aboutsummaryrefslogtreecommitdiffstats
path: root/platform/rpm/old-mkrpm.sh
diff options
context:
space:
mode:
Diffstat (limited to 'platform/rpm/old-mkrpm.sh')
-rwxr-xr-xplatform/rpm/old-mkrpm.sh417
1 files changed, 0 insertions, 417 deletions
diff --git a/platform/rpm/old-mkrpm.sh b/platform/rpm/old-mkrpm.sh
deleted file mode 100755
index 5775783af..000000000
--- a/platform/rpm/old-mkrpm.sh
+++ /dev/null
@@ -1,417 +0,0 @@
1#!/bin/bash
2VERSION="0.9.36"
3rm -fr ~/rpmbuild
4rm -f firejail-$VERSION-1.x86_64.rpm
5
6mkdir -p ~/rpmbuild/{RPMS,SRPMS,BUILD,SOURCES,SPECS,tmp}
7cat <<EOF >~/.rpmmacros
8%_topdir %(echo $HOME)/rpmbuild
9%_tmppath %{_topdir}/tmp
10EOF
11
12cd ~/rpmbuild
13echo "building directory tree"
14
15mkdir -p firejail-$VERSION/usr/bin
16install -m 755 /usr/bin/firejail firejail-$VERSION/usr/bin/.
17install -m 755 /usr/bin/firemon firejail-$VERSION/usr/bin/.
18
19mkdir -p firejail-$VERSION/usr/lib/firejail
20install -m 644 /usr/lib/firejail/libtrace.so firejail-$VERSION/usr/lib/firejail/.
21install -m 644 /usr/lib/firejail/libtracelog.so firejail-$VERSION/usr/lib/firejail/.
22install -m 755 /usr/lib/firejail/ftee firejail-$VERSION/usr/lib/firejail/.
23install -m 755 /usr/lib/firejail/fshaper.sh firejail-$VERSION/usr/lib/firejail/.
24
25mkdir -p firejail-$VERSION/usr/share/man/man1
26install -m 644 /usr/share/man/man1/firejail.1.gz firejail-$VERSION/usr/share/man/man1/.
27install -m 644 /usr/share/man/man1/firemon.1.gz firejail-$VERSION/usr/share/man/man1/.
28
29mkdir -p firejail-$VERSION/usr/share/man/man5
30install -m 644 /usr/share/man/man5/firejail-profile.5.gz firejail-$VERSION/usr/share/man/man5/.
31install -m 644 /usr/share/man/man5/firejail-login.5.gz firejail-$VERSION/usr/share/man/man5/.
32
33mkdir -p firejail-$VERSION/usr/share/doc/packages/firejail
34install -m 644 /usr/share/doc/firejail/COPYING firejail-$VERSION/usr/share/doc/packages/firejail/.
35install -m 644 /usr/share/doc/firejail/README firejail-$VERSION/usr/share/doc/packages/firejail/.
36install -m 644 /usr/share/doc/firejail/RELNOTES firejail-$VERSION/usr/share/doc/packages/firejail/.
37
38mkdir -p firejail-$VERSION/etc/firejail
39install -m 644 /etc/firejail/xchat.profile firejail-$VERSION/etc/firejail/xchat.profile
40install -m 644 /etc/firejail/server.profile firejail-$VERSION/etc/firejail/server.profile
41install -m 644 /etc/firejail/quassel.profile firejail-$VERSION/etc/firejail/quassel.profile
42install -m 644 /etc/firejail/pidgin.profile firejail-$VERSION/etc/firejail/pidgin.profile
43install -m 644 /etc/firejail/icecat.profile firejail-$VERSION/etc/firejail/icecat.profile
44install -m 644 /etc/firejail/filezilla.profile firejail-$VERSION/etc/firejail/filezilla.profile
45install -m 644 /etc/firejail/chromium-browser.profile firejail-$VERSION/etc/firejail/chromium-browser.profile
46install -m 644 /etc/firejail/chromium.profile firejail-$VERSION/etc/firejail/chromium.profile
47install -m 644 /etc/firejail/dropbox.profile firejail-$VERSION/etc/firejail/dropbox.profile
48install -m 644 /etc/firejail/disable-common.inc firejail-$VERSION/etc/firejail/disable-common.inc
49install -m 644 /etc/firejail/disable-secret.inc firejail-$VERSION/etc/firejail/disable-secret.inc
50install -m 644 /etc/firejail/disable-mgmt.inc firejail-$VERSION/etc/firejail/disable-mgmt.inc
51install -m 644 /etc/firejail/evince.profile firejail-$VERSION/etc/firejail/evince.profile
52install -m 644 /etc/firejail/firefox.profile firejail-$VERSION/etc/firejail/firefox.profile
53install -m 644 /etc/firejail/icedove.profile firejail-$VERSION/etc/firejail/icedove.profile
54install -m 644 /etc/firejail/iceweasel.profile firejail-$VERSION/etc/firejail/iceweasel.profile
55install -m 644 /etc/firejail/midori.profile firejail-$VERSION/etc/firejail/midori.profile
56install -m 644 /etc/firejail/thunderbird.profile firejail-$VERSION/etc/firejail/thunderbird.profile
57install -m 644 /etc/firejail/opera.profile firejail-$VERSION/etc/firejail/opera.profile
58install -m 644 /etc/firejail/transmission-gtk.profile firejail-$VERSION/etc/firejail/transmission-gtk.profile
59install -m 644 /etc/firejail/transmission-qt.profile firejail-$VERSION/etc/firejail/transmission-qt.profile
60install -m 644 /etc/firejail/vlc.profile firejail-$VERSION/etc/firejail/vlc.profile
61install -m 644 /etc/firejail/audacious.profile firejail-$VERSION/etc/firejail/audacious.profile
62install -m 644 /etc/firejail/clementine.profile firejail-$VERSION/etc/firejail/clementine.profile
63install -m 644 /etc/firejail/gnome-mplayer.profile firejail-$VERSION/etc/firejail/gnome-mplayer.profile
64install -m 644 /etc/firejail/rhythmbox.profile firejail-$VERSION/etc/firejail/rhythmbox.profile
65install -m 644 /etc/firejail/totem.profile firejail-$VERSION/etc/firejail/totem.profile
66install -m 644 /etc/firejail/deluge.profile firejail-$VERSION/etc/firejail/deluge.profile
67install -m 644 /etc/firejail/qbittorrent.profile firejail-$VERSION/etc/firejail/qbittorrent.profile
68install -m 644 /etc/firejail/generic.profile firejail-$VERSION/etc/firejail/generic.profile
69install -m 644 /etc/firejail/login.users firejail-$VERSION/etc/firejail/login.users
70install -m 644 /etc/firejail/deadbeef.profile firejail-$VERSION/etc/firejail/deadbeef.profile
71install -m 644 /etc/firejail/empathy.profile firejail-$VERSION/etc/firejail/empathy.profile
72install -m 644 /etc/firejail/fbreader.profile firejail-$VERSION/etc/firejail/fbreader.profile
73install -m 644 /etc/firejail/spotify.profile firejail-$VERSION/etc/firejail/spotify.profile
74install -m 644 /etc/firejail/google-chrome.profile firejail-$VERSION/etc/firejail/google-chrome.profile
75install -m 644 /etc/firejail/skype.profile firejail-$VERSION/etc/firejail/skype.profile
76install -m 644 /etc/firejail/steam.profile firejail-$VERSION/etc/firejail/steam.profile
77install -m 644 /etc/firejail/wine.profile firejail-$VERSION/etc/firejail/wine.profile
78install -m 644 /etc/firejail/disable-devel.inc firejail-$VERSION/etc/firejail/disable-devel.inc
79
80install -m 644 /etc/firejail/bitlbee.profile firejail-$VERSION/etc/firejail/bitlbee.profile
81install -m 644 /etc/firejail/conkeror.profile firejail-$VERSION/etc/firejail/conkeror.profile
82install -m 644 /etc/firejail/google-chrome-beta.profile firejail-$VERSION/etc/firejail/google-chrome-beta.profile
83install -m 644 /etc/firejail/google-chrome-stable.profile firejail-$VERSION/etc/firejail/google-chrome-stable.profile
84install -m 644 /etc/firejail/google-chrome-unstable.profile firejail-$VERSION/etc/firejail/google-chrome-unstable.profile
85install -m 644 /etc/firejail/hexchat.profile firejail-$VERSION/etc/firejail/hexchat.profile
86install -m 644 /etc/firejail/konqueror.profile firejail-$VERSION/etc/firejail/konqueror.profile
87install -m 644 /etc/firejail/nolocal.net firejail-$VERSION/etc/firejail/nolocal.net
88install -m 644 /etc/firejail/opera-beta.profile firejail-$VERSION/etc/firejail/opera-beta.profile
89install -m 644 /etc/firejail/parole.profile firejail-$VERSION/etc/firejail/parole.profile
90install -m 644 /etc/firejail/rtorrent.profile firejail-$VERSION/etc/firejail/rtorrent.profile
91install -m 644 /etc/firejail/unbound.profile firejail-$VERSION/etc/firejail/unbound.profile
92install -m 644 /etc/firejail/webserver.net firejail-$VERSION/etc/firejail/webserver.net
93install -m 644 /etc/firejail/weechat-curses.profile firejail-$VERSION/etc/firejail/weechat-curses.profile
94install -m 644 /etc/firejail/weechat.profile firejail-$VERSION/etc/firejail/weechat.profile
95install -m 644 /etc/firejail/whitelist-common.inc firejail-$VERSION/etc/firejail/whitelist-common.inc
96
97mkdir -p firejail-$VERSION/usr/share/bash-completion/completions
98install -m 644 /usr/share/bash-completion/completions/firejail firejail-$VERSION/usr/share/bash-completion/completions/.
99install -m 644 /usr/share/bash-completion/completions/firemon firejail-$VERSION/usr/share/bash-completion/completions/.
100
101echo "building tar.gz archive"
102tar -czvf firejail-$VERSION.tar.gz firejail-$VERSION
103
104cp firejail-$VERSION.tar.gz SOURCES/.
105
106echo "building config spec"
107cat <<EOF > SPECS/firejail.spec
108%define __spec_install_post %{nil}
109%define debug_package %{nil}
110%define __os_install_post %{_dbpath}/brp-compress
111
112Summary: Linux namepaces sandbox program
113Name: firejail
114Version: $VERSION
115Release: 1
116License: GPL+
117Group: Development/Tools
118SOURCE0 : %{name}-%{version}.tar.gz
119URL: http://firejail.wordpress.com
120
121BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root
122
123%description
124Firejail is a SUID sandbox program that reduces the risk of security
125breaches by restricting the running environment of untrusted applications
126using Linux namespaces. It includes a sandbox profile for Mozilla Firefox.
127
128%prep
129%setup -q
130
131%build
132
133%install
134rm -rf %{buildroot}
135mkdir -p %{buildroot}
136
137cp -a * %{buildroot}
138
139
140%clean
141rm -rf %{buildroot}
142
143
144%files
145%defattr(-,root,root,-)
146%config(noreplace) %{_sysconfdir}/%{name}/chromium-browser.profile
147%config(noreplace) %{_sysconfdir}/%{name}/chromium.profile
148%config(noreplace) %{_sysconfdir}/%{name}/disable-mgmt.inc
149%config(noreplace) %{_sysconfdir}/%{name}/disable-secret.inc
150%config(noreplace) %{_sysconfdir}/%{name}/dropbox.profile
151%config(noreplace) %{_sysconfdir}/%{name}/evince.profile
152%config(noreplace) %{_sysconfdir}/%{name}/firefox.profile
153%config(noreplace) %{_sysconfdir}/%{name}/icedove.profile
154%config(noreplace) %{_sysconfdir}/%{name}/iceweasel.profile
155%config(noreplace) %{_sysconfdir}/%{name}/login.users
156%config(noreplace) %{_sysconfdir}/%{name}/midori.profile
157%config(noreplace) %{_sysconfdir}/%{name}/opera.profile
158%config(noreplace) %{_sysconfdir}/%{name}/thunderbird.profile
159%config(noreplace) %{_sysconfdir}/%{name}/transmission-gtk.profile
160%config(noreplace) %{_sysconfdir}/%{name}/transmission-qt.profile
161%config(noreplace) %{_sysconfdir}/%{name}/vlc.profile
162%config(noreplace) %{_sysconfdir}/%{name}/audacious.profile
163%config(noreplace) %{_sysconfdir}/%{name}/clementine.profile
164%config(noreplace) %{_sysconfdir}/%{name}/gnome-mplayer.profile
165%config(noreplace) %{_sysconfdir}/%{name}/rhythmbox.profile
166%config(noreplace) %{_sysconfdir}/%{name}/totem.profile
167%config(noreplace) %{_sysconfdir}/%{name}/deluge.profile
168%config(noreplace) %{_sysconfdir}/%{name}/qbittorrent.profile
169%config(noreplace) %{_sysconfdir}/%{name}/generic.profile
170%config(noreplace) %{_sysconfdir}/%{name}/deadbeef.profile
171%config(noreplace) %{_sysconfdir}/%{name}/disable-common.inc
172%config(noreplace) %{_sysconfdir}/%{name}/empathy.profile
173%config(noreplace) %{_sysconfdir}/%{name}/filezilla.profile
174%config(noreplace) %{_sysconfdir}/%{name}/icecat.profile
175%config(noreplace) %{_sysconfdir}/%{name}/pidgin.profile
176%config(noreplace) %{_sysconfdir}/%{name}/quassel.profile
177%config(noreplace) %{_sysconfdir}/%{name}/server.profile
178%config(noreplace) %{_sysconfdir}/%{name}/xchat.profile
179%config(noreplace) %{_sysconfdir}/%{name}/fbreader.profile
180%config(noreplace) %{_sysconfdir}/%{name}/spotify.profile
181%config(noreplace) %{_sysconfdir}/%{name}/google-chrome.profile
182%config(noreplace) %{_sysconfdir}/%{name}/skype.profile
183%config(noreplace) %{_sysconfdir}/%{name}/steam.profile
184%config(noreplace) %{_sysconfdir}/%{name}/wine.profile
185%config(noreplace) %{_sysconfdir}/%{name}/disable-devel.inc
186%config(noreplace) %{_sysconfdir}/%{name}/bitlbee.profile
187%config(noreplace) %{_sysconfdir}/%{name}/conkeror.profile
188%config(noreplace) %{_sysconfdir}/%{name}/google-chrome-beta.profile
189%config(noreplace) %{_sysconfdir}/%{name}/google-chrome-stable.profile
190%config(noreplace) %{_sysconfdir}/%{name}/google-chrome-unstable.profile
191%config(noreplace) %{_sysconfdir}/%{name}/hexchat.profile
192%config(noreplace) %{_sysconfdir}/%{name}/konqueror.profile
193%config(noreplace) %{_sysconfdir}/%{name}/nolocal.net
194%config(noreplace) %{_sysconfdir}/%{name}/opera-beta.profile
195%config(noreplace) %{_sysconfdir}/%{name}/parole.profile
196%config(noreplace) %{_sysconfdir}/%{name}/rtorrent.profile
197%config(noreplace) %{_sysconfdir}/%{name}/unbound.profile
198%config(noreplace) %{_sysconfdir}/%{name}/webserver.net
199%config(noreplace) %{_sysconfdir}/%{name}/weechat-curses.profile
200%config(noreplace) %{_sysconfdir}/%{name}/weechat.profile
201%config(noreplace) %{_sysconfdir}/%{name}/whitelist-common.inc
202
203/usr/bin/firejail
204/usr/bin/firemon
205/usr/lib/firejail/libtrace.so
206/usr/lib/firejail/libtracelog.so
207/usr/lib/firejail/ftee
208/usr/lib/firejail/fshaper.sh
209/usr/share/doc/packages/firejail/COPYING
210/usr/share/doc/packages/firejail/README
211/usr/share/doc/packages/firejail/RELNOTES
212/usr/share/man/man1/firejail.1.gz
213/usr/share/man/man1/firemon.1.gz
214/usr/share/man/man5/firejail-profile.5.gz
215/usr/share/man/man5/firejail-login.5.gz
216/usr/share/bash-completion/completions/firejail
217/usr/share/bash-completion/completions/firemon
218
219%post
220chmod u+s /usr/bin/firejail
221
222%changelog
223* Thu Dec 24 2015 netblue30 <netblue30@yahoo.com> 0.9.36-1
224 - added unbound, dnscrypt-proxy, BitlBee, HexChat profiles
225 - added WeeChat, parole and rtorrent profiles
226 - Google Chrome profile rework
227 - added google-chrome-stable profile
228 - added google-chrome-beta profile
229 - added google-chrome-unstable profile
230 - Opera profile rework
231 - added opera-beta profile
232 - added --noblacklist option
233 - added --profile-path option
234 - added --force option
235 - whitelist command enhancements
236 - prevent user name enumeration
237 - added /etc/firejail/nolocal.net network filter
238 - added /etc/firejail/webserver.net network filter
239 - blacklisting firejail configuration by default
240 - allow default gateway configuration for --interface option
241 - --debug enhancements: --debug-check-filenames
242 - --debug enhancements:--debug-blacklists
243 - --debug enhancements: --debug-whitelists
244 - filesystem log
245 - libtrace enhancements, tracing opendir call
246 - added --tracelog option
247 - added "name" command to profile files
248 - added "hostname" command to profile files
249 - added automated feature testing framework
250 - Debian reproducible build
251 - bugfixes
252
253* Sat Nov 7 2015 netblue30 <netblue30@yahoo.com> 0.9.34-1
254 - added --ignore option
255 - added --protocol option
256 - support dual i386/amd64 seccomp filters
257 - added Google Chrome profile
258 - added Steam, Skype, Wine and Conkeror profiles
259 - bugfixes
260
261* Wed Oct 21 2015 netblue30 <netblue30@yahoo.com> 0.9.32-1
262 - added --interface option
263 - added --mtu option
264 - added --private-bin option
265 - added --nosound option
266 - added --hostname option
267 - added --quiet option
268 - added seccomp errno support
269 - added FBReader default profile
270 - added Spotify default profile
271 - lots of default security profile changes
272 - fixed a security problem on multi-user systems
273 - bugfixes
274
275* Mon Sep 14 2015 netblue30 <netblue30@yahoo.com> 0.9.30-1
276 - added a disable-history.inc profile as a result of Firefox PDF.js exploit;
277 disable-history.inc included in all default profiles
278 - Firefox PDF.js exploit (CVE-2015-4495) fixes
279 - added --private-etc option
280 - added --env option
281 - added --whitelist option
282 - support ${HOME} token in include directive in profile files
283 - --private.keep is transitioned to --private-home
284 - support ~ and blanks in blacklist option
285 - support "net none" command in profile files
286 - using /etc/firejail/generic.profile by default for user sessions
287 - using /etc/firejail/server.profile by default for root sessions
288 - added build --enable-fatal-warnings configure option
289 - added persistence to --overlay option
290 - added --overlay-tmpfs option
291 - make install-strip implemented, make install renamed
292 - bugfixes
293
294* Sat Aug 1 2015 netblue30 <netblue30@yahoo.com> 0.9.28-1
295 - network scanning, --scan option
296 - interface MAC address support, --mac option
297 - IP address range, --iprange option
298 - traffic shaping, --bandwidth option
299 - reworked printing of network status at startup
300 - man pages rework
301 - added firejail-login man page
302 - added GNU Icecat, FileZilla, Pidgin, XChat, Empathy, DeaDBeeF default
303 profiles
304 - added an /etc/firejail/disable-common.inc file to hold common directory
305 blacklists
306 - blacklist Opera and Chrome/Chromium config directories in profile files
307 - support noroot option for profile files
308 - enabled noroot in default profile files
309 - bugfixes
310
311* Thu Apr 30 2015 netblue30 <netblue30@yahoo.com> 0.9.26-1
312 - private dev directory
313 - private.keep option for whitelisting home files in a new private directory
314 - user namespaces support, noroot option
315 - added Deluge and qBittorent profiles
316 - bugfixes
317
318* Sun Apr 5 2015 netblue30 <netblue30@yahoo.com> 0.9.24-1
319 - whitelist and blacklist seccomp filters
320 - doubledash option
321 - --shell=none support
322 - netfilter file support in profile files
323 - dns server support in profile files
324 - added --dns.print option
325 - added default profiles for Audoacious, Clementine, Rhythmbox and Totem.
326 - added --caps.drop=all in default profiles
327 - new syscalls in default seccomp filter: sysfs, sysctl, adjtimex, kcmp
328 - clock_adjtime, lookup_dcookie, perf_event_open, fanotify_init
329 - Bugfix: using /proc/sys/kernel/pid_max for the max number of pids
330 - two build patches from Reiner Herman (tickets 11, 12)
331 - man page patch from Reiner Herman (ticket 13)
332 - output patch (ticket 15) from sshirokov
333
334* Mon Mar 9 2015 netblue30 <netblue30@yahoo.com> 0.9.22-1
335 - Replaced --noip option with --ip=none
336 - Container stdout logging and log rotation
337 - Added process_vm_readv, process_vm_writev and mknod to
338 default seccomp blacklist
339 - Added CAP_MKNOD to default caps blacklist
340 - Blacklist and whitelist custom Linux capabilities filters
341 - macvlan device driver support for --net option
342 - DNS server support, --dns option
343 - Netfilter support
344 - Monitor network statistics, --netstats option
345 - Added profile for Mozilla Thunderbird/Icedove
346 - --overlay support for Linux kernels 3.18+
347 - Bugfix: preserve .Xauthority file in private mode (test with ssh -X)
348 - Bugfix: check uid/gid for cgroup
349
350* Fri Feb 6 2015 netblue30 <netblue30@yahoo.com> 0.9.20-1
351 - utmp, btmp and wtmp enhancements
352 - create empty /var/log/wtmp and /var/log/btmp files in sandbox
353 - generate a new /var/run/utmp file in sandbox
354 - CPU affinity, --cpu option
355 - Linux control groups support, --cgroup option
356 - Opera web browser support
357 - VLC support
358 - Added "empty" attribute to seccomp command to remove the default
359 - syscall list form seccomp blacklist
360 - Added --nogroups option to disable supplementary groups for regular
361 - users. root user always runs without supplementary groups.
362 - firemon enhancements
363 - display the command that started the sandbox
364 - added --caps option to display capabilities for all sandboxes
365 - added --cgroup option to display the control groups for all sandboxes
366 - added --cpu option to display CPU affinity for all sandboxes
367 - added --seccomp option to display seccomp setting for all sandboxes
368 - New compile time options: --disable-chroot, --disable-bind
369 - bugfixes
370
371* Sat Dec 27 2014 netblue30 <netblue30@yahoo.com> 0.9.18-1
372 - Support for tracing system, setuid, setgid, setfsuid, setfsgid syscalls
373 - Support for tracing setreuid, setregid, setresuid, setresguid syscalls
374 - Added profiles for transmission-gtk and transmission-qt
375 - bugfixes
376
377* Tue Nov 4 2014 netblue30 <netblue30@yahoo.com> 0.9.16-1
378 - Configurable private home directory
379 - Configurable default user shell
380 - Software configuration support for --docdir and DESTDIR
381 - Profile file support for include, caps, seccomp and private keywords
382 - Dropbox profile file
383 - Linux capabilities and seccomp filters enabled by default for Firefox,
384 Midori, Evince and Dropbox
385 - bugfixes
386
387* Wed Oct 8 2014 netblue30 <netblue30@yahoo.com> 0.9.14-1
388 - Linux capabilities and seccomp filters are automatically enabled in
389 chroot mode (--chroot option) if the sandbox is started as regular
390 user
391 - Added support for user defined seccomp blacklists
392 - Added syscall trace support
393 - Added --tmpfs option
394 - Added --balcklist option
395 - Added --read-only option
396 - Added --bind option
397 - Logging enhancements
398 - --overlay option was reactivated
399 - Added firemon support to print the ARP table for each sandbox
400 - Added firemon support to print the route table for each sandbox
401 - Added firemon support to print interface information for each sandbox
402 - bugfixes
403
404* Tue Sep 16 2014 netblue30 <netblue30@yahoo.com> 0.9.12-1
405 - Added capabilities support
406 - Added support for CentOS 7
407 - bugfixes
408
409EOF
410
411echo "building rpm"
412rpmbuild -ba SPECS/firejail.spec
413rpm -qpl RPMS/x86_64/firejail-$VERSION-1.x86_64.rpm
414cd ..
415rm -f firejail-$VERSION-1.x86_64.rpm
416cp rpmbuild/RPMS/x86_64/firejail-$VERSION-1.x86_64.rpm .
417