aboutsummaryrefslogtreecommitdiffstats
path: root/platform/rpm
diff options
context:
space:
mode:
authorLibravatar Jon Griffiths <jon_p_griffiths@yahoo.com>2016-02-16 04:33:16 +1300
committerLibravatar Jon Griffiths <jon_p_griffiths@yahoo.com>2016-02-16 04:36:02 +1300
commitba35f8991bea62c91a93c6aa4caa4820d7e4bde6 (patch)
tree9739d68455686f7548910f219d47d073d440d73f /platform/rpm
parent'make rpms' now makes the rpm files (diff)
downloadfirejail-ba35f8991bea62c91a93c6aa4caa4820d7e4bde6.tar.gz
firejail-ba35f8991bea62c91a93c6aa4caa4820d7e4bde6.tar.zst
firejail-ba35f8991bea62c91a93c6aa4caa4820d7e4bde6.zip
Remove old-mkrpm.sh
Diffstat (limited to 'platform/rpm')
-rwxr-xr-xplatform/rpm/old-mkrpm.sh450
1 files changed, 0 insertions, 450 deletions
diff --git a/platform/rpm/old-mkrpm.sh b/platform/rpm/old-mkrpm.sh
deleted file mode 100755
index 99f7a536c..000000000
--- a/platform/rpm/old-mkrpm.sh
+++ /dev/null
@@ -1,450 +0,0 @@
1#!/bin/bash
2VERSION="0.9.38"
3rm -fr ~/rpmbuild
4rm -f firejail-$VERSION-1.x86_64.rpm
5
6mkdir -p ~/rpmbuild/{RPMS,SRPMS,BUILD,SOURCES,SPECS,tmp}
7cat <<EOF >~/.rpmmacros
8%_topdir %(echo $HOME)/rpmbuild
9%_tmppath %{_topdir}/tmp
10EOF
11
12cd ~/rpmbuild
13echo "building directory tree"
14
15mkdir -p firejail-$VERSION/usr/bin
16install -m 755 /usr/bin/firejail firejail-$VERSION/usr/bin/.
17install -m 755 /usr/bin/firemon firejail-$VERSION/usr/bin/.
18
19mkdir -p firejail-$VERSION/usr/lib/firejail
20install -m 644 /usr/lib/firejail/libtrace.so firejail-$VERSION/usr/lib/firejail/.
21install -m 644 /usr/lib/firejail/libtracelog.so firejail-$VERSION/usr/lib/firejail/.
22install -m 755 /usr/lib/firejail/ftee firejail-$VERSION/usr/lib/firejail/.
23install -m 755 /usr/lib/firejail/fshaper.sh firejail-$VERSION/usr/lib/firejail/.
24
25mkdir -p firejail-$VERSION/usr/share/man/man1
26install -m 644 /usr/share/man/man1/firejail.1.gz firejail-$VERSION/usr/share/man/man1/.
27install -m 644 /usr/share/man/man1/firemon.1.gz firejail-$VERSION/usr/share/man/man1/.
28
29mkdir -p firejail-$VERSION/usr/share/man/man5
30install -m 644 /usr/share/man/man5/firejail-profile.5.gz firejail-$VERSION/usr/share/man/man5/.
31install -m 644 /usr/share/man/man5/firejail-login.5.gz firejail-$VERSION/usr/share/man/man5/.
32
33mkdir -p firejail-$VERSION/usr/share/doc/packages/firejail
34install -m 644 /usr/share/doc/firejail/COPYING firejail-$VERSION/usr/share/doc/packages/firejail/.
35install -m 644 /usr/share/doc/firejail/README firejail-$VERSION/usr/share/doc/packages/firejail/.
36install -m 644 /usr/share/doc/firejail/RELNOTES firejail-$VERSION/usr/share/doc/packages/firejail/.
37
38mkdir -p firejail-$VERSION/etc/firejail
39install -m 644 /etc/firejail/xchat.profile firejail-$VERSION/etc/firejail/xchat.profile
40install -m 644 /etc/firejail/server.profile firejail-$VERSION/etc/firejail/server.profile
41install -m 644 /etc/firejail/quassel.profile firejail-$VERSION/etc/firejail/quassel.profile
42install -m 644 /etc/firejail/pidgin.profile firejail-$VERSION/etc/firejail/pidgin.profile
43install -m 644 /etc/firejail/icecat.profile firejail-$VERSION/etc/firejail/icecat.profile
44install -m 644 /etc/firejail/filezilla.profile firejail-$VERSION/etc/firejail/filezilla.profile
45install -m 644 /etc/firejail/chromium-browser.profile firejail-$VERSION/etc/firejail/chromium-browser.profile
46install -m 644 /etc/firejail/chromium.profile firejail-$VERSION/etc/firejail/chromium.profile
47install -m 644 /etc/firejail/dropbox.profile firejail-$VERSION/etc/firejail/dropbox.profile
48install -m 644 /etc/firejail/disable-common.inc firejail-$VERSION/etc/firejail/disable-common.inc
49install -m 644 /etc/firejail/disable-secret.inc firejail-$VERSION/etc/firejail/disable-secret.inc
50install -m 644 /etc/firejail/disable-mgmt.inc firejail-$VERSION/etc/firejail/disable-mgmt.inc
51install -m 644 /etc/firejail/evince.profile firejail-$VERSION/etc/firejail/evince.profile
52install -m 644 /etc/firejail/firefox.profile firejail-$VERSION/etc/firejail/firefox.profile
53install -m 644 /etc/firejail/icedove.profile firejail-$VERSION/etc/firejail/icedove.profile
54install -m 644 /etc/firejail/iceweasel.profile firejail-$VERSION/etc/firejail/iceweasel.profile
55install -m 644 /etc/firejail/midori.profile firejail-$VERSION/etc/firejail/midori.profile
56install -m 644 /etc/firejail/thunderbird.profile firejail-$VERSION/etc/firejail/thunderbird.profile
57install -m 644 /etc/firejail/opera.profile firejail-$VERSION/etc/firejail/opera.profile
58install -m 644 /etc/firejail/transmission-gtk.profile firejail-$VERSION/etc/firejail/transmission-gtk.profile
59install -m 644 /etc/firejail/transmission-qt.profile firejail-$VERSION/etc/firejail/transmission-qt.profile
60install -m 644 /etc/firejail/vlc.profile firejail-$VERSION/etc/firejail/vlc.profile
61install -m 644 /etc/firejail/audacious.profile firejail-$VERSION/etc/firejail/audacious.profile
62install -m 644 /etc/firejail/clementine.profile firejail-$VERSION/etc/firejail/clementine.profile
63install -m 644 /etc/firejail/gnome-mplayer.profile firejail-$VERSION/etc/firejail/gnome-mplayer.profile
64install -m 644 /etc/firejail/rhythmbox.profile firejail-$VERSION/etc/firejail/rhythmbox.profile
65install -m 644 /etc/firejail/totem.profile firejail-$VERSION/etc/firejail/totem.profile
66install -m 644 /etc/firejail/deluge.profile firejail-$VERSION/etc/firejail/deluge.profile
67install -m 644 /etc/firejail/qbittorrent.profile firejail-$VERSION/etc/firejail/qbittorrent.profile
68install -m 644 /etc/firejail/generic.profile firejail-$VERSION/etc/firejail/generic.profile
69install -m 644 /etc/firejail/login.users firejail-$VERSION/etc/firejail/login.users
70install -m 644 /etc/firejail/deadbeef.profile firejail-$VERSION/etc/firejail/deadbeef.profile
71install -m 644 /etc/firejail/empathy.profile firejail-$VERSION/etc/firejail/empathy.profile
72install -m 644 /etc/firejail/fbreader.profile firejail-$VERSION/etc/firejail/fbreader.profile
73install -m 644 /etc/firejail/spotify.profile firejail-$VERSION/etc/firejail/spotify.profile
74install -m 644 /etc/firejail/google-chrome.profile firejail-$VERSION/etc/firejail/google-chrome.profile
75install -m 644 /etc/firejail/skype.profile firejail-$VERSION/etc/firejail/skype.profile
76install -m 644 /etc/firejail/steam.profile firejail-$VERSION/etc/firejail/steam.profile
77install -m 644 /etc/firejail/wine.profile firejail-$VERSION/etc/firejail/wine.profile
78install -m 644 /etc/firejail/disable-devel.inc firejail-$VERSION/etc/firejail/disable-devel.inc
79
80install -m 644 /etc/firejail/bitlbee.profile firejail-$VERSION/etc/firejail/bitlbee.profile
81install -m 644 /etc/firejail/conkeror.profile firejail-$VERSION/etc/firejail/conkeror.profile
82install -m 644 /etc/firejail/google-chrome-beta.profile firejail-$VERSION/etc/firejail/google-chrome-beta.profile
83install -m 644 /etc/firejail/google-chrome-stable.profile firejail-$VERSION/etc/firejail/google-chrome-stable.profile
84install -m 644 /etc/firejail/google-chrome-unstable.profile firejail-$VERSION/etc/firejail/google-chrome-unstable.profile
85install -m 644 /etc/firejail/hexchat.profile firejail-$VERSION/etc/firejail/hexchat.profile
86install -m 644 /etc/firejail/nolocal.net firejail-$VERSION/etc/firejail/nolocal.net
87install -m 644 /etc/firejail/opera-beta.profile firejail-$VERSION/etc/firejail/opera-beta.profile
88install -m 644 /etc/firejail/parole.profile firejail-$VERSION/etc/firejail/parole.profile
89install -m 644 /etc/firejail/rtorrent.profile firejail-$VERSION/etc/firejail/rtorrent.profile
90install -m 644 /etc/firejail/unbound.profile firejail-$VERSION/etc/firejail/unbound.profile
91install -m 644 /etc/firejail/webserver.net firejail-$VERSION/etc/firejail/webserver.net
92install -m 644 /etc/firejail/weechat-curses.profile firejail-$VERSION/etc/firejail/weechat-curses.profile
93install -m 644 /etc/firejail/weechat.profile firejail-$VERSION/etc/firejail/weechat.profile
94install -m 644 /etc/firejail/whitelist-common.inc firejail-$VERSION/etc/firejail/whitelist-common.inc
95
96install -m 644 /etc/firejail/kmail.profile firejail-$VERSION/etc/firejail/kmail.profile
97install -m 644 /etc/firejail/seamonkey.profile firejail-$VERSION/etc/firejail/seamonkey.profile
98install -m 644 /etc/firejail/seamonkey-bin.profile firejail-$VERSION/etc/firejail/seamonkey-bin.profile
99install -m 644 /etc/firejail/telegram.profile firejail-$VERSION/etc/firejail/telegram.profile
100install -m 644 /etc/firejail/mathematica.profile firejail-$VERSION/etc/firejail/mathematica.profile
101install -m 644 /etc/firejail/Mathematica.profile firejail-$VERSION/etc/firejail/Mathematica.profile
102install -m 644 /etc/firejail/uget-gtk.profile firejail-$VERSION/etc/firejail/uget-gtk.profile
103install -m 644 /etc/firejail/mupen64plus.profile firejail-$VERSION/etc/firejail/mupen64plus.profile
104
105
106mkdir -p firejail-$VERSION/usr/share/bash-completion/completions
107install -m 644 /usr/share/bash-completion/completions/firejail firejail-$VERSION/usr/share/bash-completion/completions/.
108install -m 644 /usr/share/bash-completion/completions/firemon firejail-$VERSION/usr/share/bash-completion/completions/.
109
110echo "building tar.gz archive"
111tar -czvf firejail-$VERSION.tar.gz firejail-$VERSION
112
113cp firejail-$VERSION.tar.gz SOURCES/.
114
115echo "building config spec"
116cat <<EOF > SPECS/firejail.spec
117%define __spec_install_post %{nil}
118%define debug_package %{nil}
119%define __os_install_post %{_dbpath}/brp-compress
120
121Summary: Linux namepaces sandbox program
122Name: firejail
123Version: $VERSION
124Release: 1
125License: GPL+
126Group: Development/Tools
127SOURCE0 : %{name}-%{version}.tar.gz
128URL: http://firejail.wordpress.com
129
130BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root
131
132%description
133Firejail is a SUID sandbox program that reduces the risk of security
134breaches by restricting the running environment of untrusted applications
135using Linux namespaces. It includes a sandbox profile for Mozilla Firefox.
136
137%prep
138%setup -q
139
140%build
141
142%install
143rm -rf %{buildroot}
144mkdir -p %{buildroot}
145
146cp -a * %{buildroot}
147
148
149%clean
150rm -rf %{buildroot}
151
152
153%files
154%defattr(-,root,root,-)
155%config(noreplace) %{_sysconfdir}/%{name}/chromium-browser.profile
156%config(noreplace) %{_sysconfdir}/%{name}/chromium.profile
157%config(noreplace) %{_sysconfdir}/%{name}/disable-mgmt.inc
158%config(noreplace) %{_sysconfdir}/%{name}/disable-secret.inc
159%config(noreplace) %{_sysconfdir}/%{name}/dropbox.profile
160%config(noreplace) %{_sysconfdir}/%{name}/evince.profile
161%config(noreplace) %{_sysconfdir}/%{name}/firefox.profile
162%config(noreplace) %{_sysconfdir}/%{name}/icedove.profile
163%config(noreplace) %{_sysconfdir}/%{name}/iceweasel.profile
164%config(noreplace) %{_sysconfdir}/%{name}/login.users
165%config(noreplace) %{_sysconfdir}/%{name}/midori.profile
166%config(noreplace) %{_sysconfdir}/%{name}/opera.profile
167%config(noreplace) %{_sysconfdir}/%{name}/thunderbird.profile
168%config(noreplace) %{_sysconfdir}/%{name}/transmission-gtk.profile
169%config(noreplace) %{_sysconfdir}/%{name}/transmission-qt.profile
170%config(noreplace) %{_sysconfdir}/%{name}/vlc.profile
171%config(noreplace) %{_sysconfdir}/%{name}/audacious.profile
172%config(noreplace) %{_sysconfdir}/%{name}/clementine.profile
173%config(noreplace) %{_sysconfdir}/%{name}/gnome-mplayer.profile
174%config(noreplace) %{_sysconfdir}/%{name}/rhythmbox.profile
175%config(noreplace) %{_sysconfdir}/%{name}/totem.profile
176%config(noreplace) %{_sysconfdir}/%{name}/deluge.profile
177%config(noreplace) %{_sysconfdir}/%{name}/qbittorrent.profile
178%config(noreplace) %{_sysconfdir}/%{name}/generic.profile
179%config(noreplace) %{_sysconfdir}/%{name}/deadbeef.profile
180%config(noreplace) %{_sysconfdir}/%{name}/disable-common.inc
181%config(noreplace) %{_sysconfdir}/%{name}/empathy.profile
182%config(noreplace) %{_sysconfdir}/%{name}/filezilla.profile
183%config(noreplace) %{_sysconfdir}/%{name}/icecat.profile
184%config(noreplace) %{_sysconfdir}/%{name}/pidgin.profile
185%config(noreplace) %{_sysconfdir}/%{name}/quassel.profile
186%config(noreplace) %{_sysconfdir}/%{name}/server.profile
187%config(noreplace) %{_sysconfdir}/%{name}/xchat.profile
188%config(noreplace) %{_sysconfdir}/%{name}/fbreader.profile
189%config(noreplace) %{_sysconfdir}/%{name}/spotify.profile
190%config(noreplace) %{_sysconfdir}/%{name}/google-chrome.profile
191%config(noreplace) %{_sysconfdir}/%{name}/skype.profile
192%config(noreplace) %{_sysconfdir}/%{name}/steam.profile
193%config(noreplace) %{_sysconfdir}/%{name}/wine.profile
194%config(noreplace) %{_sysconfdir}/%{name}/disable-devel.inc
195%config(noreplace) %{_sysconfdir}/%{name}/bitlbee.profile
196%config(noreplace) %{_sysconfdir}/%{name}/conkeror.profile
197%config(noreplace) %{_sysconfdir}/%{name}/google-chrome-beta.profile
198%config(noreplace) %{_sysconfdir}/%{name}/google-chrome-stable.profile
199%config(noreplace) %{_sysconfdir}/%{name}/google-chrome-unstable.profile
200%config(noreplace) %{_sysconfdir}/%{name}/hexchat.profile
201%config(noreplace) %{_sysconfdir}/%{name}/nolocal.net
202%config(noreplace) %{_sysconfdir}/%{name}/opera-beta.profile
203%config(noreplace) %{_sysconfdir}/%{name}/parole.profile
204%config(noreplace) %{_sysconfdir}/%{name}/rtorrent.profile
205%config(noreplace) %{_sysconfdir}/%{name}/unbound.profile
206%config(noreplace) %{_sysconfdir}/%{name}/webserver.net
207%config(noreplace) %{_sysconfdir}/%{name}/weechat-curses.profile
208%config(noreplace) %{_sysconfdir}/%{name}/weechat.profile
209%config(noreplace) %{_sysconfdir}/%{name}/whitelist-common.inc
210%config(noreplace) %{_sysconfdir}/%{name}/kmail.profile
211%config(noreplace) %{_sysconfdir}/%{name}/seamonkey.profile
212%config(noreplace) %{_sysconfdir}/%{name}/seamonkey-bin.profile
213%config(noreplace) %{_sysconfdir}/%{name}/telegram.profile
214%config(noreplace) %{_sysconfdir}/%{name}/mathematica.profile
215%config(noreplace) %{_sysconfdir}/%{name}/Mathematica.profile
216%config(noreplace) %{_sysconfdir}/%{name}/uget-gtk.profile
217%config(noreplace) %{_sysconfdir}/%{name}/mupen64plus.profile
218
219/usr/bin/firejail
220/usr/bin/firemon
221/usr/lib/firejail/libtrace.so
222/usr/lib/firejail/libtracelog.so
223/usr/lib/firejail/ftee
224/usr/lib/firejail/fshaper.sh
225/usr/share/doc/packages/firejail/COPYING
226/usr/share/doc/packages/firejail/README
227/usr/share/doc/packages/firejail/RELNOTES
228/usr/share/man/man1/firejail.1.gz
229/usr/share/man/man1/firemon.1.gz
230/usr/share/man/man5/firejail-profile.5.gz
231/usr/share/man/man5/firejail-login.5.gz
232/usr/share/bash-completion/completions/firejail
233/usr/share/bash-completion/completions/firemon
234
235%post
236chmod u+s /usr/bin/firejail
237
238%changelog
239* Wed Feb 3 2016 netblue30 <netblue30@yahoo.com> 0.9.38-1
240 - IPv6 support (--ip6 and --netfilter6)
241 - --join command enhancement (--join-network, --join-filesystem)
242 - added --user command
243 - added --disable-network and --disable-userns compile time flags
244 - Centos 6 support
245 - symlink invocation
246 - added KMail, Seamonkey, Telegram, Mathematica, uGet,
247 and mupen64plus profiles
248 - --chroot in user mode allowed only if seccomp support is available
249 in current Linux kernel
250 - deprecated --private-home feature
251 - the first protocol list installed takes precedence
252 - --tmpfs option allowed only running as root
253 - added --private-tmp option
254 - bugfixes
255
256* Thu Dec 24 2015 netblue30 <netblue30@yahoo.com> 0.9.36-1
257 - added unbound, dnscrypt-proxy, BitlBee, HexChat profiles
258 - added WeeChat, parole and rtorrent profiles
259 - Google Chrome profile rework
260 - added google-chrome-stable profile
261 - added google-chrome-beta profile
262 - added google-chrome-unstable profile
263 - Opera profile rework
264 - added opera-beta profile
265 - added --noblacklist option
266 - added --profile-path option
267 - added --force option
268 - whitelist command enhancements
269 - prevent user name enumeration
270 - added /etc/firejail/nolocal.net network filter
271 - added /etc/firejail/webserver.net network filter
272 - blacklisting firejail configuration by default
273 - allow default gateway configuration for --interface option
274 - --debug enhancements: --debug-check-filenames
275 - --debug enhancements:--debug-blacklists
276 - --debug enhancements: --debug-whitelists
277 - filesystem log
278 - libtrace enhancements, tracing opendir call
279 - added --tracelog option
280 - added "name" command to profile files
281 - added "hostname" command to profile files
282 - added automated feature testing framework
283 - Debian reproducible build
284 - bugfixes
285
286* Sat Nov 7 2015 netblue30 <netblue30@yahoo.com> 0.9.34-1
287 - added --ignore option
288 - added --protocol option
289 - support dual i386/amd64 seccomp filters
290 - added Google Chrome profile
291 - added Steam, Skype, Wine and Conkeror profiles
292 - bugfixes
293
294* Wed Oct 21 2015 netblue30 <netblue30@yahoo.com> 0.9.32-1
295 - added --interface option
296 - added --mtu option
297 - added --private-bin option
298 - added --nosound option
299 - added --hostname option
300 - added --quiet option
301 - added seccomp errno support
302 - added FBReader default profile
303 - added Spotify default profile
304 - lots of default security profile changes
305 - fixed a security problem on multi-user systems
306 - bugfixes
307
308* Mon Sep 14 2015 netblue30 <netblue30@yahoo.com> 0.9.30-1
309 - added a disable-history.inc profile as a result of Firefox PDF.js exploit;
310 disable-history.inc included in all default profiles
311 - Firefox PDF.js exploit (CVE-2015-4495) fixes
312 - added --private-etc option
313 - added --env option
314 - added --whitelist option
315 - support ${HOME} token in include directive in profile files
316 - --private.keep is transitioned to --private-home
317 - support ~ and blanks in blacklist option
318 - support "net none" command in profile files
319 - using /etc/firejail/generic.profile by default for user sessions
320 - using /etc/firejail/server.profile by default for root sessions
321 - added build --enable-fatal-warnings configure option
322 - added persistence to --overlay option
323 - added --overlay-tmpfs option
324 - make install-strip implemented, make install renamed
325 - bugfixes
326
327* Sat Aug 1 2015 netblue30 <netblue30@yahoo.com> 0.9.28-1
328 - network scanning, --scan option
329 - interface MAC address support, --mac option
330 - IP address range, --iprange option
331 - traffic shaping, --bandwidth option
332 - reworked printing of network status at startup
333 - man pages rework
334 - added firejail-login man page
335 - added GNU Icecat, FileZilla, Pidgin, XChat, Empathy, DeaDBeeF default
336 profiles
337 - added an /etc/firejail/disable-common.inc file to hold common directory
338 blacklists
339 - blacklist Opera and Chrome/Chromium config directories in profile files
340 - support noroot option for profile files
341 - enabled noroot in default profile files
342 - bugfixes
343
344* Thu Apr 30 2015 netblue30 <netblue30@yahoo.com> 0.9.26-1
345 - private dev directory
346 - private.keep option for whitelisting home files in a new private directory
347 - user namespaces support, noroot option
348 - added Deluge and qBittorent profiles
349 - bugfixes
350
351* Sun Apr 5 2015 netblue30 <netblue30@yahoo.com> 0.9.24-1
352 - whitelist and blacklist seccomp filters
353 - doubledash option
354 - --shell=none support
355 - netfilter file support in profile files
356 - dns server support in profile files
357 - added --dns.print option
358 - added default profiles for Audoacious, Clementine, Rhythmbox and Totem.
359 - added --caps.drop=all in default profiles
360 - new syscalls in default seccomp filter: sysfs, sysctl, adjtimex, kcmp
361 - clock_adjtime, lookup_dcookie, perf_event_open, fanotify_init
362 - Bugfix: using /proc/sys/kernel/pid_max for the max number of pids
363 - two build patches from Reiner Herman (tickets 11, 12)
364 - man page patch from Reiner Herman (ticket 13)
365 - output patch (ticket 15) from sshirokov
366
367* Mon Mar 9 2015 netblue30 <netblue30@yahoo.com> 0.9.22-1
368 - Replaced --noip option with --ip=none
369 - Container stdout logging and log rotation
370 - Added process_vm_readv, process_vm_writev and mknod to
371 default seccomp blacklist
372 - Added CAP_MKNOD to default caps blacklist
373 - Blacklist and whitelist custom Linux capabilities filters
374 - macvlan device driver support for --net option
375 - DNS server support, --dns option
376 - Netfilter support
377 - Monitor network statistics, --netstats option
378 - Added profile for Mozilla Thunderbird/Icedove
379 - --overlay support for Linux kernels 3.18+
380 - Bugfix: preserve .Xauthority file in private mode (test with ssh -X)
381 - Bugfix: check uid/gid for cgroup
382
383* Fri Feb 6 2015 netblue30 <netblue30@yahoo.com> 0.9.20-1
384 - utmp, btmp and wtmp enhancements
385 - create empty /var/log/wtmp and /var/log/btmp files in sandbox
386 - generate a new /var/run/utmp file in sandbox
387 - CPU affinity, --cpu option
388 - Linux control groups support, --cgroup option
389 - Opera web browser support
390 - VLC support
391 - Added "empty" attribute to seccomp command to remove the default
392 - syscall list form seccomp blacklist
393 - Added --nogroups option to disable supplementary groups for regular
394 - users. root user always runs without supplementary groups.
395 - firemon enhancements
396 - display the command that started the sandbox
397 - added --caps option to display capabilities for all sandboxes
398 - added --cgroup option to display the control groups for all sandboxes
399 - added --cpu option to display CPU affinity for all sandboxes
400 - added --seccomp option to display seccomp setting for all sandboxes
401 - New compile time options: --disable-chroot, --disable-bind
402 - bugfixes
403
404* Sat Dec 27 2014 netblue30 <netblue30@yahoo.com> 0.9.18-1
405 - Support for tracing system, setuid, setgid, setfsuid, setfsgid syscalls
406 - Support for tracing setreuid, setregid, setresuid, setresguid syscalls
407 - Added profiles for transmission-gtk and transmission-qt
408 - bugfixes
409
410* Tue Nov 4 2014 netblue30 <netblue30@yahoo.com> 0.9.16-1
411 - Configurable private home directory
412 - Configurable default user shell
413 - Software configuration support for --docdir and DESTDIR
414 - Profile file support for include, caps, seccomp and private keywords
415 - Dropbox profile file
416 - Linux capabilities and seccomp filters enabled by default for Firefox,
417 Midori, Evince and Dropbox
418 - bugfixes
419
420* Wed Oct 8 2014 netblue30 <netblue30@yahoo.com> 0.9.14-1
421 - Linux capabilities and seccomp filters are automatically enabled in
422 chroot mode (--chroot option) if the sandbox is started as regular
423 user
424 - Added support for user defined seccomp blacklists
425 - Added syscall trace support
426 - Added --tmpfs option
427 - Added --balcklist option
428 - Added --read-only option
429 - Added --bind option
430 - Logging enhancements
431 - --overlay option was reactivated
432 - Added firemon support to print the ARP table for each sandbox
433 - Added firemon support to print the route table for each sandbox
434 - Added firemon support to print interface information for each sandbox
435 - bugfixes
436
437* Tue Sep 16 2014 netblue30 <netblue30@yahoo.com> 0.9.12-1
438 - Added capabilities support
439 - Added support for CentOS 7
440 - bugfixes
441
442EOF
443
444echo "building rpm"
445rpmbuild -ba SPECS/firejail.spec
446rpm -qpl RPMS/x86_64/firejail-$VERSION-1.x86_64.rpm
447cd ..
448rm -f firejail-$VERSION-1.x86_64.rpm
449cp rpmbuild/RPMS/x86_64/firejail-$VERSION-1.x86_64.rpm .
450