commit
459b5e2578
@ -0,0 +1,3 @@
|
|||||||
|
SOURCES/usbguard-1.1.3.tar.gz
|
||||||
|
SOURCES/usbguard-notifier-0.1.1.tar.gz
|
||||||
|
SOURCES/usbguard-selinux-0.0.5.tar.gz
|
@ -0,0 +1,3 @@
|
|||||||
|
9fa6a2aaa71a515df9f49ce169ad0216a5ca0938 SOURCES/usbguard-1.1.3.tar.gz
|
||||||
|
5c316478b16dda001603536a53347b253b484da1 SOURCES/usbguard-notifier-0.1.1.tar.gz
|
||||||
|
1e1b42e55b931e1665b8132937266c84a8050c57 SOURCES/usbguard-selinux-0.0.5.tar.gz
|
@ -0,0 +1,12 @@
|
|||||||
|
diff -up usbguard-1.1.3/usbguard.service.in.orig usbguard-1.1.3/usbguard.service.in
|
||||||
|
--- usbguard-1.1.3/usbguard.service.in.orig 2024-06-12 14:36:13.192536970 +0200
|
||||||
|
+++ usbguard-1.1.3/usbguard.service.in 2024-06-12 14:36:21.110609346 +0200
|
||||||
|
@@ -8,7 +8,7 @@ OOMScoreAdjust=-1000
|
||||||
|
AmbientCapabilities=
|
||||||
|
CapabilityBoundingSet=CAP_CHOWN CAP_FOWNER CAP_AUDIT_WRITE
|
||||||
|
DevicePolicy=closed
|
||||||
|
-ExecStart=%sbindir%/usbguard-daemon -f -s -c %sysconfdir%/usbguard/usbguard-daemon.conf
|
||||||
|
+ExecStart=%sbindir%/usbguard-daemon -f -s -K -c %sysconfdir%/usbguard/usbguard-daemon.conf
|
||||||
|
IPAddressDeny=any
|
||||||
|
LockPersonality=yes
|
||||||
|
MemoryDenyWriteExecute=yes
|
@ -0,0 +1,191 @@
|
|||||||
|
#
|
||||||
|
# Rule set file path.
|
||||||
|
#
|
||||||
|
# The USBGuard daemon will use this file to load the policy
|
||||||
|
# rule set from it and to write new rules received via the
|
||||||
|
# IPC interface.
|
||||||
|
#
|
||||||
|
# RuleFile=/path/to/rules.conf
|
||||||
|
#
|
||||||
|
RuleFile=/etc/usbguard/rules.conf
|
||||||
|
|
||||||
|
#
|
||||||
|
# Rule set folder path.
|
||||||
|
#
|
||||||
|
# The USBGuard daemon will use this folder to load the policy
|
||||||
|
# rule set from it and to write new rules received via the
|
||||||
|
# IPC interface.
|
||||||
|
#
|
||||||
|
# RuleFolder=/path/to/rulesfolder/
|
||||||
|
#
|
||||||
|
|
||||||
|
RuleFolder=/etc/usbguard/rules.d/
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Implicit policy target.
|
||||||
|
#
|
||||||
|
# How to treat devices that don't match any rule in the
|
||||||
|
# policy. One of:
|
||||||
|
#
|
||||||
|
# * allow - authorize the device
|
||||||
|
# * block - block the device
|
||||||
|
# * reject - remove the device
|
||||||
|
#
|
||||||
|
ImplicitPolicyTarget=block
|
||||||
|
|
||||||
|
#
|
||||||
|
# Present device policy.
|
||||||
|
#
|
||||||
|
# How to treat devices that are already connected when the
|
||||||
|
# daemon starts. One of:
|
||||||
|
#
|
||||||
|
# * allow - authorize every present device
|
||||||
|
# * block - deauthorize every present device
|
||||||
|
# * reject - remove every present device
|
||||||
|
# * keep - just sync the internal state and leave it
|
||||||
|
# * apply-policy - evaluate the ruleset for every present
|
||||||
|
# device
|
||||||
|
#
|
||||||
|
PresentDevicePolicy=apply-policy
|
||||||
|
|
||||||
|
#
|
||||||
|
# Present controller policy.
|
||||||
|
#
|
||||||
|
# How to treat USB controllers that are already connected
|
||||||
|
# when the daemon starts. One of:
|
||||||
|
#
|
||||||
|
# * allow - authorize every present device
|
||||||
|
# * block - deauthorize every present device
|
||||||
|
# * reject - remove every present device
|
||||||
|
# * keep - just sync the internal state and leave it
|
||||||
|
# * apply-policy - evaluate the ruleset for every present
|
||||||
|
# device
|
||||||
|
#
|
||||||
|
PresentControllerPolicy=keep
|
||||||
|
|
||||||
|
#
|
||||||
|
# Inserted device policy.
|
||||||
|
#
|
||||||
|
# How to treat USB devices that are already connected
|
||||||
|
# *after* the daemon starts. One of:
|
||||||
|
#
|
||||||
|
# * block - deauthorize every present device
|
||||||
|
# * reject - remove every present device
|
||||||
|
# * apply-policy - evaluate the ruleset for every present
|
||||||
|
# device
|
||||||
|
#
|
||||||
|
InsertedDevicePolicy=apply-policy
|
||||||
|
|
||||||
|
#
|
||||||
|
# Restore controller device state.
|
||||||
|
#
|
||||||
|
# The USBGuard daemon modifies some attributes of controller
|
||||||
|
# devices like the default authorization state of new child device
|
||||||
|
# instances. Using this setting, you can controll whether the
|
||||||
|
# daemon will try to restore the attribute values to the state
|
||||||
|
# before modificaton on shutdown.
|
||||||
|
#
|
||||||
|
# SECURITY CONSIDERATIONS: If set to true, the USB authorization
|
||||||
|
# policy could be bypassed by performing some sort of attack on the
|
||||||
|
# daemon (via a local exploit or via a USB device) to make it shutdown
|
||||||
|
# and restore to the operating-system default state (known to be permissive).
|
||||||
|
#
|
||||||
|
RestoreControllerDeviceState=false
|
||||||
|
|
||||||
|
#
|
||||||
|
# Device manager backend
|
||||||
|
#
|
||||||
|
# Which device manager backend implementation to use. One of:
|
||||||
|
#
|
||||||
|
# * uevent - Netlink based implementation which uses sysfs to scan for present
|
||||||
|
# devices and an uevent netlink socket for receiving USB device
|
||||||
|
# related events.
|
||||||
|
# * dummy - A dummy device manager which simulates several devices and device
|
||||||
|
# events. Useful for testing.
|
||||||
|
#
|
||||||
|
DeviceManagerBackend=uevent
|
||||||
|
|
||||||
|
#!!! WARNING: It's good practice to set at least one of the !!!
|
||||||
|
#!!! two options bellow. If none of them are set, !!!
|
||||||
|
#!!! the daemon will accept IPC connections from !!!
|
||||||
|
#!!! anyone, thus allowing anyone to modify the !!!
|
||||||
|
#!!! rule set and (de)authorize USB devices. !!!
|
||||||
|
|
||||||
|
#
|
||||||
|
# Users allowed to use the IPC interface.
|
||||||
|
#
|
||||||
|
# A space delimited list of usernames that the daemon will
|
||||||
|
# accept IPC connections from.
|
||||||
|
#
|
||||||
|
# IPCAllowedUsers=username1 username2 ...
|
||||||
|
#
|
||||||
|
IPCAllowedUsers=root
|
||||||
|
|
||||||
|
#
|
||||||
|
# Groups allowed to use the IPC interface.
|
||||||
|
#
|
||||||
|
# A space delimited list of groupnames that the daemon will
|
||||||
|
# accept IPC connections from.
|
||||||
|
#
|
||||||
|
# IPCAllowedGroups=groupname1 groupname2 ...
|
||||||
|
#
|
||||||
|
IPCAllowedGroups=wheel
|
||||||
|
|
||||||
|
#
|
||||||
|
# IPC access control definition files path.
|
||||||
|
#
|
||||||
|
# The files at this location will be interpreted by the daemon
|
||||||
|
# as access control definition files. The (base)name of a file
|
||||||
|
# should be in the form:
|
||||||
|
#
|
||||||
|
# [user][:<group>]
|
||||||
|
#
|
||||||
|
# and should contain lines in the form:
|
||||||
|
#
|
||||||
|
# <section>=[privilege] ...
|
||||||
|
#
|
||||||
|
# This way each file defines who is able to connect to the IPC
|
||||||
|
# bus and what privileges he has.
|
||||||
|
#
|
||||||
|
IPCAccessControlFiles=/etc/usbguard/IPCAccessControl.d/
|
||||||
|
|
||||||
|
#
|
||||||
|
# Generate device specific rules including the "via-port"
|
||||||
|
# attribute.
|
||||||
|
#
|
||||||
|
# This option modifies the behavior of the allowDevice
|
||||||
|
# action. When instructed to generate a permanent rule,
|
||||||
|
# the action can generate a port specific rule. Because
|
||||||
|
# some systems have unstable port numbering, the generated
|
||||||
|
# rule might not match the device after rebooting the system.
|
||||||
|
#
|
||||||
|
# If set to false, the generated rule will still contain
|
||||||
|
# the "parent-hash" attribute which also defines an association
|
||||||
|
# to the parent device. See usbguard-rules.conf(5) for more
|
||||||
|
# details.
|
||||||
|
#
|
||||||
|
DeviceRulesWithPort=false
|
||||||
|
|
||||||
|
#
|
||||||
|
# USBGuard Audit events log backend
|
||||||
|
#
|
||||||
|
# One of:
|
||||||
|
#
|
||||||
|
# * FileAudit - Log audit events into a file specified by
|
||||||
|
# AuditFilePath setting (see below)
|
||||||
|
# * LinuxAudit - Log audit events using the Linux Audit
|
||||||
|
# subsystem (using audit_log_user_message)
|
||||||
|
#
|
||||||
|
AuditBackend=FileAudit
|
||||||
|
|
||||||
|
#
|
||||||
|
# USBGuard audit events log file path.
|
||||||
|
#
|
||||||
|
AuditFilePath=/var/log/usbguard/usbguard-audit.log
|
||||||
|
|
||||||
|
#
|
||||||
|
# Hides personally identifiable information such as device serial numbers and
|
||||||
|
# hashes of descriptors (which include the serial number) from audit entries.
|
||||||
|
#
|
||||||
|
HidePII=false
|
@ -0,0 +1,17 @@
|
|||||||
|
diff -up ./configure.ac.fix ./configure.ac
|
||||||
|
--- ./configure.ac.fix 2022-03-03 15:05:03.357194713 +0100
|
||||||
|
+++ ./configure.ac 2022-03-03 15:06:02.849787794 +0100
|
||||||
|
@@ -394,11 +394,11 @@ if test "x$with_bundled_catch" = xyes; t
|
||||||
|
catch_summary="bundled; $catch_CFLAGS $catch_LIBS"
|
||||||
|
else
|
||||||
|
SAVE_CPPFLAGS=$CPPFLAGS
|
||||||
|
- CPPFLAGS="-std=c++17 $CPPFLAGS -I/usr/include/catch2"
|
||||||
|
+ CPPFLAGS="-std=c++17 $CPPFLAGS -I/usr/include/catch"
|
||||||
|
AC_LANG_PUSH([C++])
|
||||||
|
AC_CHECK_HEADER([catch.hpp], [], [AC_MSG_FAILURE(catch.hpp not found or not usable. Re-run with --with-bundled-catch to use the bundled library.)])
|
||||||
|
AC_LANG_POP
|
||||||
|
- catch_CFLAGS="-I/usr/include/catch2"
|
||||||
|
+ catch_CFLAGS="-I/usr/include/catch"
|
||||||
|
catch_LIBS=""
|
||||||
|
CPPFLAGS=$SAVE_CPPFLAGS
|
||||||
|
catch_summary="system-wide; $catch_CFLAGS $catch_LIBS"
|
@ -0,0 +1,597 @@
|
|||||||
|
%global _hardened_build 1
|
||||||
|
%global selinuxtype targeted
|
||||||
|
%global moduletype contrib
|
||||||
|
%define semodule_version 0.0.5
|
||||||
|
%define notifier_version 0.1.1
|
||||||
|
|
||||||
|
Name: usbguard
|
||||||
|
Version: 1.1.3
|
||||||
|
Release: 4%{?dist}
|
||||||
|
Summary: A tool for implementing USB device usage policy
|
||||||
|
License: GPL-2.0-or-later
|
||||||
|
## Not installed
|
||||||
|
# src/ThirdParty/Catch: Boost Software License - Version 1.0
|
||||||
|
URL: https://usbguard.github.io/
|
||||||
|
Source0: https://github.com/USBGuard/usbguard/releases/download/%{name}-%{version}/%{name}-%{version}.tar.gz
|
||||||
|
Source1: https://github.com/USBGuard/usbguard-selinux/archive/refs/tags/v%{semodule_version}.tar.gz#/%{name}-selinux-%{semodule_version}.tar.gz
|
||||||
|
Source2: https://github.com/Cropi/%{name}-notifier/releases/download/%{name}-notifier-%{notifier_version}/%{name}-notifier-%{notifier_version}.tar.gz
|
||||||
|
Source3: usbguard-daemon.conf
|
||||||
|
ExcludeArch: i686
|
||||||
|
|
||||||
|
Requires: systemd
|
||||||
|
Requires(post): systemd
|
||||||
|
Requires(preun): systemd
|
||||||
|
Requires(postun): systemd
|
||||||
|
Requires(post): /sbin/ldconfig
|
||||||
|
Requires(postun): /sbin/ldconfig
|
||||||
|
|
||||||
|
Recommends: (%{name}-selinux if selinux-policy-%{selinuxtype})
|
||||||
|
Obsoletes: %{name}-applet-qt < 0.7.6
|
||||||
|
|
||||||
|
BuildRequires: make
|
||||||
|
BuildRequires: gcc
|
||||||
|
BuildRequires: gcc-c++
|
||||||
|
BuildRequires: libqb-devel
|
||||||
|
BuildRequires: openssl-devel
|
||||||
|
BuildRequires: libstdc++-devel
|
||||||
|
BuildRequires: protobuf-devel protobuf-compiler
|
||||||
|
BuildRequires: PEGTL-static
|
||||||
|
BuildRequires: catch1-devel
|
||||||
|
BuildRequires: autoconf automake libtool
|
||||||
|
BuildRequires: bash-completion
|
||||||
|
BuildRequires: asciidoc
|
||||||
|
BuildRequires: audit-libs-devel
|
||||||
|
# For `pkg-config systemd` only
|
||||||
|
BuildRequires: systemd
|
||||||
|
|
||||||
|
Patch1: usbguard-revert-catch.patch
|
||||||
|
Patch2: disable-console-logging.patch
|
||||||
|
|
||||||
|
%description
|
||||||
|
The USBGuard software framework helps to protect your computer against rogue USB
|
||||||
|
devices by implementing basic whitelisting/blacklisting capabilities based on
|
||||||
|
USB device attributes.
|
||||||
|
|
||||||
|
%package devel
|
||||||
|
Summary: Development files for %{name}
|
||||||
|
Requires: %{name} = %{version}-%{release}
|
||||||
|
Requires: pkgconfig
|
||||||
|
Requires: libstdc++-devel
|
||||||
|
|
||||||
|
%description devel
|
||||||
|
The %{name}-devel package contains libraries and header files for
|
||||||
|
developing applications that use %{name}.
|
||||||
|
|
||||||
|
%package tools
|
||||||
|
Summary: USBGuard Tools
|
||||||
|
Requires: %{name} = %{version}-%{release}
|
||||||
|
|
||||||
|
%description tools
|
||||||
|
The %{name}-tools package contains optional tools from the USBGuard
|
||||||
|
software framework.
|
||||||
|
|
||||||
|
# dbus
|
||||||
|
%package dbus
|
||||||
|
Summary: USBGuard D-Bus Service
|
||||||
|
Requires: %{name} = %{version}-%{release}
|
||||||
|
BuildRequires: dbus-devel
|
||||||
|
BuildRequires: glib2-devel
|
||||||
|
BuildRequires: polkit-devel
|
||||||
|
BuildRequires: libxslt
|
||||||
|
BuildRequires: libxml2
|
||||||
|
Requires: dbus
|
||||||
|
Requires: polkit
|
||||||
|
|
||||||
|
%description dbus
|
||||||
|
The %{name}-dbus package contains an optional component that provides
|
||||||
|
a D-Bus interface to the USBGuard daemon component.
|
||||||
|
|
||||||
|
%package selinux
|
||||||
|
Summary: USBGuard selinux
|
||||||
|
Group: Applications/System
|
||||||
|
Requires: selinux-policy-%{selinuxtype}
|
||||||
|
Requires(post): selinux-policy-%{selinuxtype}
|
||||||
|
BuildRequires: selinux-policy-devel
|
||||||
|
BuildArch: noarch
|
||||||
|
%{?selinux_requires}
|
||||||
|
|
||||||
|
%description selinux
|
||||||
|
The %{name}-selinux package contains selinux policy for the USBGuard
|
||||||
|
daemon.
|
||||||
|
|
||||||
|
%package notifier
|
||||||
|
Summary: A tool for detecting usbguard policy and device presence changes
|
||||||
|
Group: Applications/System
|
||||||
|
Requires: %{name} = %{version}-%{release}
|
||||||
|
Requires: systemd
|
||||||
|
BuildRequires: librsvg2-devel
|
||||||
|
BuildRequires: libnotify-devel
|
||||||
|
BuildRequires: execstack
|
||||||
|
|
||||||
|
%description notifier
|
||||||
|
The %{name}-notifier package detects usbguard policy modifications as well as
|
||||||
|
device presence changes and displays them as pop-up notifications.
|
||||||
|
|
||||||
|
%prep
|
||||||
|
|
||||||
|
# usbguard
|
||||||
|
%setup -q
|
||||||
|
|
||||||
|
# selinux
|
||||||
|
%setup -q -D -T -a 1
|
||||||
|
|
||||||
|
# notifier
|
||||||
|
%setup -q -D -T -a 2
|
||||||
|
|
||||||
|
%patch -P 1 -p1 -b .catch
|
||||||
|
%patch -P 2 -p1
|
||||||
|
|
||||||
|
# Remove bundled library sources before build
|
||||||
|
rm -rf src/ThirdParty/{Catch,PEGTL}
|
||||||
|
|
||||||
|
%build
|
||||||
|
|
||||||
|
# usbguard
|
||||||
|
mkdir -p ./m4
|
||||||
|
autoreconf -i -v --no-recursive ./
|
||||||
|
%configure \
|
||||||
|
--disable-silent-rules \
|
||||||
|
--without-bundled-catch \
|
||||||
|
--without-bundled-pegtl \
|
||||||
|
--enable-systemd \
|
||||||
|
--with-dbus \
|
||||||
|
--with-polkit \
|
||||||
|
--with-crypto-library=openssl
|
||||||
|
|
||||||
|
make %{?_smp_mflags}
|
||||||
|
|
||||||
|
# selinux
|
||||||
|
pushd %{name}-selinux-%{semodule_version}
|
||||||
|
make
|
||||||
|
popd
|
||||||
|
|
||||||
|
# notifier
|
||||||
|
pushd %{name}-notifier-%{notifier_version}
|
||||||
|
mkdir -p ./m4
|
||||||
|
autoreconf -i -v --no-recursive ./
|
||||||
|
export CXXFLAGS="$RPM_OPT_FLAGS"
|
||||||
|
%configure \
|
||||||
|
--disable-silent-rules \
|
||||||
|
--without-bundled-catch \
|
||||||
|
--enable-debug-build \
|
||||||
|
--disable-notifier-cli \
|
||||||
|
--with-usbguard-devel="../"
|
||||||
|
|
||||||
|
%set_build_flags
|
||||||
|
make %{?_smp_mflags}
|
||||||
|
popd
|
||||||
|
|
||||||
|
%check
|
||||||
|
make check
|
||||||
|
|
||||||
|
# selinux
|
||||||
|
%pre selinux
|
||||||
|
%selinux_relabel_pre -s %{selinuxtype}
|
||||||
|
|
||||||
|
%install
|
||||||
|
make install INSTALL='install -p' DESTDIR=%{buildroot}
|
||||||
|
|
||||||
|
# Overwrite configuration with distribution defaults
|
||||||
|
mkdir -p %{buildroot}%{_sysconfdir}/usbguard
|
||||||
|
mkdir -p %{buildroot}%{_sysconfdir}/usbguard/rules.d
|
||||||
|
mkdir -p %{buildroot}%{_sysconfdir}/usbguard/IPCAccessControl.d
|
||||||
|
install -p -m 644 %{SOURCE3} %{buildroot}%{_sysconfdir}/usbguard/usbguard-daemon.conf
|
||||||
|
|
||||||
|
# selinux
|
||||||
|
install -d %{buildroot}%{_datadir}/selinux/packages/%{selinuxtype}
|
||||||
|
install -m 0644 %{name}-selinux-%{semodule_version}/%{name}.pp.bz2 %{buildroot}%{_datadir}/selinux/packages/%{selinuxtype}
|
||||||
|
install -d -p %{buildroot}%{_datadir}/selinux/devel/include/%{moduletype}
|
||||||
|
install -p -m 644 %{name}-selinux-%{semodule_version}/%{name}.if %{buildroot}%{_datadir}/selinux/devel/include/%{moduletype}/ipp-%{name}.if
|
||||||
|
|
||||||
|
# notifier
|
||||||
|
pushd %{name}-notifier-%{notifier_version}
|
||||||
|
make install INSTALL='install -p' DESTDIR=%{buildroot}
|
||||||
|
execstack -c %{buildroot}%{_bindir}/%{name}-notifier
|
||||||
|
popd
|
||||||
|
|
||||||
|
# Cleanup
|
||||||
|
find %{buildroot} \( -name '*.la' -o -name '*.a' \) -exec rm -f {} ';'
|
||||||
|
|
||||||
|
%preun
|
||||||
|
%systemd_preun usbguard.service
|
||||||
|
|
||||||
|
%post
|
||||||
|
%{?ldconfig}
|
||||||
|
%systemd_post usbguard.service
|
||||||
|
|
||||||
|
%postun
|
||||||
|
%{?ldconfig}
|
||||||
|
%systemd_postun usbguard.service
|
||||||
|
|
||||||
|
%files
|
||||||
|
%doc README.adoc CHANGELOG.md
|
||||||
|
%license LICENSE
|
||||||
|
%{_libdir}/*.so.*
|
||||||
|
%{_sbindir}/usbguard-daemon
|
||||||
|
%{_bindir}/usbguard
|
||||||
|
%dir %{_localstatedir}/log/usbguard
|
||||||
|
%dir %{_sysconfdir}/usbguard
|
||||||
|
%dir %{_sysconfdir}/usbguard/rules.d/
|
||||||
|
%dir %{_sysconfdir}/usbguard/IPCAccessControl.d
|
||||||
|
%config(noreplace) %attr(0600,-,-) %{_sysconfdir}/usbguard/usbguard-daemon.conf
|
||||||
|
%config(noreplace) %attr(0600,-,-) %{_sysconfdir}/usbguard/rules.conf
|
||||||
|
%{_unitdir}/usbguard.service
|
||||||
|
%{_datadir}/man/man8/usbguard-daemon.8.gz
|
||||||
|
%{_datadir}/man/man5/usbguard-daemon.conf.5.gz
|
||||||
|
%{_datadir}/man/man5/usbguard-rules.conf.5.gz
|
||||||
|
%{_datadir}/man/man1/usbguard.1.gz
|
||||||
|
%{_datadir}/bash-completion/completions/usbguard
|
||||||
|
|
||||||
|
%files devel
|
||||||
|
%{_includedir}/*
|
||||||
|
%{_libdir}/*.so
|
||||||
|
%{_libdir}/pkgconfig/*.pc
|
||||||
|
|
||||||
|
%files tools
|
||||||
|
%{_bindir}/usbguard-rule-parser
|
||||||
|
|
||||||
|
# dbus
|
||||||
|
%files dbus
|
||||||
|
%{_sbindir}/usbguard-dbus
|
||||||
|
%{_datadir}/dbus-1/system-services/org.usbguard1.service
|
||||||
|
%{_datadir}/dbus-1/system.d/org.usbguard1.conf
|
||||||
|
%{_datadir}/polkit-1/actions/org.usbguard1.policy
|
||||||
|
%{_unitdir}/usbguard-dbus.service
|
||||||
|
%{_mandir}/man8/usbguard-dbus.8.gz
|
||||||
|
|
||||||
|
%preun dbus
|
||||||
|
%systemd_preun usbguard-dbus.service
|
||||||
|
|
||||||
|
%post dbus
|
||||||
|
%systemd_post usbguard-dbus.service
|
||||||
|
|
||||||
|
%postun dbus
|
||||||
|
%systemd_postun_with_restart usbguard-dbus.service
|
||||||
|
|
||||||
|
%files selinux
|
||||||
|
%{_datadir}/selinux/packages/%{selinuxtype}/%{name}.pp.bz2
|
||||||
|
%ghost %verify(not md5 size mode mtime) %{_sharedstatedir}/selinux/%{selinuxtype}/active/modules/200/%{name}
|
||||||
|
%{_datadir}/selinux/devel/include/%{moduletype}/ipp-%{name}.if
|
||||||
|
|
||||||
|
%post selinux
|
||||||
|
%selinux_modules_install -s %{selinuxtype} %{_datadir}/selinux/packages/%{selinuxtype}/%{name}.pp.bz2
|
||||||
|
|
||||||
|
%postun selinux
|
||||||
|
if [ $1 -eq 0 ]; then
|
||||||
|
%selinux_modules_uninstall -s %{selinuxtype} %{name}
|
||||||
|
fi
|
||||||
|
|
||||||
|
%posttrans selinux
|
||||||
|
%selinux_relabel_post -s %{selinuxtype}
|
||||||
|
|
||||||
|
%files notifier
|
||||||
|
%defattr(-,root,root,-)
|
||||||
|
%doc %{name}-notifier-%{notifier_version}/README.md %{name}-notifier-%{notifier_version}/CHANGELOG.md
|
||||||
|
%license %{name}-notifier-%{notifier_version}/LICENSE
|
||||||
|
%{_bindir}/%{name}-notifier
|
||||||
|
%{_mandir}/man1/%{name}-notifier.1.gz
|
||||||
|
%{_userunitdir}/%{name}-notifier.service
|
||||||
|
|
||||||
|
%post notifier
|
||||||
|
%systemd_user_post \--preset-mode=disable-only %{name}-notifier.service
|
||||||
|
|
||||||
|
%preun notifier
|
||||||
|
%systemd_user_preun %{name}-notifier.service
|
||||||
|
|
||||||
|
%postun notifier
|
||||||
|
%systemd_user_postun_with_restart %{name}-notifier.service
|
||||||
|
|
||||||
|
|
||||||
|
%changelog
|
||||||
|
* Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - 1.1.3-4
|
||||||
|
- Bump release for June 2024 mass rebuild
|
||||||
|
|
||||||
|
* Tue Jun 18 2024 Attila Lakatos <alakatos@redhat.com> - 1.1.3-3
|
||||||
|
- Disable building for i686
|
||||||
|
- Update Requires list on selinux subpackage
|
||||||
|
Resolves: RHEL-37322
|
||||||
|
|
||||||
|
* Fri Jun 07 2024 Attila Lakatos <alakatos@redhat.com> - 1.1.3-2
|
||||||
|
- Rebase to 1.1.3
|
||||||
|
- Update usbguard-selinux subpackage
|
||||||
|
- Include usbguard-notifier subpackage
|
||||||
|
Resolves: RHEL-37322
|
||||||
|
- Disable logging to console
|
||||||
|
|
||||||
|
* Sat Jan 27 2024 Fedora Release Engineering <releng@fedoraproject.org> - 1.1.2-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Jul 27 2023 Attila Lakatos <alakatos@redhat.com> - 1.1.2-1
|
||||||
|
- Rebase to 1.1.2
|
||||||
|
Resolves: rhbz#2064543
|
||||||
|
|
||||||
|
* Sat Jul 22 2023 Fedora Release Engineering <releng@fedoraproject.org> - 1.1.0-8
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed May 10 2023 Tomas Popela <tpopela@redhat.com> - 1.1.0-7
|
||||||
|
- Drop BR on dbus-glib as the requirement was dropped in 0.7.7
|
||||||
|
|
||||||
|
* Mon Feb 20 2023 Attila Lakatos <alakatos@redhat.com> - 1.1.0-6
|
||||||
|
- Rebuild
|
||||||
|
Resolves: rhbz#2171749
|
||||||
|
|
||||||
|
* Sat Jan 21 2023 Fedora Release Engineering <releng@fedoraproject.org> - 1.1.0-5
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
|
||||||
|
|
||||||
|
* Sat Jul 23 2022 Fedora Release Engineering <releng@fedoraproject.org> - 1.1.0-4
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Mar 29 2022 Radovan Sroka <rsroka@redhat.com> - 1.1.0-3
|
||||||
|
- usbguard requires selinux subpackage
|
||||||
|
- this ensures that the selinux package and all its dependencies are
|
||||||
|
not pulled into containers and other systems that do not use SELinux
|
||||||
|
|
||||||
|
* Tue Mar 15 2022 Radovan Sroka <rsroka@redhat.com> - 1.1.0-2
|
||||||
|
- selinux: allow policykit dbus comunnication
|
||||||
|
- restore support for access control filenames without a group
|
||||||
|
|
||||||
|
* Thu Mar 03 2022 Radovan Sroka <rsroka@redhat.com> - 1.1.0-1
|
||||||
|
- rebase to 1.1.0
|
||||||
|
Resolves: rhbz#2058450
|
||||||
|
- fixed CVE-2019-25058 usbguard: Fix unauthorized access via D-Bus
|
||||||
|
Resolves: rhbz#2058466
|
||||||
|
|
||||||
|
* Sat Jan 22 2022 Fedora Release Engineering <releng@fedoraproject.org> - 1.0.0-9
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
|
||||||
|
|
||||||
|
* Sat Nov 06 2021 Adrian Reber <adrian@lisas.de> - 1.0.0-8
|
||||||
|
- Rebuilt for protobuf 3.19.0
|
||||||
|
|
||||||
|
* Mon Oct 25 2021 Adrian Reber <adrian@lisas.de> - 1.0.0-7
|
||||||
|
- Rebuilt for protobuf 3.18.1
|
||||||
|
|
||||||
|
* Fri Jul 23 2021 Fedora Release Engineering <releng@fedoraproject.org> - 1.0.0-6
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed Mar 31 2021 Jonathan Wakely <jwakely@redhat.com> - 1.0.0-5
|
||||||
|
- Rebuilt for removed libstdc++ symbols (#1937698)
|
||||||
|
|
||||||
|
* Tue Mar 02 2021 Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> - 1.0.0-4
|
||||||
|
- Rebuilt for updated systemd-rpm-macros
|
||||||
|
See https://pagure.io/fesco/issue/2583.
|
||||||
|
|
||||||
|
* Wed Jan 27 2021 Fedora Release Engineering <releng@fedoraproject.org> - 1.0.0-3
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
|
||||||
|
|
||||||
|
* Sat Jan 16 12:49:32 CET 2021 Adrian Reber <adrian@lisas.de> - 1.0.0-2
|
||||||
|
- Rebuilt for protobuf 3.14
|
||||||
|
|
||||||
|
* Thu Jan 14 2021 Zoltan Fridrich <zfridric@redhat.com> - 1.0.0-1
|
||||||
|
- rebase usbguard to 1.0.0
|
||||||
|
- added support for rules covering combination of classes
|
||||||
|
- fix usbguard being killed
|
||||||
|
Resolves: rhbz#1916039
|
||||||
|
Resolves: rhbz#1861330
|
||||||
|
Resolves: rhbz#1905257
|
||||||
|
|
||||||
|
* Wed Jan 13 14:43:57 CET 2021 Adrian Reber <adrian@lisas.de> - 0.7.8-6
|
||||||
|
- Rebuilt for protobuf 3.14
|
||||||
|
|
||||||
|
* Thu Sep 24 2020 Adrian Reber <adrian@lisas.de> - 0.7.8-5
|
||||||
|
- Rebuilt for protobuf 3.13
|
||||||
|
|
||||||
|
* Wed Jul 29 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.7.8-4
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed Jun 24 2020 Radovan Sroka <rsroka@redhat.com> - 0.7.8-3
|
||||||
|
- rebase selinux tarball to v0.0.4
|
||||||
|
- enable forking style in unit file
|
||||||
|
- set DevicePolicy to closed in unit file
|
||||||
|
- usbguard prevented from writing conf via dontaudit rule
|
||||||
|
Resolves: rhbz#1804713
|
||||||
|
Resolves: rhbz#1789923
|
||||||
|
|
||||||
|
* Sun Jun 14 2020 Adrian Reber <adrian@lisas.de> - 0.7.8-2
|
||||||
|
- Rebuilt for protobuf 3.12
|
||||||
|
|
||||||
|
* Tue May 19 2020 Radovan Sroka <rsroka@redhat.com> - 0.7.8-1
|
||||||
|
- rebase usbguard to 0.7.8
|
||||||
|
- rebase usbguard-selinux to 0.0.3
|
||||||
|
- added rules.d/ directory
|
||||||
|
Resolves: rhbz#1808527
|
||||||
|
|
||||||
|
* Fri Jan 31 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.7.6-8
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Dec 19 2019 Orion Poplawski <orion@nwra.com> - 0.7.6-7
|
||||||
|
- Rebuild for protobuf 3.11
|
||||||
|
|
||||||
|
* Wed Dec 18 2019 Radovan Sroka <rsroka@redhat.com> - 0.7.6-6
|
||||||
|
- fix selinux problems
|
||||||
|
|
||||||
|
* Mon Dec 02 2019 Radovan Sroka <rsroka@redhat.com> - 0.7.6-5
|
||||||
|
- obsolete applet-qt subpackage
|
||||||
|
|
||||||
|
* Mon Nov 25 2019 Attila Lakatos <alakatos@redhat.com> - 0.7.6-4
|
||||||
|
- added patch for libqb related permission issues
|
||||||
|
resolves: rhbz#1776357
|
||||||
|
- added patch to ensure that usbguard-daemons is still running after locked screen
|
||||||
|
resolves: rhbz#1751861
|
||||||
|
- added patch to fix permanent device policy changes
|
||||||
|
|
||||||
|
* Wed Nov 13 2019 Radovan Sroka <rsroka@redhat.com> - 0.7.6-3
|
||||||
|
- fixed typo in specfile
|
||||||
|
- usbguard.conf was generated incorrectly
|
||||||
|
|
||||||
|
* Wed Nov 13 2019 Radovan Sroka <rsroka@redhat.com> - 0.7.6-2
|
||||||
|
- added selinux subpackage
|
||||||
|
|
||||||
|
* Mon Nov 11 2019 Radovan Sroka <rsroka@redhat.com> - 0.7.6-1
|
||||||
|
- rebase to 0.7.6
|
||||||
|
- removed usbguard-applet subpackage which is not in upstream anymore
|
||||||
|
|
||||||
|
* Sat Jul 27 2019 Fedora Release Engineering <releng@fedoraproject.org> - 0.7.2-8
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
|
||||||
|
|
||||||
|
* Sun Feb 03 2019 Fedora Release Engineering <releng@fedoraproject.org> - 0.7.2-7
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed Nov 21 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.7.2-6
|
||||||
|
- Rebuild for protobuf 3.6
|
||||||
|
|
||||||
|
* Sat Jul 14 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.7.2-5
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Apr 05 2018 Daniel Kopeček <dkopecek@redhat.com> - 0.7.2-4
|
||||||
|
- Update to latest PEGTL API
|
||||||
|
|
||||||
|
* Fri Feb 09 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.7.2-3
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Jan 23 2018 Daniel Kopeček <dkopecek@redhat.com> - 0.7.2-2
|
||||||
|
- Escape rpm macros mentioned in changelog section
|
||||||
|
|
||||||
|
* Tue Jan 23 2018 Daniel Kopeček <dkopecek@redhat.com> - 0.7.2-1
|
||||||
|
- Update to 0.7.2
|
||||||
|
- Don't use --enable-werror downstream
|
||||||
|
- Removed patches related to compiler warnings
|
||||||
|
|
||||||
|
* Mon Jan 15 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.7.1-2
|
||||||
|
- catch → catch1
|
||||||
|
|
||||||
|
* Wed Dec 06 2017 Daniel Kopeček <dkopecek@redhat.com> - 0.7.1-1
|
||||||
|
- Update to 0.7.1
|
||||||
|
|
||||||
|
* Wed Nov 29 2017 Igor Gnatenko <ignatenko@redhat.com> - 0.7.0-9
|
||||||
|
- Rebuild for protobuf 3.5
|
||||||
|
|
||||||
|
* Mon Nov 13 2017 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.7.0-8
|
||||||
|
- Rebuild for protobuf 3.4
|
||||||
|
|
||||||
|
* Mon Oct 16 2017 Daniel Kopeček <dkopecek@redhat.com> 0.7.0-7
|
||||||
|
- Fix enumeration timeout on kernel >= 4.13
|
||||||
|
Resolves: rhbz#1499052
|
||||||
|
|
||||||
|
* Thu Aug 03 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.7.0-6
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Jul 27 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.7.0-5
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Jul 13 2017 Daniel Kopeček <dkopecek@redhat.com> 0.7.0-4
|
||||||
|
- Added patch to disable unused parameter warning for protobuf
|
||||||
|
generated sources to fix compilation with newer protobuf version
|
||||||
|
|
||||||
|
* Tue Jun 13 2017 Orion Poplawski <orion@cora.nwra.com> - 0.7.0-3
|
||||||
|
- Rebuild for protobuf 3.3.1
|
||||||
|
|
||||||
|
* Mon May 15 2017 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.7.0-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_27_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Apr 13 2017 Daniel Kopeček <dkopecek@redhat.com> 0.7.0-1
|
||||||
|
- Update to 0.7.0
|
||||||
|
- changed PresentDevicePolicy setting from keep to apply-policy
|
||||||
|
- added AuditFilePath configuration option pointing to
|
||||||
|
/var/log/usbguard/usbguard-audit.log file
|
||||||
|
- install bash-completion script
|
||||||
|
- use 0600 file permissions for usbguard-daemon.conf and rules.conf
|
||||||
|
|
||||||
|
* Sun Mar 19 2017 Daniel Kopeček <dkopecek@redhat.com> 0.6.3-0.1.20170319
|
||||||
|
- Update to latest git snapshot
|
||||||
|
|
||||||
|
* Fri Mar 17 2017 Daniel Kopeček <dkopecek@redhat.com> 0.6.3-0.1.20170317
|
||||||
|
- Update to latest git snapshot
|
||||||
|
- Use --enable-werror configure option as the upstream default
|
||||||
|
changed to not use -Werror.
|
||||||
|
|
||||||
|
* Thu Mar 02 2017 Daniel Kopeček <dkopecek@redhat.com> 0.6.3-0.1.20170301
|
||||||
|
- Update to latest git snapshot
|
||||||
|
- Disabled upstream alignment warning compiler flag
|
||||||
|
|
||||||
|
* Sat Feb 11 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.6.2-4
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Jan 26 2017 Orion Poplawski <orion@cora.nwra.com> - 0.6.2-3
|
||||||
|
- Rebuild for protobuf 3.2.0
|
||||||
|
|
||||||
|
* Sat Nov 19 2016 Orion Poplawski <orion@cora.nwra.com> - 0.6.2-2
|
||||||
|
- Rebuild for protobuf 3.1.0
|
||||||
|
|
||||||
|
* Sun Sep 18 2016 Daniel Kopeček <dkopecek@redhat.com> 0.6.2-1
|
||||||
|
- Update to 0.6.2
|
||||||
|
|
||||||
|
* Fri Sep 16 2016 Daniel Kopeček <dkopecek@redhat.com> 0.6.1-1
|
||||||
|
- Update to 0.6.1
|
||||||
|
|
||||||
|
* Sun Sep 04 2016 Daniel Kopeček <dkopecek@redhat.com> 0.6.0-1
|
||||||
|
- Update to 0.6.0
|
||||||
|
|
||||||
|
* Thu Aug 18 2016 Daniel Kopeček <dkopecek@redhat.com> 0.5.14-1
|
||||||
|
- Update to 0.5.14
|
||||||
|
|
||||||
|
* Tue Aug 16 2016 Daniel Kopeček <dkopecek@redhat.com> 0.5.13-1
|
||||||
|
- Update to 0.5.13
|
||||||
|
|
||||||
|
* Sun Aug 14 2016 Daniel Kopeček <dkopecek@redhat.com> 0.5.12-1
|
||||||
|
- Update to 0.5.12
|
||||||
|
|
||||||
|
* Sat Aug 13 2016 Daniel Kopeček <dkopecek@redhat.com> 0.5.11-2
|
||||||
|
- Update source tarball
|
||||||
|
- Ship CHANGELOG.md
|
||||||
|
|
||||||
|
* Sat Aug 13 2016 Daniel Kopeček <dkopecek@redhat.com> 0.5.11-1
|
||||||
|
- Update to 0.5.11
|
||||||
|
- Use libgcrypt instead of libsodium for crypto
|
||||||
|
|
||||||
|
* Thu Jul 21 2016 Daniel Kopecek <dkopecek@redhat.com> 0.5.10-2
|
||||||
|
- Adjust the default configuration to keep the authorization state
|
||||||
|
of present controller devices.
|
||||||
|
|
||||||
|
* Sat Jul 09 2016 Daniel Kopecek <dkopecek@redhat.com> 0.5.10-1
|
||||||
|
- Update to release 0.5.10
|
||||||
|
|
||||||
|
* Mon Mar 07 2016 Remi Collet <remi@fedoraproject.org> - 0.4-5
|
||||||
|
- rebuild for new libsodium soname
|
||||||
|
|
||||||
|
* Sun Feb 07 2016 Daniel Kopecek <dkopecek@redhat.com> 0.4-4
|
||||||
|
- Update to version 0.4
|
||||||
|
- added usbguard CLI
|
||||||
|
- added a tools subpackage with usbguard-rule-parser binary
|
||||||
|
|
||||||
|
* Fri Feb 05 2016 Fedora Release Engineering <releng@fedoraproject.org> - 0.3p3-3
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
|
||||||
|
|
||||||
|
* Fri Jun 19 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.3p3-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Apr 14 2015 Daniel Kopecek <dkopecek@redhat.com> 0.3p3-1
|
||||||
|
- Update to version 0.3p3
|
||||||
|
- added %%check section
|
||||||
|
- removed explicit -devel requires on systemd, libqb and
|
||||||
|
libsodium devel files
|
||||||
|
- added -devel requires on libstdc++-devel
|
||||||
|
|
||||||
|
* Sat Apr 11 2015 Daniel Kopecek <dkopecek@redhat.com> 0.3p2-1
|
||||||
|
- Update to version 0.3p2
|
||||||
|
- use system-wide json and spdlog packages
|
||||||
|
|
||||||
|
* Fri Apr 10 2015 Daniel Kopecek <dkopecek@redhat.com> 0.3p1-1
|
||||||
|
- Update to version 0.3p1
|
||||||
|
- removed bundled cppformat copylib
|
||||||
|
|
||||||
|
* Thu Apr 09 2015 Daniel Kopecek <dkopecek@redhat.com> 0.3-1
|
||||||
|
- Update to version 0.3
|
||||||
|
- disabled silent rules
|
||||||
|
- install license file
|
||||||
|
- added man pages
|
||||||
|
- use _hardened_build 1 instead of custom compilation flags
|
||||||
|
- fix file permissions on files in /etc
|
||||||
|
- do not install an empty rule set file
|
||||||
|
|
||||||
|
* Fri Apr 03 2015 Daniel Kopecek <dkopecek@redhat.com> 0.2-1
|
||||||
|
- Update to version 0.2
|
||||||
|
- Updated description
|
||||||
|
- Corrected package group
|
||||||
|
|
||||||
|
* Tue Mar 17 2015 Daniel Kopecek <dkopecek@redhat.com> 0.1-1
|
||||||
|
- Initial package
|
Loading…
Reference in new issue