commit:     ce1c4232290943a5132bd7f4cce426b8fc8521a0
Author:     Dennis Lamm <expeditioneer <AT> gentoo <DOT> org>
AuthorDate: Mon Jul 29 04:20:27 2019 +0000
Commit:     Dennis Lamm <expeditioneer <AT> gentoo <DOT> org>
CommitDate: Mon Jul 29 04:21:12 2019 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ce1c4232

sys-apps/firejail: bump 0.9.60

Bug: https://bugs.gentoo.org/656360
Bug: https://bugs.gentoo.org/678976
Signed-off-by: Dennis Lamm <expeditioneer <AT> gentoo.org>
Package-Manager: Portage-2.3.66, Repoman-2.3.16

 sys-apps/firejail/Manifest               |  1 +
 sys-apps/firejail/firejail-0.9.60.ebuild | 53 ++++++++++++++++++++++++++++++++
 sys-apps/firejail/metadata.xml           | 36 +++++++++++-----------
 3 files changed, 72 insertions(+), 18 deletions(-)

diff --git a/sys-apps/firejail/Manifest b/sys-apps/firejail/Manifest
index 6f30a7cf305..ea5468b9f4e 100644
--- a/sys-apps/firejail/Manifest
+++ b/sys-apps/firejail/Manifest
@@ -1,2 +1,3 @@
+DIST 0.9.60.tar.gz 1067102 BLAKE2B 
c5fd9a9c60fe17fc7ae24946ae5ea2f666d1dd20d982c540783dd2e56d30859a24258c4f3426e2bafaff3530557f5865bc73af9573e399039e8d5b097e5cddee
 SHA512 
cb3eeff2f77801b4593a719a6b63da09cdc6c7f96f8ea8ea1aaa7e8538b080421a284441c6e43ce036fdf8510e08a73816c58d22f0af048344b8752f4a02759a
 DIST firejail-0.9.50.tar.xz 279488 BLAKE2B 
96d8e9161f0631ebfa400fd79c1d8d139d014da46cc2bf7fd3683f75ef7dced6a435e09e1733b675bc549662d50fddca9bd8811872a5ed186d731bb3c16903ea
 SHA512 
766fe8a0c65ddc717759f0ea54a4fe72213f43ecf241c385e484eb7e47bebd5896976998c76e6a5ef9c153d4007c2a01e9d942cc9f352c4b085fb02fe708a87d
 DIST firejail-0.9.56.tar.xz 327336 BLAKE2B 
4fe2276c3007e995ca2113ef870918287e1178ff0effdcd5d635fce6d170b6c3df2f75b45315fed1e58e1c993324b84091f7e6912493608233f96661c85ce7e2
 SHA512 
f9685be0cbfdf45f8f895041c63e005da483d9b09482ebda2776633ae0b048cd355b57bf4431348295507059633dfda45b0c8b2c1f4a83ad02ff661d32448d24

diff --git a/sys-apps/firejail/firejail-0.9.60.ebuild 
b/sys-apps/firejail/firejail-0.9.60.ebuild
new file mode 100644
index 00000000000..763ae58dfbd
--- /dev/null
+++ b/sys-apps/firejail/firejail-0.9.60.ebuild
@@ -0,0 +1,53 @@
+# Copyright 1999-2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit eutils
+
+DESCRIPTION="Security sandbox for any type of processes"
+HOMEPAGE="https://firejail.wordpress.com/";
+
+SRC_URI="https://github.com/netblue30/${PN}/archive/${PV}.tar.gz";
+
+LICENSE="GPL-2"
+SLOT="0"
+KEYWORDS="~amd64 ~x86"
+IUSE="apparmor +chroot contrib debug +file-transfer +globalcfg +network 
+overlayfs +private-home +seccomp +suid test +userns +whitelist x11"
+
+DEPEND="!sys-apps/firejail-lts
+       apparmor? ( sys-libs/libapparmor )
+       test? ( dev-tcltk/expect )"
+
+RDEPEND=" apparmor? ( sys-libs/libapparmor )"
+
+RESTRICT="test"
+
+src_prepare() {
+       default
+
+       find ./contrib -type f -name '*.py' | xargs sed --in-place 
's-#!/usr/bin/python3-#!/usr/bin/env python3-g'
+
+       find -type f -name Makefile.in | xargs sed --inplace --regexp-extended \
+                       --expression='/^\tinstall .*COPYING /d' \
+                       --expression='/CFLAGS/s: (-O2|-ggdb) : :g'
+
+       sed --inplace --regexp-extended '/CFLAGS/s: (-O2|-ggdb) : :g' 
./src/common.mk.in
+}
+
+src_configure() {
+       econf \
+               $(use_enable apparmor) \
+               $(use_enable chroot) \
+               $(use_enable contrib contrib-install) \
+               $(use_enable file-transfer) \
+               $(use_enable globalcfg) \
+               $(use_enable network) \
+               $(use_enable overlayfs) \
+               $(use_enable private-home)
+               $(use_enable seccomp) \
+               $(use_enable suid) \
+               $(use_enable userns) \
+               $(use_enable whitelist) \
+               $(use_enable x11)
+}

diff --git a/sys-apps/firejail/metadata.xml b/sys-apps/firejail/metadata.xml
index ab427dfd4c8..ff858199d28 100644
--- a/sys-apps/firejail/metadata.xml
+++ b/sys-apps/firejail/metadata.xml
@@ -1,36 +1,36 @@
 <?xml version="1.0" encoding="UTF-8"?>
 <!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd";>
 <pkgmetadata>
-       <!-- maintainer-needed -->
+       <maintainer type="person">
+               <email>[email protected]</email>
+               <name>Dennis Lamm</name>
+       </maintainer>
        <longdescription lang="en">
-               Firejail is a SUID program that reduces the risk of security 
breaches
-               by restricting the running environment of untrusted 
applications using
-               Linux namespaces and seccomp-bpf. It allows a process and all 
its
-               descendants to have their own private view of the globally 
shared
-               kernel resources, such as the network stack, process table, 
mount
-               table.
+               Firejail is a SUID program that reduces the risk of security 
breaches by restricting the running environment of
+               untrusted applications using Linux namespaces and seccomp-bpf. 
It allows a process and all its descendants to 
+               have their own private view of the globally shared kernel 
resources, such as the network stack, process table,
+               mount table.
 
-               This is bleeding edge branch. For long term support version see
-               sys-apps/firejail-lts.
+               This is the regular version. For a long term support version 
see sys-apps/firejail-lts.
        </longdescription>
        <upstream>
                <remote-id type="sourceforge">firejail</remote-id>
        </upstream>
        <use>
-               <flag name="apparmor">Enable support for custom AppArmor
-                       profiles</flag>
+               <flag name="apparmor">Enable support for custom AppArmor 
profiles</flag>
                <flag name="bind">Enable custom bind mounts</flag>
                <flag name="chroot">Enable chrooting to custom directory</flag>
                <flag name="contrib">Install contrib scripts</flag>
-               <flag name="file-transfer">Enable file transfers between 
sandboxes and
-                       the host system</flag>
+               <flag name="file-transfer">Enable file transfers between 
sandboxes and the host system</flag>
+               <flag name="globalcfg">Enable global config file</flag>
                <flag name="network">Enable networking features</flag>
-               <flag name="network-restricted">Grant access to --interface,
-                       --net=ethXXX and --netfilter only to root user; regular 
users are
-                       only allowed --net=none</flag>
+               <flag name="network-restricted">Grant access to --interface, 
--net=ethXXX and --netfilter only to root user;
+                                                                               
regular users are       only allowed --net=none</flag>
+               <flag name="overlayfs">Enable overlayfs</flag>
+               <flag name="private-home">Enable private home feature</flag>
                <flag name="seccomp">Enable system call filtering</flag>
-               <flag name="userns">Enable attaching a new user namespace to a
-                       sandbox (--noroot option)</flag>
+               <flag name="userns">Enable attaching a new user namespace to a 
sandbox (--noroot option)</flag>
+               <flag name="whitelist">Enable whitelist</flag>
                <flag name="x11">Enable X11 sandboxing</flag>
        </use>
 </pkgmetadata>

Reply via email to