/[packages]/cauldron/firefox-ext-noscript/current/SPECS/firefox-ext-noscript.spec
ViewVC logotype

Annotation of /cauldron/firefox-ext-noscript/current/SPECS/firefox-ext-noscript.spec

Parent Directory Parent Directory | Revision Log Revision Log


Revision 84082 - (hide annotations) (download)
Tue Apr 12 22:48:50 2011 UTC (12 years, 11 months ago) by tv
File size: 2070 byte(s)
use alternate URL
1 tv 62101 %define pre 0
2 tv 45603 Summary: Firefox extension that protects against XSS and Clickjacking attacks
3     Name: firefox-ext-noscript
4 tv 84080 Version: 2.1.0.2
5 tv 62100 %if %pre
6 tv 52766 Release: %mkrel 0.1%pre
7 tv 62100 %else
8     Release: %mkrel 1
9     %endif
10 tv 45603 License: MPL
11     Group: Networking/WWW
12     URL: https://addons.mozilla.org/en-US/firefox/addon/722/
13 tv 62102 %if %pre
14 tv 67782 Source: http://releases.mozilla.org/pub/mozilla.org/addons/722/noscript-%{version}%{pre}-sm+fn+fx.xpi
15 tv 62102 %else
16 tv 84082 Source: https://secure.informaction.com/download/releases/noscript-%{version}.xpi
17     #Source: http://releases.mozilla.org/pub/mozilla.org/addons/722/noscript-%{version}-sm+fn+fx.xpi
18 tv 62102 %endif
19 tv 45603 BuildRoot: %{_tmppath}/%{name}-%{version}-buildroot
20     Requires: firefox >= %{firefox_epoch}:%{firefox_version}
21     BuildRequires: firefox-devel
22     Buildarch: noarch
23    
24     %description
25     The best security you can get in a web browser!
26     Allow active content to run only from sites you trust, and protect yourself
27     against XSS and Clickjacking attacks.
28    
29 tv 53866 This tool provides extra protection to your Firefox.
30 tv 45603 It allows JavaScript, Java and other executable content to run only from
31     trusted domains of your choice, e.g. your home-banking web site, guarding your
32     "trust boundaries" against cross-site scripting attacks (XSS), cross-zone DNS
33     rebinding / CSRF attacks (router hacking), and Clickjacking attempts, thanks to
34     its unique ClearClick technology.
35    
36     Such a preemptive approach prevents exploitation of security vulnerabilities
37     (known and even unknown!) with no loss of functionality...
38     Experts do agree: Firefox is really safer with NoScript ;-)
39    
40     %prep
41     %setup -q -c -n %{name}-%{version}
42    
43     %install
44     rm -rf %{buildroot}
45     mkdir -p %{buildroot}%{firefox_extdir}
46    
47     hash="$(sed -n '/.*em:id="\(.*\)"/{s//\1/p;q}' install.rdf)"
48     if [ -z "$hash" ]; then
49     hash="$(sed -n '/.*em:id>\(.*\)<\/em:id>.*/{s//\1/p;q}' install.rdf)"
50     fi
51     if [ -z "$hash" ]; then
52     echo "Failed to find plugin hash."
53     exit 1
54     fi
55     extdir="%{firefox_extdir}/"
56     mkdir -p "%{buildroot}$extdir"
57     cp -af %SOURCE0 "%{buildroot}$extdir/$hash.xpi"
58    
59     %clean
60     rm -rf %{buildroot}
61    
62     %files
63     %defattr(0644,root,root,0755)
64     %{firefox_extdir}
65    
66    
67    
68    

  ViewVC Help
Powered by ViewVC 1.1.30