aboutsummaryrefslogtreecommitdiffstats
path: root/platform
diff options
context:
space:
mode:
Diffstat (limited to 'platform')
-rw-r--r--platform/debian/conffiles10
-rw-r--r--platform/debian/firejail.lintian-overrides2
-rw-r--r--platform/rpm/firejail.spec163
-rwxr-xr-xplatform/rpm/mkrpm.sh309
-rwxr-xr-xplatform/rpm/old-mkrpm.sh417
5 files changed, 53 insertions, 848 deletions
diff --git a/platform/debian/conffiles b/platform/debian/conffiles
index 83a4404cf..a2c3727ce 100644
--- a/platform/debian/conffiles
+++ b/platform/debian/conffiles
@@ -21,6 +21,7 @@
21/etc/firejail/vlc.profile 21/etc/firejail/vlc.profile
22/etc/firejail/audacious.profile 22/etc/firejail/audacious.profile
23/etc/firejail/clementine.profile 23/etc/firejail/clementine.profile
24/etc/firejail/epiphany.profile
24/etc/firejail/gnome-mplayer.profile 25/etc/firejail/gnome-mplayer.profile
25/etc/firejail/rhythmbox.profile 26/etc/firejail/rhythmbox.profile
26/etc/firejail/totem.profile 27/etc/firejail/totem.profile
@@ -55,3 +56,12 @@
55/etc/firejail/rtorrent.profile 56/etc/firejail/rtorrent.profile
56/etc/firejail/parole.profile 57/etc/firejail/parole.profile
57/etc/firejail/kmail.profile 58/etc/firejail/kmail.profile
59/etc/firejail/seamonkey.profile
60/etc/firejail/seamonkey-bin.profile
61/etc/firejail/telegram.profile
62/etc/firejail/mathematica.profile
63/etc/firejail/Mathematica.profile
64/etc/firejail/uget-gtk.profile
65/etc/firejail/mupen64plus.profile
66/etc/disable-terminals.inc
67/etc/lxterminal.profile
diff --git a/platform/debian/firejail.lintian-overrides b/platform/debian/firejail.lintian-overrides
new file mode 100644
index 000000000..5b5f7e7ef
--- /dev/null
+++ b/platform/debian/firejail.lintian-overrides
@@ -0,0 +1,2 @@
1# Firejail binary should be setuid
2firejail binary: setuid-binary usr/bin/firejail 4755 root/root
diff --git a/platform/rpm/firejail.spec b/platform/rpm/firejail.spec
index f1bf7ad7b..e365af2d6 100644
--- a/platform/rpm/firejail.spec
+++ b/platform/rpm/firejail.spec
@@ -1,5 +1,5 @@
1Name: firejail 1Name: __NAME__
2Version: 0.9.30 2Version: __VERSION__
3Release: 1 3Release: 1
4Summary: Linux namepaces sandbox program 4Summary: Linux namepaces sandbox program
5 5
@@ -19,7 +19,7 @@ using Linux namespaces. It includes a sandbox profile for Mozilla Firefox.
19%setup -q 19%setup -q
20 20
21%build 21%build
22%configure 22%configure --disable-userns
23make %{?_smp_mflags} 23make %{?_smp_mflags}
24 24
25%install 25%install
@@ -29,156 +29,21 @@ rm -rf %{buildroot}
29%clean 29%clean
30rm -rf %{buildroot} 30rm -rf %{buildroot}
31 31
32
33%files 32%files
34%doc 33%doc
35%defattr(-, root, root, -) 34%defattr(-, root, root, -)
36%attr(4755, -, -) %{_bindir}/firejail 35%attr(4755, -, -) %{_bindir}/__NAME__
37%{_bindir}/firemon 36%{_bindir}/firemon
38%{_libdir}/firejail/ftee 37%{_libdir}/__NAME__/ftee
39%{_libdir}/firejail/fshaper.sh 38%{_libdir}/__NAME__/fshaper.sh
40%{_libdir}/firejail/libtrace.so 39%{_libdir}/__NAME__/libtrace.so
41%{_datarootdir}/bash-completion/completions/firejail 40%{_libdir}/__NAME__/libtracelog.so
41%{_datarootdir}/bash-completion/completions/__NAME__
42%{_datarootdir}/bash-completion/completions/firemon 42%{_datarootdir}/bash-completion/completions/firemon
43%{_docdir}/firejail 43%{_docdir}/__NAME__
44%{_mandir}/man1/firejail.1.gz 44%{_mandir}/man1/__NAME__.1.gz
45%{_mandir}/man1/firemon.1.gz 45%{_mandir}/man1/firemon.1.gz
46%{_mandir}/man5/firejail-login.5.gz 46%{_mandir}/man5/__NAME__-login.5.gz
47%{_mandir}/man5/firejail-profile.5.gz 47%{_mandir}/man5/__NAME__-profile.5.gz
48%config %{_sysconfdir}/firejail 48%config %{_sysconfdir}/__NAME__
49
50%changelog
51* Mon Sep 14 2015 netblue30 <netblue30@yahoo.com> 0.9.30-1
52 - added a disable-history.inc profile as a result of Firefox PDF.js exploit;
53 disable-history.inc included in all default profiles
54 - Firefox PDF.js exploit (CVE-2015-4495) fixes
55 - added --private-etc option
56 - added --env option
57 - added --whitelist option
58 - support ${HOME} token in include directive in profile files
59 - --private.keep is transitioned to --private-home
60 - support ~ and blanks in blacklist option
61 - support "net none" command in profile files
62 - using /etc/firejail/generic.profile by default for user sessions
63 - using /etc/firejail/server.profile by default for root sessions
64 - added build --enable-fatal-warnings configure option
65 - added persistence to --overlay option
66 - added --overlay-tmpfs option
67 - make install-strip implemented, make install renamed
68 - bugfixes
69
70* Sat Aug 1 2015 netblue30 <netblue30@yahoo.com> 0.9.28-1
71 - network scanning, --scan option
72 - interface MAC address support, --mac option
73 - IP address range, --iprange option
74 - traffic shaping, --bandwidth option
75 - reworked printing of network status at startup
76 - man pages rework
77 - added firejail-login man page
78 - added GNU Icecat, FileZilla, Pidgin, XChat, Empathy, DeaDBeeF default
79 profiles
80 - added an /etc/firejail/disable-common.inc file to hold common directory
81 blacklists
82 - blacklist Opera and Chrome/Chromium config directories in profile files
83 - support noroot option for profile files
84 - enabled noroot in default profile files
85 - bugfixes
86
87* Thu Apr 30 2015 netblue30 <netblue30@yahoo.com> 0.9.26-1
88 - private dev directory
89 - private.keep option for whitelisting home files in a new private directory
90 - user namespaces support, noroot option
91 - added Deluge and qBittorent profiles
92 - bugfixes
93
94* Sun Apr 5 2015 netblue30 <netblue30@yahoo.com> 0.9.24-1
95 - whitelist and blacklist seccomp filters
96 - doubledash option
97 - --shell=none support
98 - netfilter file support in profile files
99 - dns server support in profile files
100 - added --dns.print option
101 - added default profiles for Audoacious, Clementine, Rhythmbox and Totem.
102 - added --caps.drop=all in default profiles
103 - new syscalls in default seccomp filter: sysfs, sysctl, adjtimex, kcmp
104 - clock_adjtime, lookup_dcookie, perf_event_open, fanotify_init
105 - Bugfix: using /proc/sys/kernel/pid_max for the max number of pids
106 - two build patches from Reiner Herman (tickets 11, 12)
107 - man page patch from Reiner Herman (ticket 13)
108 - output patch (ticket 15) from sshirokov
109
110* Mon Mar 9 2015 netblue30 <netblue30@yahoo.com> 0.9.22-1
111 - Replaced --noip option with --ip=none
112 - Container stdout logging and log rotation
113 - Added process_vm_readv, process_vm_writev and mknod to
114 default seccomp blacklist
115 - Added CAP_MKNOD to default caps blacklist
116 - Blacklist and whitelist custom Linux capabilities filters
117 - macvlan device driver support for --net option
118 - DNS server support, --dns option
119 - Netfilter support
120 - Monitor network statistics, --netstats option
121 - Added profile for Mozilla Thunderbird/Icedove
122 - --overlay support for Linux kernels 3.18+
123 - Bugfix: preserve .Xauthority file in private mode (test with ssh -X)
124 - Bugfix: check uid/gid for cgroup
125
126* Fri Feb 6 2015 netblue30 <netblue30@yahoo.com> 0.9.20-1
127 - utmp, btmp and wtmp enhancements
128 - create empty /var/log/wtmp and /var/log/btmp files in sandbox
129 - generate a new /var/run/utmp file in sandbox
130 - CPU affinity, --cpu option
131 - Linux control groups support, --cgroup option
132 - Opera web browser support
133 - VLC support
134 - Added "empty" attribute to seccomp command to remove the default
135 - syscall list form seccomp blacklist
136 - Added --nogroups option to disable supplementary groups for regular
137 - users. root user always runs without supplementary groups.
138 - firemon enhancements
139 - display the command that started the sandbox
140 - added --caps option to display capabilities for all sandboxes
141 - added --cgroup option to display the control groups for all sandboxes
142 - added --cpu option to display CPU affinity for all sandboxes
143 - added --seccomp option to display seccomp setting for all sandboxes
144 - New compile time options: --disable-chroot, --disable-bind
145 - bugfixes
146
147* Sat Dec 27 2014 netblue30 <netblue30@yahoo.com> 0.9.18-1
148 - Support for tracing system, setuid, setgid, setfsuid, setfsgid syscalls
149 - Support for tracing setreuid, setregid, setresuid, setresguid syscalls
150 - Added profiles for transmission-gtk and transmission-qt
151 - bugfixes
152
153* Tue Nov 4 2014 netblue30 <netblue30@yahoo.com> 0.9.16-1
154 - Configurable private home directory
155 - Configurable default user shell
156 - Software configuration support for --docdir and DESTDIR
157 - Profile file support for include, caps, seccomp and private keywords
158 - Dropbox profile file
159 - Linux capabilities and seccomp filters enabled by default for Firefox,
160 Midori, Evince and Dropbox
161 - bugfixes
162
163* Wed Oct 8 2014 netblue30 <netblue30@yahoo.com> 0.9.14-1
164 - Linux capabilities and seccomp filters are automatically enabled in
165 chroot mode (--chroot option) if the sandbox is started as regular
166 user
167 - Added support for user defined seccomp blacklists
168 - Added syscall trace support
169 - Added --tmpfs option
170 - Added --balcklist option
171 - Added --read-only option
172 - Added --bind option
173 - Logging enhancements
174 - --overlay option was reactivated
175 - Added firemon support to print the ARP table for each sandbox
176 - Added firemon support to print the route table for each sandbox
177 - Added firemon support to print interface information for each sandbox
178 - bugfixes
179
180* Tue Sep 16 2014 netblue30 <netblue30@yahoo.com> 0.9.12-1
181 - Added capabilities support
182 - Added support for CentOS 7
183 - bugfixes
184 49
diff --git a/platform/rpm/mkrpm.sh b/platform/rpm/mkrpm.sh
index 3daede84c..e600c6bdd 100755
--- a/platform/rpm/mkrpm.sh
+++ b/platform/rpm/mkrpm.sh
@@ -1,296 +1,41 @@
1#!/bin/bash 1#!/bin/bash
2# 2#
3# Usage: ./mkrpm.sh 3# Usage: ./platform/rpm/mkrpm.sh firejail <version>
4# ./mkrpm.sh /path/to/firejail-0.9.30.tar.gz
5# 4#
6# Script builds rpm in a temporary directory and places the built rpm in the 5# Builds rpms in a temporary directory then places the result in the
7# current working directory. 6# current working directory.
8 7
8name=$1
9version=$2
9 10
10source=$1 11if [[ ! -f platform/rpm/${name}.spec ]]; then
11 12 echo error: spec file not found for name \"${name}\"
12create_tmp_dir() {
13 tmpdir=$(mktemp -d)
14 mkdir -p ${tmpdir}/{BUILD,RPMS,SOURCES,SPECS,SRPMS}
15}
16
17
18# copy or download source
19if [[ $source ]]; then
20
21 # check file exists
22 if [[ ! -f $source ]]; then
23 echo "$source does not exist!"
24 exit 1
25 fi
26
27 name=$(awk '/Name:/ {print $2}' firejail.spec)
28 version=$(awk '/Version:/ {print $2}' firejail.spec)
29 expected_filename="${name}-${version}.tar.gz"
30
31 # ensure file name matches spec file expets
32 if [[ $(basename $source) != $expected_filename ]]; then
33 echo "source ($source) does not match expected filename ($(basename $expected_filename))"
34 exit 1
35 fi
36
37 create_tmp_dir
38 cp ${source} ${tmpdir}/SOURCES
39else
40 create_tmp_dir
41 if ! spectool -C ${tmpdir}/SOURCES -g firejail.spec; then
42 echo "Failed to fetch firejail source code"
43 exit 1 13 exit 1
44 fi
45fi 14fi
46 15
47cp ./firejail.spec "${tmpdir}/SPECS/firejail.spec" 16if [[ -z "${version}" ]]; then
48 17 echo error: version must be given
49<<<<<<< HEAD 18 exit 1
50echo "building tar.gz archive" 19fi
51tar -czvf firejail-$VERSION.tar.gz firejail-$VERSION
52
53cp firejail-$VERSION.tar.gz SOURCES/.
54
55echo "building config spec"
56cat <<EOF > SPECS/firejail.spec
57%define __spec_install_post %{nil}
58%define debug_package %{nil}
59%define __os_install_post %{_dbpath}/brp-compress
60
61Summary: Linux namepaces sandbox program
62Name: firejail
63Version: $VERSION
64Release: 1
65License: GPL+
66Group: Development/Tools
67SOURCE0 : %{name}-%{version}.tar.gz
68URL: http://github.com/netblue30/firejail
69
70BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root
71
72%description
73Firejail is a SUID sandbox program that reduces the risk of security
74breaches by restricting the running environment of untrusted applications
75using Linux namespaces. It includes a sandbox profile for Mozilla Firefox.
76
77%prep
78%setup -q
79
80%build
81
82%install
83rm -rf %{buildroot}
84mkdir -p %{buildroot}
85
86cp -a * %{buildroot}
87
88
89%clean
90rm -rf %{buildroot}
91
92
93%files
94%defattr(-,root,root,-)
95%config(noreplace) %{_sysconfdir}/%{name}/chromium-browser.profile
96%config(noreplace) %{_sysconfdir}/%{name}/chromium.profile
97%config(noreplace) %{_sysconfdir}/%{name}/disable-mgmt.inc
98%config(noreplace) %{_sysconfdir}/%{name}/disable-secret.inc
99%config(noreplace) %{_sysconfdir}/%{name}/dropbox.profile
100%config(noreplace) %{_sysconfdir}/%{name}/evince.profile
101%config(noreplace) %{_sysconfdir}/%{name}/firefox.profile
102%config(noreplace) %{_sysconfdir}/%{name}/icedove.profile
103%config(noreplace) %{_sysconfdir}/%{name}/iceweasel.profile
104%config(noreplace) %{_sysconfdir}/%{name}/login.users
105%config(noreplace) %{_sysconfdir}/%{name}/midori.profile
106%config(noreplace) %{_sysconfdir}/%{name}/opera.profile
107%config(noreplace) %{_sysconfdir}/%{name}/thunderbird.profile
108%config(noreplace) %{_sysconfdir}/%{name}/transmission-gtk.profile
109%config(noreplace) %{_sysconfdir}/%{name}/transmission-qt.profile
110%config(noreplace) %{_sysconfdir}/%{name}/vlc.profile
111%config(noreplace) %{_sysconfdir}/%{name}/audacious.profile
112%config(noreplace) %{_sysconfdir}/%{name}/clementine.profile
113%config(noreplace) %{_sysconfdir}/%{name}/gnome-mplayer.profile
114%config(noreplace) %{_sysconfdir}/%{name}/rhythmbox.profile
115%config(noreplace) %{_sysconfdir}/%{name}/totem.profile
116%config(noreplace) %{_sysconfdir}/%{name}/deluge.profile
117%config(noreplace) %{_sysconfdir}/%{name}/qbittorrent.profile
118%config(noreplace) %{_sysconfdir}/%{name}/generic.profile
119%config(noreplace) %{_sysconfdir}/%{name}/deadbeef.profile
120%config(noreplace) %{_sysconfdir}/%{name}/disable-common.inc
121%config(noreplace) %{_sysconfdir}/%{name}/disable-history.inc
122%config(noreplace) %{_sysconfdir}/%{name}/empathy.profile
123%config(noreplace) %{_sysconfdir}/%{name}/filezilla.profile
124%config(noreplace) %{_sysconfdir}/%{name}/icecat.profile
125%config(noreplace) %{_sysconfdir}/%{name}/pidgin.profile
126%config(noreplace) %{_sysconfdir}/%{name}/quassel.profile
127%config(noreplace) %{_sysconfdir}/%{name}/server.profile
128%config(noreplace) %{_sysconfdir}/%{name}/xchat.profile
129
130/usr/bin/firejail
131/usr/bin/firemon
132/usr/lib/firejail/libtrace.so
133/usr/lib/firejail/ftee
134/usr/lib/firejail/fshaper.sh
135/usr/share/doc/packages/firejail/COPYING
136/usr/share/doc/packages/firejail/README
137/usr/share/doc/packages/firejail/RELNOTES
138/usr/share/man/man1/firejail.1.gz
139/usr/share/man/man1/firemon.1.gz
140/usr/share/man/man5/firejail-profile.5.gz
141/usr/share/man/man5/firejail-login.5.gz
142/usr/share/bash-completion/completions/firejail
143/usr/share/bash-completion/completions/firemon
144
145%post
146chmod u+s /usr/bin/firejail
147
148%changelog
149* Mon Sep 14 2015 netblue30 <netblue30@yahoo.com> 0.9.30-1
150 - added a disable-history.inc profile as a result of Firefox PDF.js exploit;
151 disable-history.inc included in all default profiles
152 - Firefox PDF.js exploit (CVE-2015-4495) fixes
153 - added --private-etc option
154 - added --env option
155 - added --whitelist option
156 - support ${HOME} token in include directive in profile files
157 - --private.keep is transitioned to --private-home
158 - support ~ and blanks in blacklist option
159 - support "net none" command in profile files
160 - using /etc/firejail/generic.profile by default for user sessions
161 - using /etc/firejail/server.profile by default for root sessions
162 - added build --enable-fatal-warnings configure option
163 - added persistence to --overlay option
164 - added --overlay-tmpfs option
165 - make install-strip implemented, make install renamed
166 - bugfixes
167
168* Sat Aug 1 2015 netblue30 <netblue30@yahoo.com> 0.9.28-1
169 - network scanning, --scan option
170 - interface MAC address support, --mac option
171 - IP address range, --iprange option
172 - traffic shaping, --bandwidth option
173 - reworked printing of network status at startup
174 - man pages rework
175 - added firejail-login man page
176 - added GNU Icecat, FileZilla, Pidgin, XChat, Empathy, DeaDBeeF default
177 profiles
178 - added an /etc/firejail/disable-common.inc file to hold common directory
179 blacklists
180 - blacklist Opera and Chrome/Chromium config directories in profile files
181 - support noroot option for profile files
182 - enabled noroot in default profile files
183 - bugfixes
184
185* Thu Apr 30 2015 netblue30 <netblue30@yahoo.com> 0.9.26-1
186 - private dev directory
187 - private.keep option for whitelisting home files in a new private directory
188 - user namespaces support, noroot option
189 - added Deluge and qBittorent profiles
190 - bugfixes
191
192* Sun Apr 5 2015 netblue30 <netblue30@yahoo.com> 0.9.24-1
193 - whitelist and blacklist seccomp filters
194 - doubledash option
195 - --shell=none support
196 - netfilter file support in profile files
197 - dns server support in profile files
198 - added --dns.print option
199 - added default profiles for Audoacious, Clementine, Rhythmbox and Totem.
200 - added --caps.drop=all in default profiles
201 - new syscalls in default seccomp filter: sysfs, sysctl, adjtimex, kcmp
202 - clock_adjtime, lookup_dcookie, perf_event_open, fanotify_init
203 - Bugfix: using /proc/sys/kernel/pid_max for the max number of pids
204 - two build patches from Reiner Herman (tickets 11, 12)
205 - man page patch from Reiner Herman (ticket 13)
206 - output patch (ticket 15) from sshirokov
207
208* Mon Mar 9 2015 netblue30 <netblue30@yahoo.com> 0.9.22-1
209 - Replaced --noip option with --ip=none
210 - Container stdout logging and log rotation
211 - Added process_vm_readv, process_vm_writev and mknod to
212 default seccomp blacklist
213 - Added CAP_MKNOD to default caps blacklist
214 - Blacklist and whitelist custom Linux capabilities filters
215 - macvlan device driver support for --net option
216 - DNS server support, --dns option
217 - Netfilter support
218 - Monitor network statistics, --netstats option
219 - Added profile for Mozilla Thunderbird/Icedove
220 - --overlay support for Linux kernels 3.18+
221 - Bugfix: preserve .Xauthority file in private mode (test with ssh -X)
222 - Bugfix: check uid/gid for cgroup
223
224* Fri Feb 6 2015 netblue30 <netblue30@yahoo.com> 0.9.20-1
225 - utmp, btmp and wtmp enhancements
226 - create empty /var/log/wtmp and /var/log/btmp files in sandbox
227 - generate a new /var/run/utmp file in sandbox
228 - CPU affinity, --cpu option
229 - Linux control groups support, --cgroup option
230 - Opera web browser support
231 - VLC support
232 - Added "empty" attribute to seccomp command to remove the default
233 - syscall list form seccomp blacklist
234 - Added --nogroups option to disable supplementary groups for regular
235 - users. root user always runs without supplementary groups.
236 - firemon enhancements
237 - display the command that started the sandbox
238 - added --caps option to display capabilities for all sandboxes
239 - added --cgroup option to display the control groups for all sandboxes
240 - added --cpu option to display CPU affinity for all sandboxes
241 - added --seccomp option to display seccomp setting for all sandboxes
242 - New compile time options: --disable-chroot, --disable-bind
243 - bugfixes
244
245* Sat Dec 27 2014 netblue30 <netblue30@yahoo.com> 0.9.18-1
246 - Support for tracing system, setuid, setgid, setfsuid, setfsgid syscalls
247 - Support for tracing setreuid, setregid, setresuid, setresguid syscalls
248 - Added profiles for transmission-gtk and transmission-qt
249 - bugfixes
250
251* Tue Nov 4 2014 netblue30 <netblue30@yahoo.com> 0.9.16-1
252 - Configurable private home directory
253 - Configurable default user shell
254 - Software configuration support for --docdir and DESTDIR
255 - Profile file support for include, caps, seccomp and private keywords
256 - Dropbox profile file
257 - Linux capabilities and seccomp filters enabled by default for Firefox,
258 Midori, Evince and Dropbox
259 - bugfixes
260 20
261* Wed Oct 8 2014 netblue30 <netblue30@yahoo.com> 0.9.14-1 21# Make a temporary directory and arrange to clean up on exit
262 - Linux capabilities and seccomp filters are automatically enabled in 22tmpdir=$(mktemp -d)
263 chroot mode (--chroot option) if the sandbox is started as regular 23mkdir -p ${tmpdir}/{BUILD,RPMS,SOURCES,SPECS,SRPMS}
264 user 24function cleanup {
265 - Added support for user defined seccomp blacklists 25 rm -rf ${tmpdir}
266 - Added syscall trace support 26}
267 - Added --tmpfs option 27trap cleanup EXIT
268 - Added --balcklist option
269 - Added --read-only option
270 - Added --bind option
271 - Logging enhancements
272 - --overlay option was reactivated
273 - Added firemon support to print the ARP table for each sandbox
274 - Added firemon support to print the route table for each sandbox
275 - Added firemon support to print interface information for each sandbox
276 - bugfixes
277 28
278* Tue Sep 16 2014 netblue30 <netblue30@yahoo.com> 0.9.12-1 29# Create the spec file
279 - Added capabilities support 30tmp_spec_file=${tmpdir}/SPECS/${name}.spec
280 - Added support for CentOS 7 31sed -e "s/__NAME__/${name}/g" -e "s/__VERSION__/${version}/g" platform/rpm/${name}.spec >${tmp_spec_file}
281 - bugfixes 32# FIXME: We could parse RELNOTES and create a %changelog section here
282 33
283EOF 34# Copy the source to build into a tarball
35tar czf ${tmpdir}/SOURCES/${name}-${version}.tar.gz . --transform "s/^./${name}-${version}/" --exclude='.git/*'
284 36
285echo "building rpm" 37# Build the files (rpm, debug rpm and source rpm)
286rpmbuild -ba SPECS/firejail.spec 38rpmbuild --quiet --define "_topdir ${tmpdir}" -ba ${tmp_spec_file}
287rpm -qpl RPMS/x86_64/firejail-$VERSION-1.x86_64.rpm
288cd ..
289rm -f firejail-$VERSION-1.x86_64.rpm
290cp rpmbuild/RPMS/x86_64/firejail-$VERSION-1.x86_64.rpm .
291=======
292rpmbuild --define "_topdir ${tmpdir}" -ba "${tmpdir}/SPECS/firejail.spec"
293>>>>>>> d69c2f8a62fca967460265dedd5afa62592264dd
294 39
295cp ${tmpdir}/RPMS/x86_64/firejail-*-1.x86_64.rpm . 40# Copy the results to cwd
296rm -rf "${tmpdir}" 41mv ${tmpdir}/SRPMS/*.rpm ${tmpdir}/RPMS/*/*rpm .
diff --git a/platform/rpm/old-mkrpm.sh b/platform/rpm/old-mkrpm.sh
deleted file mode 100755
index 5775783af..000000000
--- a/platform/rpm/old-mkrpm.sh
+++ /dev/null
@@ -1,417 +0,0 @@
1#!/bin/bash
2VERSION="0.9.36"
3rm -fr ~/rpmbuild
4rm -f firejail-$VERSION-1.x86_64.rpm
5
6mkdir -p ~/rpmbuild/{RPMS,SRPMS,BUILD,SOURCES,SPECS,tmp}
7cat <<EOF >~/.rpmmacros
8%_topdir %(echo $HOME)/rpmbuild
9%_tmppath %{_topdir}/tmp
10EOF
11
12cd ~/rpmbuild
13echo "building directory tree"
14
15mkdir -p firejail-$VERSION/usr/bin
16install -m 755 /usr/bin/firejail firejail-$VERSION/usr/bin/.
17install -m 755 /usr/bin/firemon firejail-$VERSION/usr/bin/.
18
19mkdir -p firejail-$VERSION/usr/lib/firejail
20install -m 644 /usr/lib/firejail/libtrace.so firejail-$VERSION/usr/lib/firejail/.
21install -m 644 /usr/lib/firejail/libtracelog.so firejail-$VERSION/usr/lib/firejail/.
22install -m 755 /usr/lib/firejail/ftee firejail-$VERSION/usr/lib/firejail/.
23install -m 755 /usr/lib/firejail/fshaper.sh firejail-$VERSION/usr/lib/firejail/.
24
25mkdir -p firejail-$VERSION/usr/share/man/man1
26install -m 644 /usr/share/man/man1/firejail.1.gz firejail-$VERSION/usr/share/man/man1/.
27install -m 644 /usr/share/man/man1/firemon.1.gz firejail-$VERSION/usr/share/man/man1/.
28
29mkdir -p firejail-$VERSION/usr/share/man/man5
30install -m 644 /usr/share/man/man5/firejail-profile.5.gz firejail-$VERSION/usr/share/man/man5/.
31install -m 644 /usr/share/man/man5/firejail-login.5.gz firejail-$VERSION/usr/share/man/man5/.
32
33mkdir -p firejail-$VERSION/usr/share/doc/packages/firejail
34install -m 644 /usr/share/doc/firejail/COPYING firejail-$VERSION/usr/share/doc/packages/firejail/.
35install -m 644 /usr/share/doc/firejail/README firejail-$VERSION/usr/share/doc/packages/firejail/.
36install -m 644 /usr/share/doc/firejail/RELNOTES firejail-$VERSION/usr/share/doc/packages/firejail/.
37
38mkdir -p firejail-$VERSION/etc/firejail
39install -m 644 /etc/firejail/xchat.profile firejail-$VERSION/etc/firejail/xchat.profile
40install -m 644 /etc/firejail/server.profile firejail-$VERSION/etc/firejail/server.profile
41install -m 644 /etc/firejail/quassel.profile firejail-$VERSION/etc/firejail/quassel.profile
42install -m 644 /etc/firejail/pidgin.profile firejail-$VERSION/etc/firejail/pidgin.profile
43install -m 644 /etc/firejail/icecat.profile firejail-$VERSION/etc/firejail/icecat.profile
44install -m 644 /etc/firejail/filezilla.profile firejail-$VERSION/etc/firejail/filezilla.profile
45install -m 644 /etc/firejail/chromium-browser.profile firejail-$VERSION/etc/firejail/chromium-browser.profile
46install -m 644 /etc/firejail/chromium.profile firejail-$VERSION/etc/firejail/chromium.profile
47install -m 644 /etc/firejail/dropbox.profile firejail-$VERSION/etc/firejail/dropbox.profile
48install -m 644 /etc/firejail/disable-common.inc firejail-$VERSION/etc/firejail/disable-common.inc
49install -m 644 /etc/firejail/disable-secret.inc firejail-$VERSION/etc/firejail/disable-secret.inc
50install -m 644 /etc/firejail/disable-mgmt.inc firejail-$VERSION/etc/firejail/disable-mgmt.inc
51install -m 644 /etc/firejail/evince.profile firejail-$VERSION/etc/firejail/evince.profile
52install -m 644 /etc/firejail/firefox.profile firejail-$VERSION/etc/firejail/firefox.profile
53install -m 644 /etc/firejail/icedove.profile firejail-$VERSION/etc/firejail/icedove.profile
54install -m 644 /etc/firejail/iceweasel.profile firejail-$VERSION/etc/firejail/iceweasel.profile
55install -m 644 /etc/firejail/midori.profile firejail-$VERSION/etc/firejail/midori.profile
56install -m 644 /etc/firejail/thunderbird.profile firejail-$VERSION/etc/firejail/thunderbird.profile
57install -m 644 /etc/firejail/opera.profile firejail-$VERSION/etc/firejail/opera.profile
58install -m 644 /etc/firejail/transmission-gtk.profile firejail-$VERSION/etc/firejail/transmission-gtk.profile
59install -m 644 /etc/firejail/transmission-qt.profile firejail-$VERSION/etc/firejail/transmission-qt.profile
60install -m 644 /etc/firejail/vlc.profile firejail-$VERSION/etc/firejail/vlc.profile
61install -m 644 /etc/firejail/audacious.profile firejail-$VERSION/etc/firejail/audacious.profile
62install -m 644 /etc/firejail/clementine.profile firejail-$VERSION/etc/firejail/clementine.profile
63install -m 644 /etc/firejail/gnome-mplayer.profile firejail-$VERSION/etc/firejail/gnome-mplayer.profile
64install -m 644 /etc/firejail/rhythmbox.profile firejail-$VERSION/etc/firejail/rhythmbox.profile
65install -m 644 /etc/firejail/totem.profile firejail-$VERSION/etc/firejail/totem.profile
66install -m 644 /etc/firejail/deluge.profile firejail-$VERSION/etc/firejail/deluge.profile
67install -m 644 /etc/firejail/qbittorrent.profile firejail-$VERSION/etc/firejail/qbittorrent.profile
68install -m 644 /etc/firejail/generic.profile firejail-$VERSION/etc/firejail/generic.profile
69install -m 644 /etc/firejail/login.users firejail-$VERSION/etc/firejail/login.users
70install -m 644 /etc/firejail/deadbeef.profile firejail-$VERSION/etc/firejail/deadbeef.profile
71install -m 644 /etc/firejail/empathy.profile firejail-$VERSION/etc/firejail/empathy.profile
72install -m 644 /etc/firejail/fbreader.profile firejail-$VERSION/etc/firejail/fbreader.profile
73install -m 644 /etc/firejail/spotify.profile firejail-$VERSION/etc/firejail/spotify.profile
74install -m 644 /etc/firejail/google-chrome.profile firejail-$VERSION/etc/firejail/google-chrome.profile
75install -m 644 /etc/firejail/skype.profile firejail-$VERSION/etc/firejail/skype.profile
76install -m 644 /etc/firejail/steam.profile firejail-$VERSION/etc/firejail/steam.profile
77install -m 644 /etc/firejail/wine.profile firejail-$VERSION/etc/firejail/wine.profile
78install -m 644 /etc/firejail/disable-devel.inc firejail-$VERSION/etc/firejail/disable-devel.inc
79
80install -m 644 /etc/firejail/bitlbee.profile firejail-$VERSION/etc/firejail/bitlbee.profile
81install -m 644 /etc/firejail/conkeror.profile firejail-$VERSION/etc/firejail/conkeror.profile
82install -m 644 /etc/firejail/google-chrome-beta.profile firejail-$VERSION/etc/firejail/google-chrome-beta.profile
83install -m 644 /etc/firejail/google-chrome-stable.profile firejail-$VERSION/etc/firejail/google-chrome-stable.profile
84install -m 644 /etc/firejail/google-chrome-unstable.profile firejail-$VERSION/etc/firejail/google-chrome-unstable.profile
85install -m 644 /etc/firejail/hexchat.profile firejail-$VERSION/etc/firejail/hexchat.profile
86install -m 644 /etc/firejail/konqueror.profile firejail-$VERSION/etc/firejail/konqueror.profile
87install -m 644 /etc/firejail/nolocal.net firejail-$VERSION/etc/firejail/nolocal.net
88install -m 644 /etc/firejail/opera-beta.profile firejail-$VERSION/etc/firejail/opera-beta.profile
89install -m 644 /etc/firejail/parole.profile firejail-$VERSION/etc/firejail/parole.profile
90install -m 644 /etc/firejail/rtorrent.profile firejail-$VERSION/etc/firejail/rtorrent.profile
91install -m 644 /etc/firejail/unbound.profile firejail-$VERSION/etc/firejail/unbound.profile
92install -m 644 /etc/firejail/webserver.net firejail-$VERSION/etc/firejail/webserver.net
93install -m 644 /etc/firejail/weechat-curses.profile firejail-$VERSION/etc/firejail/weechat-curses.profile
94install -m 644 /etc/firejail/weechat.profile firejail-$VERSION/etc/firejail/weechat.profile
95install -m 644 /etc/firejail/whitelist-common.inc firejail-$VERSION/etc/firejail/whitelist-common.inc
96
97mkdir -p firejail-$VERSION/usr/share/bash-completion/completions
98install -m 644 /usr/share/bash-completion/completions/firejail firejail-$VERSION/usr/share/bash-completion/completions/.
99install -m 644 /usr/share/bash-completion/completions/firemon firejail-$VERSION/usr/share/bash-completion/completions/.
100
101echo "building tar.gz archive"
102tar -czvf firejail-$VERSION.tar.gz firejail-$VERSION
103
104cp firejail-$VERSION.tar.gz SOURCES/.
105
106echo "building config spec"
107cat <<EOF > SPECS/firejail.spec
108%define __spec_install_post %{nil}
109%define debug_package %{nil}
110%define __os_install_post %{_dbpath}/brp-compress
111
112Summary: Linux namepaces sandbox program
113Name: firejail
114Version: $VERSION
115Release: 1
116License: GPL+
117Group: Development/Tools
118SOURCE0 : %{name}-%{version}.tar.gz
119URL: http://firejail.wordpress.com
120
121BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root
122
123%description
124Firejail is a SUID sandbox program that reduces the risk of security
125breaches by restricting the running environment of untrusted applications
126using Linux namespaces. It includes a sandbox profile for Mozilla Firefox.
127
128%prep
129%setup -q
130
131%build
132
133%install
134rm -rf %{buildroot}
135mkdir -p %{buildroot}
136
137cp -a * %{buildroot}
138
139
140%clean
141rm -rf %{buildroot}
142
143
144%files
145%defattr(-,root,root,-)
146%config(noreplace) %{_sysconfdir}/%{name}/chromium-browser.profile
147%config(noreplace) %{_sysconfdir}/%{name}/chromium.profile
148%config(noreplace) %{_sysconfdir}/%{name}/disable-mgmt.inc
149%config(noreplace) %{_sysconfdir}/%{name}/disable-secret.inc
150%config(noreplace) %{_sysconfdir}/%{name}/dropbox.profile
151%config(noreplace) %{_sysconfdir}/%{name}/evince.profile
152%config(noreplace) %{_sysconfdir}/%{name}/firefox.profile
153%config(noreplace) %{_sysconfdir}/%{name}/icedove.profile
154%config(noreplace) %{_sysconfdir}/%{name}/iceweasel.profile
155%config(noreplace) %{_sysconfdir}/%{name}/login.users
156%config(noreplace) %{_sysconfdir}/%{name}/midori.profile
157%config(noreplace) %{_sysconfdir}/%{name}/opera.profile
158%config(noreplace) %{_sysconfdir}/%{name}/thunderbird.profile
159%config(noreplace) %{_sysconfdir}/%{name}/transmission-gtk.profile
160%config(noreplace) %{_sysconfdir}/%{name}/transmission-qt.profile
161%config(noreplace) %{_sysconfdir}/%{name}/vlc.profile
162%config(noreplace) %{_sysconfdir}/%{name}/audacious.profile
163%config(noreplace) %{_sysconfdir}/%{name}/clementine.profile
164%config(noreplace) %{_sysconfdir}/%{name}/gnome-mplayer.profile
165%config(noreplace) %{_sysconfdir}/%{name}/rhythmbox.profile
166%config(noreplace) %{_sysconfdir}/%{name}/totem.profile
167%config(noreplace) %{_sysconfdir}/%{name}/deluge.profile
168%config(noreplace) %{_sysconfdir}/%{name}/qbittorrent.profile
169%config(noreplace) %{_sysconfdir}/%{name}/generic.profile
170%config(noreplace) %{_sysconfdir}/%{name}/deadbeef.profile
171%config(noreplace) %{_sysconfdir}/%{name}/disable-common.inc
172%config(noreplace) %{_sysconfdir}/%{name}/empathy.profile
173%config(noreplace) %{_sysconfdir}/%{name}/filezilla.profile
174%config(noreplace) %{_sysconfdir}/%{name}/icecat.profile
175%config(noreplace) %{_sysconfdir}/%{name}/pidgin.profile
176%config(noreplace) %{_sysconfdir}/%{name}/quassel.profile
177%config(noreplace) %{_sysconfdir}/%{name}/server.profile
178%config(noreplace) %{_sysconfdir}/%{name}/xchat.profile
179%config(noreplace) %{_sysconfdir}/%{name}/fbreader.profile
180%config(noreplace) %{_sysconfdir}/%{name}/spotify.profile
181%config(noreplace) %{_sysconfdir}/%{name}/google-chrome.profile
182%config(noreplace) %{_sysconfdir}/%{name}/skype.profile
183%config(noreplace) %{_sysconfdir}/%{name}/steam.profile
184%config(noreplace) %{_sysconfdir}/%{name}/wine.profile
185%config(noreplace) %{_sysconfdir}/%{name}/disable-devel.inc
186%config(noreplace) %{_sysconfdir}/%{name}/bitlbee.profile
187%config(noreplace) %{_sysconfdir}/%{name}/conkeror.profile
188%config(noreplace) %{_sysconfdir}/%{name}/google-chrome-beta.profile
189%config(noreplace) %{_sysconfdir}/%{name}/google-chrome-stable.profile
190%config(noreplace) %{_sysconfdir}/%{name}/google-chrome-unstable.profile
191%config(noreplace) %{_sysconfdir}/%{name}/hexchat.profile
192%config(noreplace) %{_sysconfdir}/%{name}/konqueror.profile
193%config(noreplace) %{_sysconfdir}/%{name}/nolocal.net
194%config(noreplace) %{_sysconfdir}/%{name}/opera-beta.profile
195%config(noreplace) %{_sysconfdir}/%{name}/parole.profile
196%config(noreplace) %{_sysconfdir}/%{name}/rtorrent.profile
197%config(noreplace) %{_sysconfdir}/%{name}/unbound.profile
198%config(noreplace) %{_sysconfdir}/%{name}/webserver.net
199%config(noreplace) %{_sysconfdir}/%{name}/weechat-curses.profile
200%config(noreplace) %{_sysconfdir}/%{name}/weechat.profile
201%config(noreplace) %{_sysconfdir}/%{name}/whitelist-common.inc
202
203/usr/bin/firejail
204/usr/bin/firemon
205/usr/lib/firejail/libtrace.so
206/usr/lib/firejail/libtracelog.so
207/usr/lib/firejail/ftee
208/usr/lib/firejail/fshaper.sh
209/usr/share/doc/packages/firejail/COPYING
210/usr/share/doc/packages/firejail/README
211/usr/share/doc/packages/firejail/RELNOTES
212/usr/share/man/man1/firejail.1.gz
213/usr/share/man/man1/firemon.1.gz
214/usr/share/man/man5/firejail-profile.5.gz
215/usr/share/man/man5/firejail-login.5.gz
216/usr/share/bash-completion/completions/firejail
217/usr/share/bash-completion/completions/firemon
218
219%post
220chmod u+s /usr/bin/firejail
221
222%changelog
223* Thu Dec 24 2015 netblue30 <netblue30@yahoo.com> 0.9.36-1
224 - added unbound, dnscrypt-proxy, BitlBee, HexChat profiles
225 - added WeeChat, parole and rtorrent profiles
226 - Google Chrome profile rework
227 - added google-chrome-stable profile
228 - added google-chrome-beta profile
229 - added google-chrome-unstable profile
230 - Opera profile rework
231 - added opera-beta profile
232 - added --noblacklist option
233 - added --profile-path option
234 - added --force option
235 - whitelist command enhancements
236 - prevent user name enumeration
237 - added /etc/firejail/nolocal.net network filter
238 - added /etc/firejail/webserver.net network filter
239 - blacklisting firejail configuration by default
240 - allow default gateway configuration for --interface option
241 - --debug enhancements: --debug-check-filenames
242 - --debug enhancements:--debug-blacklists
243 - --debug enhancements: --debug-whitelists
244 - filesystem log
245 - libtrace enhancements, tracing opendir call
246 - added --tracelog option
247 - added "name" command to profile files
248 - added "hostname" command to profile files
249 - added automated feature testing framework
250 - Debian reproducible build
251 - bugfixes
252
253* Sat Nov 7 2015 netblue30 <netblue30@yahoo.com> 0.9.34-1
254 - added --ignore option
255 - added --protocol option
256 - support dual i386/amd64 seccomp filters
257 - added Google Chrome profile
258 - added Steam, Skype, Wine and Conkeror profiles
259 - bugfixes
260
261* Wed Oct 21 2015 netblue30 <netblue30@yahoo.com> 0.9.32-1
262 - added --interface option
263 - added --mtu option
264 - added --private-bin option
265 - added --nosound option
266 - added --hostname option
267 - added --quiet option
268 - added seccomp errno support
269 - added FBReader default profile
270 - added Spotify default profile
271 - lots of default security profile changes
272 - fixed a security problem on multi-user systems
273 - bugfixes
274
275* Mon Sep 14 2015 netblue30 <netblue30@yahoo.com> 0.9.30-1
276 - added a disable-history.inc profile as a result of Firefox PDF.js exploit;
277 disable-history.inc included in all default profiles
278 - Firefox PDF.js exploit (CVE-2015-4495) fixes
279 - added --private-etc option
280 - added --env option
281 - added --whitelist option
282 - support ${HOME} token in include directive in profile files
283 - --private.keep is transitioned to --private-home
284 - support ~ and blanks in blacklist option
285 - support "net none" command in profile files
286 - using /etc/firejail/generic.profile by default for user sessions
287 - using /etc/firejail/server.profile by default for root sessions
288 - added build --enable-fatal-warnings configure option
289 - added persistence to --overlay option
290 - added --overlay-tmpfs option
291 - make install-strip implemented, make install renamed
292 - bugfixes
293
294* Sat Aug 1 2015 netblue30 <netblue30@yahoo.com> 0.9.28-1
295 - network scanning, --scan option
296 - interface MAC address support, --mac option
297 - IP address range, --iprange option
298 - traffic shaping, --bandwidth option
299 - reworked printing of network status at startup
300 - man pages rework
301 - added firejail-login man page
302 - added GNU Icecat, FileZilla, Pidgin, XChat, Empathy, DeaDBeeF default
303 profiles
304 - added an /etc/firejail/disable-common.inc file to hold common directory
305 blacklists
306 - blacklist Opera and Chrome/Chromium config directories in profile files
307 - support noroot option for profile files
308 - enabled noroot in default profile files
309 - bugfixes
310
311* Thu Apr 30 2015 netblue30 <netblue30@yahoo.com> 0.9.26-1
312 - private dev directory
313 - private.keep option for whitelisting home files in a new private directory
314 - user namespaces support, noroot option
315 - added Deluge and qBittorent profiles
316 - bugfixes
317
318* Sun Apr 5 2015 netblue30 <netblue30@yahoo.com> 0.9.24-1
319 - whitelist and blacklist seccomp filters
320 - doubledash option
321 - --shell=none support
322 - netfilter file support in profile files
323 - dns server support in profile files
324 - added --dns.print option
325 - added default profiles for Audoacious, Clementine, Rhythmbox and Totem.
326 - added --caps.drop=all in default profiles
327 - new syscalls in default seccomp filter: sysfs, sysctl, adjtimex, kcmp
328 - clock_adjtime, lookup_dcookie, perf_event_open, fanotify_init
329 - Bugfix: using /proc/sys/kernel/pid_max for the max number of pids
330 - two build patches from Reiner Herman (tickets 11, 12)
331 - man page patch from Reiner Herman (ticket 13)
332 - output patch (ticket 15) from sshirokov
333
334* Mon Mar 9 2015 netblue30 <netblue30@yahoo.com> 0.9.22-1
335 - Replaced --noip option with --ip=none
336 - Container stdout logging and log rotation
337 - Added process_vm_readv, process_vm_writev and mknod to
338 default seccomp blacklist
339 - Added CAP_MKNOD to default caps blacklist
340 - Blacklist and whitelist custom Linux capabilities filters
341 - macvlan device driver support for --net option
342 - DNS server support, --dns option
343 - Netfilter support
344 - Monitor network statistics, --netstats option
345 - Added profile for Mozilla Thunderbird/Icedove
346 - --overlay support for Linux kernels 3.18+
347 - Bugfix: preserve .Xauthority file in private mode (test with ssh -X)
348 - Bugfix: check uid/gid for cgroup
349
350* Fri Feb 6 2015 netblue30 <netblue30@yahoo.com> 0.9.20-1
351 - utmp, btmp and wtmp enhancements
352 - create empty /var/log/wtmp and /var/log/btmp files in sandbox
353 - generate a new /var/run/utmp file in sandbox
354 - CPU affinity, --cpu option
355 - Linux control groups support, --cgroup option
356 - Opera web browser support
357 - VLC support
358 - Added "empty" attribute to seccomp command to remove the default
359 - syscall list form seccomp blacklist
360 - Added --nogroups option to disable supplementary groups for regular
361 - users. root user always runs without supplementary groups.
362 - firemon enhancements
363 - display the command that started the sandbox
364 - added --caps option to display capabilities for all sandboxes
365 - added --cgroup option to display the control groups for all sandboxes
366 - added --cpu option to display CPU affinity for all sandboxes
367 - added --seccomp option to display seccomp setting for all sandboxes
368 - New compile time options: --disable-chroot, --disable-bind
369 - bugfixes
370
371* Sat Dec 27 2014 netblue30 <netblue30@yahoo.com> 0.9.18-1
372 - Support for tracing system, setuid, setgid, setfsuid, setfsgid syscalls
373 - Support for tracing setreuid, setregid, setresuid, setresguid syscalls
374 - Added profiles for transmission-gtk and transmission-qt
375 - bugfixes
376
377* Tue Nov 4 2014 netblue30 <netblue30@yahoo.com> 0.9.16-1
378 - Configurable private home directory
379 - Configurable default user shell
380 - Software configuration support for --docdir and DESTDIR
381 - Profile file support for include, caps, seccomp and private keywords
382 - Dropbox profile file
383 - Linux capabilities and seccomp filters enabled by default for Firefox,
384 Midori, Evince and Dropbox
385 - bugfixes
386
387* Wed Oct 8 2014 netblue30 <netblue30@yahoo.com> 0.9.14-1
388 - Linux capabilities and seccomp filters are automatically enabled in
389 chroot mode (--chroot option) if the sandbox is started as regular
390 user
391 - Added support for user defined seccomp blacklists
392 - Added syscall trace support
393 - Added --tmpfs option
394 - Added --balcklist option
395 - Added --read-only option
396 - Added --bind option
397 - Logging enhancements
398 - --overlay option was reactivated
399 - Added firemon support to print the ARP table for each sandbox
400 - Added firemon support to print the route table for each sandbox
401 - Added firemon support to print interface information for each sandbox
402 - bugfixes
403
404* Tue Sep 16 2014 netblue30 <netblue30@yahoo.com> 0.9.12-1
405 - Added capabilities support
406 - Added support for CentOS 7
407 - bugfixes
408
409EOF
410
411echo "building rpm"
412rpmbuild -ba SPECS/firejail.spec
413rpm -qpl RPMS/x86_64/firejail-$VERSION-1.x86_64.rpm
414cd ..
415rm -f firejail-$VERSION-1.x86_64.rpm
416cp rpmbuild/RPMS/x86_64/firejail-$VERSION-1.x86_64.rpm .
417