfwPAhsD +BQkJZgGABQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEKoGEgUwrgRme8EP/jX8 +4SGkTJHHyn9b+ay1fs8WM1GvCYt1PayGc1FaZmERzS2VMpmCMZyN/d3MFmxL+MZs +wXi0z8Y4r+pai2SIeSshDafLY7C6H3O5vbzQ9UxY/Id5LO/iZBokBbvFH+PS9EUK +7VLDZX96NZvKGbwDGDSGueKqVSbbzaxjM/+vgBKtKL/9h/uECsdqhE4MEF0IpMZb ++zz9aRsk3t1jLIVObI/zsW27yI19taEUHeVLGDCTVhHGa/Dc4iyXtAEn0EzMg0ID +XrAEg3z3L3wMkp6Rqd1GGVlHP10ASj7tro+7CJUYIiuHkgGPtUhNZZE9A1mv56UM +vWNE6lqrlDYYkeIfJT7u4inj3fLfNG74kwFuZ9sR0FLO1VoTQ5vY5OzW9qXltsiz +eljWSLCxXn8Ie93+5lZPDynzWNoLo4OjvE8jS1cjrN+rLAxE9yrSRR0pEfErGwZk +J4EAe812BG5/Kj4EvYCUTiWlRlh6gI7hTFannlciPSnenCzejNNfeFVEgP2Ig8Hw +5D26yoSi5+Ffs1P02uyWtO2cF/BKQF8TJ8ZI52kNgulEdAE6AZc+UQei7D515VNi +tbZ4XCJfo7T4AnSjXulwa++LVDJhU9QHxzz5h0lv7B+Lfe2Sz51qhCqfG1CNkxdg +yr6fy8FHeFCFeW2OgBcKuFbZ4oo/O0PX7uYXLCuouQINBFl1/A8BEAC33oSJW+/m +6iDZ7UJTCGkihCUU0FNqvP20v4o7fraH5u6zaJJ8kDYOXW4C+2PcJJpaSOV+prmZ +zm00g4Qh0k1YpR4vUH+g9AfFvtj5znA/wnb1MyA/8yVkzTcfR/+kLFyUWMfn0E7O +skp1kMY63roiL+9YKhOP9a75+E85RX6trkrbJ8oatGs+oxbXCzcmfTGSkn2CQN8f +SVpA1UjNgn+fy/Uc5LTPfLZCPzzXtmLg5jnhQCQy2OG+EqFWRxanPhfS3J61/q2i +uXNLaqaMDS9pgM9Sv9YK1/S1uxv5BfOpde3AA+oeFs3V6AZHPPaKafPute7s488O +xDMlPeLs+293W2KBC9SuAKT4t8TiJNsn5plj53bZVozKJEGCOw3lwg753F+15J8U +jQl8PGAs9z7h9Ub1cfbHMTT6ogiLNRjoexCa5yRGWeR0KnETXQRyyuQBG8SjbmJE +9AVaYXvYq1ypohkwYDM3v/2GaXuaSrC3JypaUmCcFwv9LlfspSzDJHB3v/wsEkUx +ehSuM/Q5dgPuRxBQIDW91cdyHulXoCsGcbmnihaZgEKIZ4O17G1sNpdnUKKkVO/2 +BMgzqnEMNY7p2Y3lZaz6wzp+owuWlStn68umyLhUMnwzdJMCcfe1jRlfwnxHa1YX +QmjWfMX5kNencyiuWOOLVX2MFYuG9wlxdwARAQABiQI8BBgBCgAmFiEEQwwZKJYB +V8xF+hvrqgYSBTCuBGYFAll1/A8CGwwFCQlmAYAACgkQqgYSBTCuBGb8Ag//RiMs +Tt1IB3BDUHzT82MbJtUrPVrhl4jZmrcUl/r4G/XTU5S2JCoNzYsDmuvtHftuewzu +gAwiXvRDZHivKZowXEd4yNcxLEqIWD4Rrbiw/mvoMSTLDnPt4rOBFzbZ30FNg2l8 +Njm3kcpnBtTHAb+0ZfiH4DZPn0XOvY9qOLLZhqvM62hM3uiQHjSmgr2i2KOADka/ +Zj/jZV4N0aBEYyD+234bOn/AjGae7QZFMTDA8AediDy4fFw/tBDFQPKsvxME8KF7 +huQSvWD6xyFrNUfOVpofsWzMglyD/Cht6TZMrnrbaerSNHoNC3byiMgfRWBknxOK +iZXp542tz2SGjf6Gq2prxYmMTpCNAifDamOO5HfQDv9DmHu2eIoDoUTeB1Ywu0Ns +liviMlIU86s47RclPX2jp7gURR+vdTzP5PKNCMFCt2/odlnZmbHgG/h7sFvStUMa +upbNmJDs6D7b6Z4EfPtDl4K3KnNAkfHpWRRoDxO6qpt77Gc4uoHyZWRDKxZKU8NO +JIFfC4wyxKV9Nz6an7r+NtUAANB355cxS51fXSP6ceNWpcSXpqmI79PYRhAVQmKh +ZdrIU6qtFM4BTqsPUL3gHTMMakf1oEshx0dDbiQutlAD9HvG1MOd9WFD6s1MLG6U +LmhEkzyMPxMr78Qz6fSV6kQkC6sLpQbC2gv0x4S5Ag0EWXX8pAEQAN49KL6jWwod +Z8QfYWXKdu6nj61WghQYHrmFURI0LagyJF2wI8YDODaTo7+ERB4rJD5SKilk3KoG +OwvrP4AsYK+Y1p5G2f3LgAjSsZhU+RgmxO6TdqQr5ySNChXw7n0jC1qFiT1O30dw +BLrg6KvhJEdxRCxmnwKYd6O0cwffuh3oto/u/E+ByhHE6cRwK9+srrfryH1qWVIf +HgnM0Ii9/SLPmiqsOfEn+gpNrpSgJtj4ll0M1GO8qWuEWGyuH7eIctmrJuCzjIrv +rCETKBbfi76fQawIdHyGQGjLznV9d5iKiaYQJlPRz+8Q+01QidxRlOsIHLM7kj/H +VJTQZhfxpQfRhmno28GIioVSFtaaFjANqp/IW+vQDxQzIBfoWmCRdzJe/uqZEmNF +fZYX3e61BmAgMVorXDASrZrQLyN6ZdYXhxoz3JzUu72CThoC6Am91Ash4NDEazFh +C6Uw7QRb+s4un22ric8EFF6ytsx0RjsdQhlpgiQPAUMK7ixZrzSzOkxgCPhPDy8R +/g2//n8m/DsEZy8guHXCloo2KiSR8gaO/axBrZpildUQXmYBU0l41Ajk+TuHEE4i +MyXEES2sJWul49syx6yNyJE8d1ERQ77W/dxVEwAI+f7NzUSzn53/fuL8wmZVagAw +9y+knXp77UX21CAwB3J7wYJdbay4fiWrABEBAAGJBHIEGAEKACYWIQRDDBkolgFX +zEX6G+uqBhIFMK4EZgUCWXX8pAIbAgUJAeEzgAJACRCqBhIFMK4EZsF0IAQZAQoA +HRYhBHfj2KJVtdXB+owmGzKid+oJFNJMBQJZdfykAAoJEDKid+oJFNJMpw8P/1V0 +zcPg8slsNQIska0qF6bTj8oN1iBlua8LZGvNM3/8x9hgx9u/uVN2vFmRBTUqd18t +d7Gk3uTOMxHz77F0F21N545CUSYFpMHVfrNtMXihPgICfV9ZYj/ktqlceRZJ60gr +Q8Ccnywy4S03EaumLqta4AeQRbHBj6dsH5MNekNxilGv1h+N2kRnlidIBRZ5fDGb +EkkkBfxMjlCfhb/ICP05SJFfVoUWKv6mwtaP0JRYiCrh1nHXyGwhh9GigmTls5Qa +UMhRWf6iVO5QyS8BBsL7XxU2hTtInsE8KWYVwrB96CjQ/E+twZoyC90onPAPN1fj +53I+5R/q90O5icqUO0j4rx2FWMDg70COwLFsrA9ATPxll9vdlxbufxsyBrSHp9cw +ZCmOsUJ3IsV5GWuCqqfVX5TQpkV489PrVTqIha2QpT2gWnCrjKNlTUQojzkopzRr +kzd66jGcIZcIqDfXIPAVgVwGGAh9JM7CuVCQH3wIijZK4/URLNC0e3SrizTi86Wu +Ie+rKpZ9l9rZYuj2HbNm7vuk8E+xM/Wa6fJuGYB0tvKw7UE7XjO6rPgNNzTiIh3k +KvBZvm5bSuH29DaG+KusPBT9jrdnbVYLNfqZUYFFwGxYNBATeFdZzokx3+6aWO9M +PeahDgcJVlx/7HvhQ33q6KrNHfS8H33MHKjYK08+X1sP/3TIv0qvY1nLlN7yZn9G +kP/GGu9ALt0nrM2ZBMfTNl3+WF5DK8MqOYiIDqXtPBdptHZ/xJ6bvTPqSdIsCnA9 +7HrsIamzO0BETfBtivlmttE7TEXpW8u1mKBEOvAJhHWFL1YhLUD+/rXtljhj2KPR +vdfszpa22mr4gJk1BY3D/ekxoiFXTWRYCH0nB9mRDCxMAui6GTo6nxgNpJDLtVUd +z1jovzD6qBrC+hk9/fOzzzoZZ19vw8zuloQVJAFsORzd1umvjuVEt1Bp9Gh1nnzf +leqIpaqc5G7UnTfB/PywjvliGF0ndL3IxIXlnupdpTtiLh/3ojrEzYMhM+ABbq1m +uYr7k89m5Fw8Row8bKA56hfpA7Tk4Ifez+tKPEoV0s4Wo+1/0Q6G+7Yqt8+AfpZS +4oOgOD5RRUCMfTUoggeQSpfbZTvrJwJhtoh+Ak2GC7B4+R7nO+ch7YQMff+IMfz6 +ewwAXxQFEhHhkrHh31n/hML5pfmQXRkMjE+dIOjNyqDTVc0i6LMNK3SvAlIKL9rE +mjYqgEwdvOk9lzOpUmUTOLLt9/TKmBGoZxjEzhvjf/+HgN+7bxZe3U4//GwspXRj +IQ0fmTeCI+EMd/Kue9mRs59MtmcNktYJMpuRqnGJ+j8eDx8TJ9XgJvAzfiZbPPCC +J720zNZpR7qAQssadU5EI9sguQINBFl1/OoBEACw7RGXKp1p48ffX27kzGvszhoX +9MQ7SX0J10g57JQK49Oyj1bMjoYi64Z2sXMyydAAG82bWO8dXlBAfCla6eyd5C47 +Fj+34sJTievShLkGP0CHp4TGQMbzMJGy3FcglgQfnYnidqdzeK0ksR8xWrtbdcsv +Uf4nH3HV+MJKluepFFDG9Ms92U9sgyd18Dj2y0ovGRlADC74MqdzTX4AAwKhQ+G2 +2WE8sPGv45yruogLX1zFcgayCGkEXyDvpitQtoS8xRGAGWoE6bjLCuaT5wF6jNw4 +PKfkgroAyy3jLQ+jp3tfBkL0UccVwWKfq1L9PXQ4mpFdxANa2isPddjgH4NxLa6V +asVQ2/l15tE5m8KscER5sR30uHkRE46tg8fnndl24amlSuSpmT1mGFVL7gpOKNcr +DT2agmgp/shJnnPzSZFMy2AtsDd7kKrCQAZhEGdkNpDphq0xwy4G6M+FEgBUoph1 +Og8pa4moAHp6mRKJ+cxy4FlVgFuYBO/711qttzDfGGv2jUnt75sZ7yz6NhUiDaKj +CEK6h8oc78cl2QJPa0DMHlXj6l9ZpSwctMGKtgavZR2YB12bBnbXUadxrsSbNTh/ +na3fWTfq8vD3/QVCWxYwFSLLzUIkN2c4j6z3U3fF6IvDOb3DEvOoJ0ns2b8xaT8P +MeZ+i5rUb5eP3gGrRwARAQABiQI8BBgBCgAmFiEEQwwZKJYBV8xF+hvrqgYSBTCu +BGYFAll1/OoCGwwFCQHhM4AACgkQqgYSBTCuBGbfMQ//TC43IuFukPZO7gj/azjg +pbecrqx+JEhW1oITNihKw0EzM9+Zd8ko0pYOLYkuNGiarEKeJ2GcOLMxuU9n+kmI +hMeMPXRH3YrbZFhWshU8uywz1UuDex7VwXM4WA6+9xxaO3AJMB/PWqI6b8IagfAj +SxZnsxOPg+hWYj56uah3OTJcRdKSzExOLJIQkL0LOyjMNHI+MwqRNe59Dc5k0d9j +kQzuW8lS862ryiiJZldl5Uh+T05m2FI9IN6BoXWFsO/KCmgV2L5s4EwUwK/gcREN +OGB42gL9sMhaQ66e+JG0LDOsMcQuhHHPJLCdaXCen2rbfe7kPjYPSWWY5p9tnrcB +MboBxKNKUy4yegabZZ4DWfuVhOhVPxy0e7IQyH6hEsyOEePL9MOtd4PNWLKrZb3D +TGVrpOogD6Mf15nHypWEpkoOVrKj1VUo2dE5iEHcL5iiyJYKMJPwiumxDcpzCt07 +4RNYokL+cxsR9zhC23/GiJWheklBEQ7zh3QibkT1SYHiXrGed5i+SDhRfj3BTUa+ +hgdoNiA0UrUJxhLUDjlvGJHHPWe+wVHJ8uIHS3cvAKRMtUbPXfRJ4X3GKGXuI4kr ++d+jB4Wh3dYgFW7Lr9qNNwqvNeOdvQWzAXzqNmaxNI8hF8+tVeitely/J5rORgly +JkYzFB8/M3WsHmxbo/BamOy5Ag0EWXYCxgEQAKhRUO8R1Q51jVdROVI7xKuni1r+ +JiTI7GEZCTPazUVERT2R+BzHwQe50XLJc7WmelZFFZ5YOugrBFvoUXfhW4iZRETU +KwiGTG4H+HaGLO4HQ8cM3S3Ke9oV4U35ye85IpampOFwz796mFFBawPoQ1dT8kyQ +awYVB9O9JyagfznmNj+k2OJnFXsNSRFSKrWvNEPGAoydl1HdJoxXflfn4xJyp8v7 +ycsil3r1gxcxDMZ7+UsXPaj+LVyYDJDGk9WIIcPQH6UE8xVlqsEIzy/KF/Ub9Wms +vf1ndOtn8C/6HMwCNQzgqGMBj8yUPnU+P3hdur8Rr4S+CvzfTrJXlH+edkx7XMkh +iIskkjsOijKO2ARxSlYgQxY8HWUfioZfhSJ8TLomgXi411qeTBFk8NKXAVHKTFG5 +rx5xUm4TV+nMKVymR3byY6sEvRTLespSWmWAOWlTMjyCJp2vV9WJGxByeD/tORBU +vhbzBFIaPSjXZSTcgH6cUCRH6Gm2Yd6iLVULZT6EZdXeCJZ7mQPZBRqPs1KHtGg6 +d3SgTsNnPxAwNL/j9FpxsWMLGFBTlzezmLrJyYvbyyCJb21gF15j90dusj964xYn +TsyFtHpLpzruJcR01Sw6cbcAXpp5FyREQARdygBMVDcLyD92RWP6KmSh+Xcm1Hya +Q3NMy+tfrllf1r3RABEBAAGJBHIEGAEKACYWIQRDDBkolgFXzEX6G+uqBhIFMK4E +ZgUCWXYCxgIbAgUJAeEzgAJACRCqBhIFMK4EZsF0IAQZAQoAHRYhBLY1Pa6RV7Av +OLSEC8s4YHUVN5xpBQJZdgLGAAoJEMs4YHUVN5xpUL4P/3lm1YUPUitdMKNTVQaF +ZN41nIzXYTv/yRRygl7yVabkcZYJ3CrjdTM/TfQADORn0q3NpzdFsYe801x49UrA ++yIwB/IogFncvREfuW5KVFLaj+EHyMoGzNCyuEcM379VYAuXE/ghSe/1sfeLluug +ikxhduih07mcPn/H8U4VFIDRyxDeWS+ZbobWrcEH6No4knqRi4yInsgVUkNMml0i +UBA8UM7ieN+ioFRCZZ9ul01jOKUjZRzIKcQvcLE8001TrMoAqeS39O/kEfxL6qgE +YPjZtvQv5RAb83DmjT+A3BJmlS3mN4UiYD3+Wk9VTafyTjKJed48BaKws81Jampu +OdPorwoxjkdi7owTg3k9BzkZMwLtIBZ0KOzFAN8c1vuDk1CfHQQKz4g4DdA9HNCt +HiKlSd/CI2Mmy8hVkzAOnrVMZ1VePNdIUcd+YpUQR0uKeaTFRM+mOAnLFd2mnsPm +eaFefRkCho2G2TDApYEAhIDi6v0vg+KCl/oodA/T4xAzNuz+xWs+WUv06UBvWPKR +9ZZFy5wzaPch2h6xm+bCuvM66nj1EN0pe5umUFZrp5QLyD1PiN2LRfyMtzXftgSw +GciFf20iq2MqKEvqzykdEzaS7OreEtQLIGhrAzWZ3v2MAQFVTaPqlunkHju4K4y2 +Oq+EH55xajEOUsGeNRb4ykf0C/8P/1wwKoe7+4q8841E2Mb0RyNyrGMA5YLJa9Qt +3anzBcsSu7qTYySmhpPVTCqeqZ1bJoS/ujqezCHwvtKXbkysRWWyMgUj5dVRs1IY +k9SUfQRI/HHq9r4mUgr4kRDdhvU4RWD63ri1ZsuD0xlp1zDCrRxVkm9y6UQf/9kT +N7Q4AsT4qNsMENEejbupvL1rVmybgXzDcabzTNcwiAMxaLjoALLZXhkXC1Bdq5kt +NLI2r5++tpYrOS3CvIc95C1Q3ETux5Xuh6FwpGJdXRFcha1FBMvvNKMW7Ky/l87Q +LB1JMO6lFpfnry6El2ZMK/k3LyvWGTYu9hn7M4sVwxGHo/frN5Xo/+iVTwhjHbGv ++8gSO8Vqh65UBLoddleCP47j2DpdD0lceQDevV3ltxRA8fJ8Y4yyGHf62MB7MlCY +HYYWeMhwBHPkDZjUj2KeXl3zxvaLBdzbGXN8bwG1vneBYDSwBNGhIOGq8tKWKpKz +jVSNeDfY+IZ0Va/ZWejpZkpggyulQHoDiC6uG61qnjs2edepmtS6KQd5KGexpH+U +FMdZFcBv+6Ca5Z9Z169ajhfRu+md8QTxppo3f4lBbX4hTCbF1uNmnJtU61kylULB +IgDGw8IVIupvhnZ/8zo6Us8f7g78aUAKf/s5SKr5mse6MpnGp3Rhi2lJgcg9QjAm +zkmejY8quQINBFmIR1EBEADGA90QPbf4XqyZgHEfIsQzIPavZftqoUMhR4K19OGN +Wf1q/lgKDRmwQ2fiGJCgd1LUAKQa6JVtgVabg1LxBC7KqssytU9tgKr3PgxxCXoZ +03yZaDt10stZJfi8996e/5oLvnh561O2w0OegMARxY1wdKVa8f2RKEYRM1WhhzaZ +a3R8cdJF4cb0ANg3/jfeVtWBx5Qq5XtNZDVh2ZdGD69y4HOLuvZHOQJLUdPCksUO +PxFuvSdJYTkVTgkYhQL8WYo1EXW3clsykJeVTKAtrA1MCtkDt/pkLixcl2uPF2ov +Dj5wxKd1CCM0Kr69WJHBhFuWrcWZjvsJhQaZ634b1kyY/+nYeLRL23wnEw5FQExu +rWIgasW6LGPBT4OJKPy5DNuBE8SZm7WNrjNqkQMysQWch/Hs52M741TAAyAeoYQP +78XmbfidtCKo8DIM7UQk1OD4N12hrg3bTcZ0F8oKn0aGn8rQXxwSZA8b4JPYYChz +OZLxUrwo5sM+byD7gDgeVWNtXE104FLd8UY0wgnMuj0MF+Eahsc+1MSVv0D1TKkY +JassBGIymW0pWj1BD5ijrDC9J13EiCpT6H/JQVtKLCE8U9V87EM/lezV6gliyIG5 +JiduulRsVK4ceNvUxIwr/nI22bi2Z38nFvYQdv1jFFrK5TYqwdIWvHq5k39YgKxf +AQARAQABiQI8BBgBCgAmFiEEQwwZKJYBV8xF+hvrqgYSBTCuBGYFAlmIR1ECGyAF +CQHhM4AACgkQqgYSBTCuBGZurA//W5GNhnOszMaGG4VyYwK8IuN0wixwqkVQ6dIL +Vr9dfc4yYRpE2t2ZFh0yparw/6fmHuuVnGwd9mzKLXQ6lR0n3lEKZkZW7PRpKC/5 +NVZLD4vf39RAIgp2phLeoMdkPiU94STbi5kZbHmgv/pnypwz+JiGD2lZohsJZE24 +mUgN/XV3hDbAP8TGLCjIykZ/atY6bBY04Z9rH/6DdYUzP32zpDvBfUEZx8MYlns/ +MhGORYcZhrKV2fqUurYGjFI0lsn+LVQZ1/X2RMWZRjAI243jljsT5bv93u3hUiom +R0LDOViTt/zS5hH30pa0sb2v7wNQLz6ZcFGzyNzJtF6AB4nWsnWAwShvj+sgvfLY +JR8Sfp9LBXSePN5zRQrnayd9CO+5Fh41tYUnAYie6ZKe2QZgv+h0u3bli5kk5B6s +LvoTCpVa34igHTvmJUgyVdIsnslTAg9SXi6qucyriWLYBH+foEor44STadC9FpmZ +aqHox2/dBNZT2F29t/2O4ku54DDMQaKeWeYf+Ybvyf1Y7zdRZAY1Nf0I9Gb+aLZX +i5n0VZ30fEP9OBSVG4IBYTqQDhLypOC6Rsy8uy5BsVPPY7VJ4goFqLmQfGOiemFr +bdsIzEX9aBY3XzMdWBOuW638i/vCvdECZrd9rLMzjRqhdNRCfoompurrdXyDGb65 +EaBreyU= +=o65v +-----END PGP PUBLIC KEY BLOCK----- Index: usbguard-0.6.2.tar.gz =================================================================== Binary file usbguard-0.6.2.tar.gz (revision 5) deleted Index: usbguard-fixes.patch =================================================================== --- usbguard-fixes.patch (revision 5) +++ usbguard-fixes.patch (deleted) @@ -1,24 +0,0 @@ -Index: usbguard-usbguard-0.6.2/src/Library/IPCServerPrivate.cpp -=================================================================== ---- usbguard-usbguard-0.6.2.orig/src/Library/IPCServerPrivate.cpp -+++ usbguard-usbguard-0.6.2/src/Library/IPCServerPrivate.cpp -@@ -24,6 +24,7 @@ - #include <sys/poll.h> - #include <sys/eventfd.h> - #include <sys/types.h> -+#include <unistd.h> - #include <pwd.h> - #include <grp.h> - -Index: usbguard-usbguard-0.6.2/src/Library/IPCClientPrivate.cpp -=================================================================== ---- usbguard-usbguard-0.6.2.orig/src/Library/IPCClientPrivate.cpp -+++ usbguard-usbguard-0.6.2/src/Library/IPCClientPrivate.cpp -@@ -20,6 +20,7 @@ - #include "IPCPrivate.hpp" - #include "Logger.hpp" - -+#include <unistd.h> - #include <sys/poll.h> - #include <sys/eventfd.h> - OBS-URL: https://build.opensuse.org/request/show/640778 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=6 |
||
6cffe15166 |
Accepting request 525970 from home:msmeissn:branches:hardware
- updated to 0.7.0 - Added Added InsertedDevicePolicy configuration option to control the policy method for inserted devices. Added RestoreControllerDeviceState configuration option. Added DeviceManagerBackend configuration option. This option can be used to select from several device manager backend implementations. Implemented an uevent based device manager backend. Added setParameter, getParameter IPC (incl. D-Bus) methods. Added set-parameter, get-parameter CLI subcommands. Qt Applet: Added Spanish (es_AR) translation. Create empty rules.conf file at install time (make install). Support for numeric UID/GID values in IPCAllowedUsers and IPCAllowedGroups settings. If bash completion support is detected at configure time, install the bash completion script during make install. Added new configuration setting: IPCAccessControlFiles. IPC access is now configurable down to a section and privilege level per user and/or group. Added add-user, remove-user usbuard CLI subcommands for creating, removing IPC access control files. Added AuditFilePath configuration option for setting the location of the USBGuard audit events log file path. If set, the usbguard-daemon will log policy and device related actions and whether they succeeded or not. - Removed Removed UDev based device manager backend and UDev related dependencies. Removed UDev development files/API dependecy - Changed Reset Linux root hub bcdDevice value before updating device hash. This is a backwards incompatible change because it changes how the device hash is computed for Linux root hub devices. Refactored low-level USB device handling into SysFSDevice class which represents a device in the /sys filesystem (sysfs). Removed usage of readdir_r because it's obsolete. Replaced with readdir with the assumption that its usage is thread-safe if the directory handle passed to it is not shared between threads. Extended test suite with use case tests. Install the usbguard-daemon configuration and policy file with strict file permissions to prevent policy leaks. Fixed several memory leaks. Don't pre-resolve user and group names in IPCAllowedUsers and IPCAllowedGroups settings. Instead, resolve the name during the IPC authentication phase. - Updated to 0.6.2 Wait for disconnect in IPCClient dtor if needed OBS-URL: https://build.opensuse.org/request/show/525970 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=4 |
|||
59d9712112 |
Accepting request 363506 from home:msmeissn:branches:hardware
- split off a library package libusbguard0 OBS-URL: https://build.opensuse.org/request/show/363506 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=3 |
|||
Ismail Dönmez
|
ce0287e573 |
Accepting request 361252 from home:msmeissn
resubmit OBS-URL: https://build.opensuse.org/request/show/361252 OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=1 |