Dominique Leuenberger
b950fd774b
Accepting request 819800 from hardware
...
OBS-URL: https://build.opensuse.org/request/show/819800
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=10
2020-07-10 13:30:12 +00:00
Robert Frohl
c7b4289521
Accepting request 819798 from home:rfrohl:branches:hardware
...
workaround for deamon startup problem in leap 15.2
OBS-URL: https://build.opensuse.org/request/show/819798
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=30
2020-07-09 20:12:19 +00:00
Dominique Leuenberger
8b789d3fca
Accepting request 815249 from hardware
...
OBS-URL: https://build.opensuse.org/request/show/815249
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=9
2020-06-17 12:48:59 +00:00
Robert Frohl
5ca1e79f69
Accepting request 815239 from home:rfrohl:branches:hardware
...
update usbguard to verion 0.7.8
OBS-URL: https://build.opensuse.org/request/show/815239
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=28
2020-06-16 13:07:37 +00:00
Dominique Leuenberger
4f14945654
Accepting request 768992 from hardware
...
OBS-URL: https://build.opensuse.org/request/show/768992
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=8
2020-01-31 22:57:32 +00:00
Tomáš Chvátal
c66df247a5
Accepting request 768870 from home:StefanBruens:branches:devel:libraries:c_c++
...
- update to 0.7.6
+ Added missing options in manpage usbguard-daemon(8)
+ Extended the functionality of allow/block/reject commands
The command can handle rule as a param and not only its ID e.g.
in case of allow, command will allow each device that matches
provided rule
+ Added debug info for malformed descriptors
+ Changed default backend to uevent
+ Fixed handling of add uevents during scanning
Now we are sure that the enumeration is completed before
processing any uevent we are trying to avoid a race where
the kernel is still enumerating the devices and send the
uevent while the parent is being authorised
+ Silenced 'bind' and 'unbind' uevents
- Remove PEGTL build dependency, the package already uses the
bundled version, and there is hardly any reason to unbundle
a template (header only) library.
- Remove Qt5 build dependencies, Qt applet is a separate package.
- Use pkgconfig(udev) instead of udev-devel to allow shortcut
via udev-mini.
- update to 0.7.5
- Added daemon configuration option HidePII
- Added check to avoid conflict between ASAN and TSAN
- Added daemon configuration option for authorized_default
- Added devpath option to generate-policy
- Added # line comments to the rule grammar
- Added ImplicitPolicyTarget to get/set parameter methods
- Added option to filter rules by label when listing
- Added the label attribute to rule
- Added PropertyParameterChanged signal
- Added support for portX/connect_type attribute
- Added temporary option to append-rule
- Added versioning to DBus service
- Added optional LDAP support
- Fixed invalid return value in Rule::Attribute::setSolveEqualsOrdered
- Fixed KeyValueParser to validate keys only when known names are set
- Fixed uninitialized variables found by coverity
- Fixes and cleanups based on LGTM.com report
- Hardened systemd service
- Rename ListRules parameter 'query' to 'label'
- Skip empty lines in usbguard-rule-parser
- The proof-of-concept Qt applet was removed. It is going to be maintained
in a simplified form as a separate project.
Removed: usbguard-applet-qt_desktop_menu_categories.patch
Modified: usbguard-pthread.patch
- Updated usbguard.keyring to add new gpg key for upstream: 5A2EC3932A983910
- link against libpthread to make it build (bsc#1141377)
- added usbguard-pthread.patch
- Run spec-cleaner
- Add the missing systemd build requirement.
- use upstream usbguard.service instead of hardcoded version (bsc#1120969)
- Fix RPM groups. Avoid pointless shelling out to /bin/rm.
- changed zsh completion location
- added rpmlint for zero size rules.conf
- added signature verification of tarball
- add usbguard-0.7.4.tar.gz.sig
- add usbguard.keyring
- update to 0.7.4
- Changed
Fixed conditional manual page generation & installation
- update to 0.7.3
- Changed
usbguard-daemon will now exit with an error if it fails to open a logging file or audit event file.
Modified the present device enumeration algorithm to be more reliable. Enumeration timeouts won't cause usbguard-daemon process to exit anymore.
- Added
umockdev based device manager capable of simulating devices based on umockdev-record files.
- update to 0.7.2
- Changed
Fixed memory leaks in usbguard::Hash class.
Fixed file descriptor leaks in usbguard::SysFSDevice class.
Skip audit backend logging when no backend was set.
- Added
Added zsh completion & other scripts to the distribution tarball.
- update to 0.7.1
- Added
CLI: usbguard watch command now includes an -e <path> option to run an executable for every received event. Event data are passed to the executable via environment variables.
usbguard-daemon: added "-K" option which can disable logging to console.
Added zsh autocompletion support.
usbguard-daemon: added "-f" option which enabled double-fork daemonization procedure.
Added AuditBackend usbguard-daemon configuration option for selecting audit log backend.
Linux Audit support via new LinuxAudit backend.
Added missing RuleCondition.hpp header file to the public API headers.
- Changed
Qt Applet: disabled session management
usbguard-daemon console logging output is enabled by default now. Previously, the -k option had to be passed to enable the output.
Replaced --enable-maintainer-mode configure option with --enable-full-test-suite option. When the new option is not used during the configure phase, only a basic set of test is run during the make check phase.
usbguard-daemon now opens configuration in read-only mode
Fixed UEventDeviceManager to work with Linux Kernel >= 4.13
Refactored audit logging to support different audit log backends
Made the configuration parser strict. Unknown directives and wrong syntax will cause an error.
- Added usbguard-applet-qt package to allow easier user interaction
- Added usbguard-applet-qt_desktop_menu_categories.patch to fix category
- Updated usbguard-daemon.conf to upstream version
- Removed obsolte patch usbguard-fixes.patch
- Added rules.conf, fixing bsc#1071076
- updated to 0.7.0
- Added
Added InsertedDevicePolicy configuration option to control the policy method for inserted devices.
Added RestoreControllerDeviceState configuration option.
Added DeviceManagerBackend configuration option. This option can be used to select from several device manager backend implementations.
Implemented an uevent based device manager backend.
Added setParameter, getParameter IPC (incl. D-Bus) methods.
Added set-parameter, get-parameter CLI subcommands.
Qt Applet: Added Spanish (es_AR) translation.
Create empty rules.conf file at install time (make install).
Support for numeric UID/GID values in IPCAllowedUsers and IPCAllowedGroups settings.
If bash completion support is detected at configure time, install the bash completion script during make install.
Added new configuration setting: IPCAccessControlFiles.
IPC access is now configurable down to a section and privilege level per user and/or group.
Added add-user, remove-user usbuard CLI subcommands for creating, removing IPC access control files.
Added AuditFilePath configuration option for setting the location of the USBGuard audit events log file path. If set, the usbguard-daemon will log policy and device related actions and whether they succeeded or not.
- Removed
Removed UDev based device manager backend and UDev related dependencies.
Removed UDev development files/API dependecy
- Changed
Reset Linux root hub bcdDevice value before updating device hash. This is a backwards incompatible change because it changes how the device hash is computed for Linux root hub devices.
Refactored low-level USB device handling into SysFSDevice class which represents a device in the /sys filesystem (sysfs).
Removed usage of readdir_r because it's obsolete. Replaced with readdir with the assumption that its usage is thread-safe if the directory handle passed to it is not shared between threads.
Extended test suite with use case tests.
Install the usbguard-daemon configuration and policy file with strict file permissions to prevent policy leaks.
Fixed several memory leaks.
Don't pre-resolve user and group names in IPCAllowedUsers and IPCAllowedGroups settings. Instead, resolve the name during the IPC authentication phase.
- Updated to 0.6.2
Wait for disconnect in IPCClient dtor if needed
Qt Applet: Fixed loading of decision method and default decision settings
- Updated to 0.6.1
- Changed
Refactored logging subsystem
Fixed handling of IPC disconnect in the IPCClient class
Qt Applet: Fixed handling of main window minimization and maximization
Fixed building on architectures that don't provide required atomic operations.
The libatomic emulation library will be used in such cases.
Fixed several typos in the documentation
- Added
Implemented a simple internal logger
Access to the logger via public API
Improved logging coverage. Logging output can be enabled either via
CLI options or by setting the USBGUARD_DEBUG environment variable to 1.
Qt Applet: UI translation support.
Qt Applet: Czech (cs_CZ) translation
- Removed
Removed spdlog dependency
- .... ommitted changes from 0.5* series ..
- split off a library package libusbguard0
- a daemon and framework and tools to guard against bad usb
devices.
OBS-URL: https://build.opensuse.org/request/show/768870
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=26
2020-01-31 09:06:05 +00:00
Robert Frohl
c37d0514e9
Accepting request 745119 from home:rfrohl:branches:hardware
...
update usbguard to 0.7.5
OBS-URL: https://build.opensuse.org/request/show/745119
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=25
2019-11-04 09:16:37 +00:00
Dominique Leuenberger
cd021de6f7
Accepting request 717525 from hardware
...
- link against libpthread to make it build (bsc#1141377)
- added usbguard-pthread.patch
OBS-URL: https://build.opensuse.org/request/show/717525
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=7
2019-07-22 15:18:55 +00:00
6756f90bb2
- link against libpthread to make it build (bsc#1141377)
...
- added usbguard-pthread.patch
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=23
2019-07-22 09:50:34 +00:00
05d0976653
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=22
2019-07-22 09:28:08 +00:00
0a9657e08b
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=21
2019-07-22 09:19:15 +00:00
509acb58d4
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=20
2019-07-22 09:13:18 +00:00
7597e5752f
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=19
2019-07-22 09:04:49 +00:00
172e2c3dfc
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=18
2019-07-22 08:57:07 +00:00
eb072bd682
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=17
2019-07-22 08:36:41 +00:00
468b9d436b
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=16
2019-07-22 08:24:22 +00:00
Dominique Leuenberger
0a4ecc47b2
Accepting request 705009 from hardware
...
OBS-URL: https://build.opensuse.org/request/show/705009
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=6
2019-05-24 09:32:49 +00:00
Robert Frohl
86671b15a1
Accepting request 704757 from home:cgiboudeaux:branches:hardware
...
- Run spec-cleaner
- Add the missing systemd build requirement.
OBS-URL: https://build.opensuse.org/request/show/704757
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=14
2019-05-23 12:38:02 +00:00
Dominique Leuenberger
e059cea34f
Accepting request 666304 from hardware
...
use upstream usbguard.service instead of hardcoded version (bsc#1120969) (forwarded request 666303 from rfrohl)
OBS-URL: https://build.opensuse.org/request/show/666304
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=5
2019-01-21 09:56:31 +00:00
4dcea42899
Accepting request 666303 from home:rfrohl:branches:hardware
...
use upstream usbguard.service instead of hardcoded version (bsc#1120969)
OBS-URL: https://build.opensuse.org/request/show/666303
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=12
2019-01-15 17:02:02 +00:00
Dominique Leuenberger
c308f072bc
Accepting request 647226 from hardware
...
OBS-URL: https://build.opensuse.org/request/show/647226
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=4
2018-11-09 06:54:33 +00:00
Tomáš Chvátal
8560fbf779
Accepting request 647070 from home:jengelh:branches:hardware
...
- Fix RPM groups. Avoid pointless shelling out to /bin/rm.
OBS-URL: https://build.opensuse.org/request/show/647070
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=10
2018-11-08 07:45:11 +00:00
Dominique Leuenberger
06ec10d1b7
Accepting request 641406 from hardware
...
OBS-URL: https://build.opensuse.org/request/show/641406
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=3
2018-10-12 11:11:53 +00:00
7d16704a91
Accepting request 641402 from home:rfrohl:branches:hardware
...
Added bug reference
OBS-URL: https://build.opensuse.org/request/show/641402
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=8
2018-10-12 08:24:41 +00:00
Dominique Leuenberger
f453b82175
Accepting request 640850 from hardware
...
OBS-URL: https://build.opensuse.org/request/show/640850
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=2
2018-10-11 09:55:50 +00:00
Ismail Dönmez
4f98c80325
Accepting request 640778 from home:rfrohl:branches:hardware
...
- Update to 0.7.4
- Updated build dependencies for new version
- Added signature verification of tarball
- Added usbguard-applet-qt package to allow easier user interaction
- Added usbguard-applet-qt_desktop_menu_categories.patch to fix category
- Updated usbguard-daemon.conf to upstream version
- Removed obsolte patch usbguard-fixes.patch
- Added rpmlint for zero size rules.conf
old: hardware/usbguard
new: home:rfrohl:branches:hardware/usbguard rev None
Index: usbguard-daemon.conf
===================================================================
--- usbguard-daemon.conf (revision 5)
+++ usbguard-daemon.conf (revision 5)
@@ -34,7 +34,7 @@
# * apply-policy - evaluate the ruleset for every present
# device
#
-PresentDevicePolicy=keep
+PresentDevicePolicy=apply-policy
#
# Present controller policy.
@@ -49,7 +49,49 @@
# * apply-policy - evaluate the ruleset for every present
# device
#
-PresentControllerPolicy=allow
+PresentControllerPolicy=keep
+
+#
+# Inserted device policy.
+#
+# How to treat USB devices that are already connected
+# *after* the daemon starts. One of:
+#
+# * block - deauthorize every present device
+# * reject - remove every present device
+# * apply-policy - evaluate the ruleset for every present
+# device
+#
+InsertedDevicePolicy=apply-policy
+
+#
+# Restore controller device state.
+#
+# The USBGuard daemon modifies some attributes of controller
+# devices like the default authorization state of new child device
+# instances. Using this setting, you can controll whether the
+# daemon will try to restore the attribute values to the state
+# before modificaton on shutdown.
+#
+# SECURITY CONSIDERATIONS: If set to true, the USB authorization
+# policy could be bypassed by performing some sort of attack on the
+# daemon (via a local exploit or via a USB device) to make it shutdown
+# and restore to the operating-system default state (known to be permissive).
+#
+RestoreControllerDeviceState=false
+
+#
+# Device manager backend
+#
+# Which device manager backend implementation to use. One of:
+#
+# * uevent - Netlink based implementation which uses sysfs to scan for present
+# devices and an uevent netlink socket for receiving USB device
+# related events.
+# * umockdev - umockdev based device manager capable of simulating devices based
+# on umockdev-record files. Useful for testing.
+#
+DeviceManagerBackend=uevent
#!!! WARNING: It's good practice to set at least one of the !!!
#!!! two options bellow. If none of them are set, !!!
@@ -65,6 +107,7 @@
#
# IPCAllowedUsers=username1 username2 ...
#
+IPCAllowedUsers=root
#
# Groups allowed to use the IPC interface.
@@ -74,4 +117,57 @@
#
# IPCAllowedGroups=groupname1 groupname2 ...
#
-IPCAllowedGroups=wheel
+IPCAllowedGroups=
+
+#
+# IPC access control definition files path.
+#
+# The files at this location will be interpreted by the daemon
+# as access control definition files. The (base)name of a file
+# should be in the form:
+#
+# [user][:<group>]
+#
+# and should contain lines in the form:
+#
+# <section>=[privilege] ...
+#
+# This way each file defines who is able to connect to the IPC
+# bus and what privileges he has.
+#
+IPCAccessControlFiles=/etc/usbguard/IPCAccessControl.d/
+
+#
+# Generate device specific rules including the "via-port"
+# attribute.
+#
+# This option modifies the behavior of the allowDevice
+# action. When instructed to generate a permanent rule,
+# the action can generate a port specific rule. Because
+# some systems have unstable port numbering, the generated
+# rule might not match the device after rebooting the system.
+#
+# If set to false, the generated rule will still contain
+# the "parent-hash" attribute which also defines an association
+# to the parent device. See usbguard-rules.conf(5) for more
+# details.
+#
+DeviceRulesWithPort=false
+
+#
+# USBGuard Audit events log backend
+#
+# One of:
+#
+# * FileAudit - Log audit events into a file specified by
+# AuditFilePath setting (see below)
+# * LinuxAudit - Log audit events using the Linux Audit
+# subsystem (using audit_log_user_message)
+#
+AuditBackend=FileAudit
+
+#
+# USBGuard audit events log file path.
+#
+AuditFilePath=/var/log/usbguard/usbguard-audit.log
+
Index: usbguard.changes
===================================================================
--- usbguard.changes (revision 5)
+++ usbguard.changes (revision 5)
@@ -1,4 +1,67 @@
-------------------------------------------------------------------
+Tue Oct 9 09:48:44 UTC 2018 - Robert Frohl <rfrohl@suse.com>
+
+- changed zsh completion location
+- added rpmlint for zero size rules.conf
+
+-------------------------------------------------------------------
+Tue Oct 9 08:05:02 UTC 2018 - Robert Frohl <rfrohl@suse.com>
+
+- added signature verification of tarball
+ - add usbguard-0.7.4.tar.gz.sig
+ - add usbguard.keyring
+
+-------------------------------------------------------------------
+Mon Oct 8 14:19:55 UTC 2018 - Robert Frohl <rfrohl@suse.com>
+
+- update to 0.7.4
+ - Changed
+ Fixed conditional manual page generation & installation
+
+- update to 0.7.3
+ - Changed
+ usbguard-daemon will now exit with an error if it fails to open a logging file or audit event file.
+ Modified the present device enumeration algorithm to be more reliable. Enumeration timeouts won't cause usbguard-daemon process to exit anymore.
+
+ - Added
+ umockdev based device manager capable of simulating devices based on umockdev-record files.
+
+- update to 0.7.2
+ - Changed
+ Fixed memory leaks in usbguard::Hash class.
+ Fixed file descriptor leaks in usbguard::SysFSDevice class.
+ Skip audit backend logging when no backend was set.
+
+ - Added
+ Added zsh completion & other scripts to the distribution tarball.
+
+- update to 0.7.1
+ - Added
+ CLI: usbguard watch command now includes an -e <path> option to run an executable for every received event. Event data are passed to the executable via environment variables.
+ usbguard-daemon: added "-K" option which can disable logging to console.
+ Added zsh autocompletion support.
+ usbguard-daemon: added "-f" option which enabled double-fork daemonization procedure.
+ Added AuditBackend usbguard-daemon configuration option for selecting audit log backend.
+ Linux Audit support via new LinuxAudit backend.
+ Added missing RuleCondition.hpp header file to the public API headers.
+
+ - Changed
+ Qt Applet: disabled session management
+ usbguard-daemon console logging output is enabled by default now. Previously, the -k option had to be passed to enable the output.
+ Replaced --enable-maintainer-mode configure option with --enable-full-test-suite option. When the new option is not used during the configure phase, only a basic set of test is run during the make check phase.
+ usbguard-daemon now opens configuration in read-only mode
+ Fixed UEventDeviceManager to work with Linux Kernel >= 4.13
+ Refactored audit logging to support different audit log backends
+ Made the configuration parser strict. Unknown directives and wrong syntax will cause an error.
+
+
+- Added usbguard-applet-qt package to allow easier user interaction
+- Added usbguard-applet-qt_desktop_menu_categories.patch to fix category
+- Updated usbguard-daemon.conf to upstream version
+- Removed obsolte patch usbguard-fixes.patch
+
+
+-------------------------------------------------------------------
Wed Sep 6 10:48:23 UTC 2017 - meissner@suse.com
- updated to 0.7.0
@@ -34,7 +97,7 @@
Don't pre-resolve user and group names in IPCAllowedUsers and IPCAllowedGroups settings. Instead, resolve the name during the IPC authentication phase.
- Updated to 0.6.2
-
+
Wait for disconnect in IPCClient dtor if needed
Qt Applet: Fixed loading of decision method and default decision settings
Index: usbguard.spec
===================================================================
--- usbguard.spec (revision 5)
+++ usbguard.spec (revision 5)
@@ -1,7 +1,7 @@
#
# spec file for package usbguard
#
-# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -12,7 +12,7 @@
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
@@ -21,34 +21,47 @@
%define lname libusbguard0
Name: usbguard
-Version: 0.6.2
+Version: 0.7.4
Release: 0
Summary: A tool for implementing USB device usage policy
## Not installed
# src/ThirdParty/Catch: Boost Software License - Version 1.0
-License: GPL-2.0+
-Group: System Environment/Daemons
-Url: https://dkopecek.github.io/usbguard
-Source0: https://github.com/dkopecek/usbguard/archive/usbguard-%{version}.tar.gz
-Source1: usbguard-daemon.conf
-Source2: usbguard.service
-Patch0: usbguard-fixes.patch
+License: GPL-2.0-or-later
+Group: System/Daemons
+URL: https://usbguard.github.io
+Source0: https://github.com/USBGuard/usbguard/releases/download/usbguard-%{version}/usbguard-%{version}.tar.gz
+Source1: https://github.com/USBGuard/usbguard/releases/download/usbguard-%{version}/usbguard-%{version}.tar.gz.sig
+Source2: usbguard.keyring
+Source3: usbguard-daemon.conf
+Source4: usbguard.service
+Source5: usbguard-rpmlintrc
+Patch0: usbguard-applet-qt_desktop_menu_categories.patch
%{?systemd_requires}
+BuildRequires: asciidoc
+BuildRequires: aspell
+BuildRequires: audit-devel
+BuildRequires: autoconf
+BuildRequires: automake
+BuildRequires: bash-completion-devel
+BuildRequires: dbus-1-glib-devel
BuildRequires: gcc-c++
-BuildRequires: autoconf automake libtool
+BuildRequires: hicolor-icon-theme
+BuildRequires: libQt5Widgets-devel
BuildRequires: libcap-ng-devel
-BuildRequires: pegtl-devel
-BuildRequires: dbus-1-glib-devel
-BuildRequires: libxml2-devel
-BuildRequires: libxslt-devel
-BuildRequires: polkit-devel
BuildRequires: libqb-devel
-BuildRequires: libudev-devel
+BuildRequires: libqt5-linguist-devel
+BuildRequires: libqt5-qtsvg-devel
BuildRequires: libseccomp-devel
BuildRequires: libsodium-devel
+BuildRequires: libtool
+BuildRequires: libudev-devel
+BuildRequires: libxml2-devel
+BuildRequires: libxslt-devel
+BuildRequires: pegtl-devel
+BuildRequires: polkit-devel
#BuildRequires: spdlog-static
-BuildRequires: protobuf-devel
+BuildRequires: protobuf-devel
%description
The USBGuard software framework helps to protect your computer against rogue USB
@@ -57,7 +70,7 @@
%package -n %lname
Summary: Library for implementing USB device usage policy
-Group: System Environment/Daemons
+Group: System/Daemons
%description -n %lname
The USBGuard software framework helps to protect your computer against rogue USB
@@ -66,7 +79,7 @@
%package devel
Summary: Development files for %{name}
-Group: Development/Libraries
+Group: Development/Libraries/C and C++
Requires: %lname = %{version}
Requires: %{name} = %{version}
Requires: libstdc++-devel
@@ -78,18 +91,28 @@
%package tools
Summary: USBGuard Tools
-Group: Applications/System
+Group: System/Management
Requires: %{name} = %{version}-%{release}
%description tools
The %{name}-tools package contains optional tools from the USBGuard
software framework.
+%package applet-qt
+Summary: USBGuard Qt 5.x Applet
+Group: System/Management
+Requires: %{name} = %{version}-%{release}
+Obsoletes: usbguard-applet-qt <= 0.3
+
+%description applet-qt
+The %{name}-applet-qt package contains an optional Qt 5.x desktop applet
+for interacting with the USBGuard daemon component.
+
%prep
-%setup -q -n usbguard-usbguard-%version
+%setup -q -n usbguard-%version
%patch0 -p1
# Remove bundled library sources before build
-#rm -rf src/ThirdParty/{json,spdlog}
+#rm -rf src/ThirdParty/{Catch,PEGTL}
%build
mkdir -p ./m4
@@ -97,9 +120,10 @@
%configure \
--disable-silent-rules \
- --with-bundled-json \
- --with-bundled-spdlog \
--with-bundled-catch \
+ --with-bundled-pegtl \
+ --enable-systemd \
+ --with-gui-qt=qt5 \
--without-dbus \
--disable-static
@@ -116,14 +140,18 @@
# Install configuration
mkdir -p %{buildroot}%{_sysconfdir}/usbguard
-install -p -m 644 %{SOURCE1} %{buildroot}%{_sysconfdir}/usbguard/usbguard-daemon.conf
+install -p -m 600 %{SOURCE3} %{buildroot}%{_sysconfdir}/usbguard/usbguard-daemon.conf
# Install systemd unit
mkdir -p %{buildroot}%{_unitdir}
-install -p -m 644 %{SOURCE2} %{buildroot}%{_unitdir}/usbguard.service
+install -p -m 644 %{SOURCE4} %{buildroot}%{_unitdir}/usbguard.service
+
+# zsh completion, currently needs manual intervention
+mkdir -p %{buildroot}%{_datadir}/zsh/site-functions/
+install -p -m 644 scripts/usbguard-zsh-completion %{buildroot}%{_datadir}/zsh/site-functions/_usbguard
# Cleanup
-find %{buildroot} -name '*.la' -delete
+find %{buildroot} \( -name '*.la' -o -name '*.a' \) -exec rm -f {} ';'
%preun
%service_del_preun usbguard.service
@@ -142,22 +170,23 @@
%files
%defattr(-,root,root,-)
-%doc README.md
+%doc README.adoc CHANGELOG.md
%license LICENSE
%{_sbindir}/usbguard-daemon
+%dir %{_localstatedir}/log/usbguard
%dir %{_sysconfdir}/usbguard
%{_sbindir}/rcusbguard
-%config(noreplace) %{_sysconfdir}/usbguard/usbguard-daemon.conf
+%dir %{_sysconfdir}/usbguard/IPCAccessControl.d
+%config(noreplace) %attr(0600,-,-) %{_sysconfdir}/usbguard/usbguard-daemon.conf
+%config(noreplace) %attr(0600,-,-) %{_sysconfdir}/usbguard/rules.conf
%{_unitdir}/usbguard.service
%{_datadir}/man/man8/usbguard-daemon.8.gz
-%{_datadir}/man/man8/usbguard-dbus.8.gz
%{_datadir}/man/man5/usbguard-daemon.conf.5.gz
%{_datadir}/man/man5/usbguard-rules.conf.5.gz
-#{_sbindir}/usbguard-dbus
-#/usr/share/dbus-1/system-services/org.usbguard.service
-#dir /usr/share/dbus-1/system.d
-#/usr/share/dbus-1/system.d/org.usbguard.conf
-#/usr/share/polkit-1/actions/org.usbguard.policy
+%{_datadir}/bash-completion/completions/usbguard
+%dir %{_datadir}/zsh
+%dir %{_datadir}/zsh/site-functions
+%{_datadir}/zsh/site-functions/_usbguard
%files -n %lname
%defattr(-,root,root,-)
@@ -176,4 +205,14 @@
%{_bindir}/usbguard-rule-parser
%{_datadir}/man/man1/usbguard.1.gz
+%files applet-qt
+%defattr(-,root,root,-)
+%{_bindir}/usbguard-applet-qt
+%{_mandir}/man1/usbguard-applet-qt.1.gz
+%{_datadir}/applications/usbguard-applet-qt.desktop
+%dir %{_datadir}/icons/hicolor
+%dir %{_datadir}/icons/hicolor/scalable
+%dir %{_datadir}/icons/hicolor/scalable/apps
+%{_datadir}/icons/hicolor/scalable/apps/usbguard-icon.svg
+
%changelog
Index: usbguard-0.7.4.tar.gz
===================================================================
Binary file usbguard-0.7.4.tar.gz (revision 5) added
Index: usbguard-0.7.4.tar.gz.sig
===================================================================
--- usbguard-0.7.4.tar.gz.sig (added)
+++ usbguard-0.7.4.tar.gz.sig (revision 5)
@@ -0,0 +1,17 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2
+
+iQIcBAABCAAGBQJbRtwMAAoJEDKid+oJFNJMdvkQANXmEUzCVnFkeEvQZfgFVhYv
+thHufD5G8b01GkJGBYICjl7IdYTmdKaGkuHoNer3SZee8WHjtK3WukxCgJ4q7p9d
+teSQw+U8NEyZOrM25dc+FkI1bj+qYf1v1hh8AKDCWU+bR9J+5EDKNtsL/M84hvXO
+zv44JTH2CsWiM97/dt1pWJbPzCJV+PB4o4nEX2Q1NMh0fv3vlebiX4Sv9vTo7oWi
+tl8cnm2m9jR9wsQS9I1+WHo+iGChCnf64mLohF7RQy1mYysXDkHBVBd56qHSpTXy
+KGFj3TFmRUNXSW2FBK6d5ZwDtHjwz4Ram53KBknw2NpOk1mV0h26LxA/7TzzwFNN
+sdhhpPc63bE3otqL8Uz5ldeyO+rtPQj8orb8euss5vtWi1uZ/UTPQJlaAd0rm33O
+v9sw4wAr3u8m8brCE2b1RVtzVaCYvWnIjo7SPcNxNKD/2J4u2TirvFGNx+7SQIAl
++J9oS+Gc6Zmv2rtWb8Ayjy/0HXpiIiADsgaBpx92DbJL5cpd8IbGEN1s2sfb389T
+/nzLkdJeFmk0PGRgv+wtc4fFA6AlZSZ0+fZSbz/ubbsoA/6Fhvgu9lVems8LAUtK
+87tgvoZbbG7BKCO1FN/6t5pwvU0psWEbzUd5eu7ifIy2Zp9SNPS5Qis7bIA7k+A3
+GlKLLSAVUrp1mM4WIFsa
+=chtE
+-----END PGP SIGNATURE-----
Index: usbguard-applet-qt_desktop_menu_categories.patch
===================================================================
--- usbguard-applet-qt_desktop_menu_categories.patch (added)
+++ usbguard-applet-qt_desktop_menu_categories.patch (revision 5)
@@ -0,0 +1,12 @@
+Index: usbguard-0.7.4/src/GUI.Qt/usbguard-applet-qt.desktop.in
+===================================================================
+--- usbguard-0.7.4.orig/src/GUI.Qt/usbguard-applet-qt.desktop.in
++++ usbguard-0.7.4/src/GUI.Qt/usbguard-applet-qt.desktop.in
+@@ -6,6 +6,6 @@ Comment=USBGuard Qt Applet
+ TryExec=usbguard-applet-qt
+ Exec=usbguard-applet-qt
+ Icon=usbguard-icon
+-Categories=System;
++Categories=System;Security;
+ Keywords=USB;USBGuard;Applet;Qt;
+ X-Desktop-File-Install-Version=@VERSION@
Index: usbguard-rpmlintrc
===================================================================
--- usbguard-rpmlintrc (added)
+++ usbguard-rpmlintrc (revision 5)
@@ -0,0 +1,2 @@
+# usbguard ships zero length rules.conf by default
+addFilter("zero-length /etc/usbguard/rules.conf")
Index: usbguard.keyring
===================================================================
--- usbguard.keyring (added)
+++ usbguard.keyring (revision 5)
@@ -0,0 +1,187 @@
+-----BEGIN PGP PUBLIC KEY BLOCK-----
+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+=o65v
+-----END PGP PUBLIC KEY BLOCK-----
Index: usbguard-0.6.2.tar.gz
===================================================================
Binary file usbguard-0.6.2.tar.gz (revision 5) deleted
Index: usbguard-fixes.patch
===================================================================
--- usbguard-fixes.patch (revision 5)
+++ usbguard-fixes.patch (deleted)
@@ -1,24 +0,0 @@
-Index: usbguard-usbguard-0.6.2/src/Library/IPCServerPrivate.cpp
-===================================================================
---- usbguard-usbguard-0.6.2.orig/src/Library/IPCServerPrivate.cpp
-+++ usbguard-usbguard-0.6.2/src/Library/IPCServerPrivate.cpp
-@@ -24,6 +24,7 @@
- #include <sys/poll.h>
- #include <sys/eventfd.h>
- #include <sys/types.h>
-+#include <unistd.h>
- #include <pwd.h>
- #include <grp.h>
-
-Index: usbguard-usbguard-0.6.2/src/Library/IPCClientPrivate.cpp
-===================================================================
---- usbguard-usbguard-0.6.2.orig/src/Library/IPCClientPrivate.cpp
-+++ usbguard-usbguard-0.6.2/src/Library/IPCClientPrivate.cpp
-@@ -20,6 +20,7 @@
- #include "IPCPrivate.hpp"
- #include "Logger.hpp"
-
-+#include <unistd.h>
- #include <sys/poll.h>
- #include <sys/eventfd.h>
-
OBS-URL: https://build.opensuse.org/request/show/640778
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=6
2018-10-09 15:09:13 +00:00
Dominique Leuenberger
540446d5ef
Accepting request 525975 from hardware
...
add usbguard to factory
OBS-URL: https://build.opensuse.org/request/show/525975
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/usbguard?expand=0&rev=1
2017-09-14 19:16:56 +00:00
6cffe15166
Accepting request 525970 from home:msmeissn:branches:hardware
...
- updated to 0.7.0
- Added
Added InsertedDevicePolicy configuration option to control the policy method for inserted devices.
Added RestoreControllerDeviceState configuration option.
Added DeviceManagerBackend configuration option. This option can be used to select from several device manager backend implementations.
Implemented an uevent based device manager backend.
Added setParameter, getParameter IPC (incl. D-Bus) methods.
Added set-parameter, get-parameter CLI subcommands.
Qt Applet: Added Spanish (es_AR) translation.
Create empty rules.conf file at install time (make install).
Support for numeric UID/GID values in IPCAllowedUsers and IPCAllowedGroups settings.
If bash completion support is detected at configure time, install the bash completion script during make install.
Added new configuration setting: IPCAccessControlFiles.
IPC access is now configurable down to a section and privilege level per user and/or group.
Added add-user, remove-user usbuard CLI subcommands for creating, removing IPC access control files.
Added AuditFilePath configuration option for setting the location of the USBGuard audit events log file path. If set, the usbguard-daemon will log policy and device related actions and whether they succeeded or not.
- Removed
Removed UDev based device manager backend and UDev related dependencies.
Removed UDev development files/API dependecy
- Changed
Reset Linux root hub bcdDevice value before updating device hash. This is a backwards incompatible change because it changes how the device hash is computed for Linux root hub devices.
Refactored low-level USB device handling into SysFSDevice class which represents a device in the /sys filesystem (sysfs).
Removed usage of readdir_r because it's obsolete. Replaced with readdir with the assumption that its usage is thread-safe if the directory handle passed to it is not shared between threads.
Extended test suite with use case tests.
Install the usbguard-daemon configuration and policy file with strict file permissions to prevent policy leaks.
Fixed several memory leaks.
Don't pre-resolve user and group names in IPCAllowedUsers and IPCAllowedGroups settings. Instead, resolve the name during the IPC authentication phase.
- Updated to 0.6.2
Wait for disconnect in IPCClient dtor if needed
OBS-URL: https://build.opensuse.org/request/show/525970
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=4
2017-09-14 05:52:24 +00:00
59d9712112
Accepting request 363506 from home:msmeissn:branches:hardware
...
- split off a library package libusbguard0
OBS-URL: https://build.opensuse.org/request/show/363506
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=3
2016-03-01 12:15:58 +00:00
22746d2832
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=2
2016-02-26 07:43:14 +00:00
Ismail Dönmez
ce0287e573
Accepting request 361252 from home:msmeissn
...
resubmit
OBS-URL: https://build.opensuse.org/request/show/361252
OBS-URL: https://build.opensuse.org/package/show/hardware/usbguard?expand=0&rev=1
2016-02-24 13:08:10 +00:00