Date: Tuesday, November 22, 2016 @ 11:24:02 Author: demize Revision: 196520
archrelease: copy trunk to community-testing-i686, community-testing-x86_64 Added: haproxy/repos/community-testing-i686/ haproxy/repos/community-testing-i686/PKGBUILD (from rev 196519, haproxy/trunk/PKGBUILD) haproxy/repos/community-testing-i686/haproxy.cfg (from rev 196519, haproxy/trunk/haproxy.cfg) haproxy/repos/community-testing-i686/haproxy.install (from rev 196519, haproxy/trunk/haproxy.install) haproxy/repos/community-testing-x86_64/ haproxy/repos/community-testing-x86_64/PKGBUILD (from rev 196519, haproxy/trunk/PKGBUILD) haproxy/repos/community-testing-x86_64/haproxy.cfg (from rev 196519, haproxy/trunk/haproxy.cfg) haproxy/repos/community-testing-x86_64/haproxy.install (from rev 196519, haproxy/trunk/haproxy.install) ------------------------------------------+ community-testing-i686/PKGBUILD | 70 +++++++++++++++++++++++++++++ community-testing-i686/haproxy.cfg | 49 ++++++++++++++++++++ community-testing-i686/haproxy.install | 12 ++++ community-testing-x86_64/PKGBUILD | 70 +++++++++++++++++++++++++++++ community-testing-x86_64/haproxy.cfg | 49 ++++++++++++++++++++ community-testing-x86_64/haproxy.install | 12 ++++ 6 files changed, 262 insertions(+) Copied: haproxy/repos/community-testing-i686/PKGBUILD (from rev 196519, haproxy/trunk/PKGBUILD) =================================================================== --- community-testing-i686/PKGBUILD (rev 0) +++ community-testing-i686/PKGBUILD 2016-11-22 11:24:02 UTC (rev 196520) @@ -0,0 +1,70 @@ +# $Id$ +# Maintainer: Johannes Löthberg <johan...@kyriasis.com> +# Contributor: Bartłomiej Piotrowski <bpiotrow...@archlinux.org> + +pkgname=haproxy +pkgver=1.6.10 +pkgrel=1 + +pkgdesc='Reliable, high performance TCP/HTTP load balancer' +url='http://haproxy.org/' +arch=('i686' 'x86_64') +license=('GPL') + +depends=('openssl' 'pcre' 'zlib' 'lua') + +backup=('etc/haproxy/haproxy.cfg') + +install=haproxy.install + +source=(http://haproxy.org/download/${pkgver%.*}/src/haproxy-$pkgver.tar.gz + haproxy.cfg) + +md5sums=('6d47461c008b823a0088d19ec30dbe4e' + '02241a8ca257d12f7eb131e2d7da3f3b') + +prepare() { + cd haproxy-$pkgver + sed -i 's:/usr/sbin/haproxy:/usr/bin/haproxy:' src/haproxy-systemd-wrapper.c +} + +build() { + cd haproxy-$pkgver + + make CPU=generic TARGET=linux2628 \ + USE_GETADDRINFO=1 \ + USE_OPENSSL=1 \ + USE_PCRE=1 USE_PCRE_JIT=1 \ + USE_ZLIB=1 \ + USE_LUA=1 + + for contrib in halog iprange systemd; do + make -C contrib/$contrib SBINDIR=/usr/bin + done +} + +package() { + cd haproxy-$pkgver + make \ + EXTRA=haproxy-systemd-wrapper \ + PREFIX="$pkgdir"/usr \ + SBINDIR="$pkgdir"/usr/bin \ + DOCDIR="$pkgdir"/usr/share/$pkgname \ + install + + for contrib in halog iprange; do + install -Dm755 contrib/$contrib/$contrib "$pkgdir"/usr/bin/$contrib + done + + install -Dm644 ../haproxy.cfg "$pkgdir"/etc/haproxy/haproxy.cfg + install -Dm644 contrib/systemd/haproxy.service \ + "$pkgdir"/usr/lib/systemd/system/haproxy.service + + install -d "$pkgdir"/usr/share/haproxy/examples/errorfiles + install -m644 examples/*.cfg "$pkgdir"/usr/share/haproxy/examples/ + install -m644 examples/errorfiles/*.http \ + "$pkgdir"/usr/share/haproxy/examples/errorfiles/ + + install -Dm644 examples/haproxy.vim \ + "$pkgdir"/usr/share/vim/vimfiles/syntax/haproxy.vim +} Copied: haproxy/repos/community-testing-i686/haproxy.cfg (from rev 196519, haproxy/trunk/haproxy.cfg) =================================================================== --- community-testing-i686/haproxy.cfg (rev 0) +++ community-testing-i686/haproxy.cfg 2016-11-22 11:24:02 UTC (rev 196520) @@ -0,0 +1,49 @@ +#--------------------------------------------------------------------- +# Example configuration. See the full configuration manual online. +# +# http://www.haproxy.org/download/1.6/doc/configuration.txt +# +#--------------------------------------------------------------------- + +global + maxconn 20000 + log 127.0.0.1 local0 + user haproxy + chroot /usr/share/haproxy + pidfile /run/haproxy.pid + daemon + +frontend main + bind :5000 + mode http + log global + option httplog + option dontlognull + option http_proxy + option forwardfor except 127.0.0.0/8 + maxconn 8000 + timeout client 30s + + acl url_static path_beg -i /static /images /javascript /stylesheets + acl url_static path_end -i .jpg .gif .png .css .js + + use_backend static if url_static + default_backend app + +backend static + mode http + balance roundrobin + timeout connect 5s + timeout server 5s + server static 127.0.0.1:4331 check + +backend app + mode http + balance roundrobin + timeout connect 5s + timeout server 30s + timeout queue 30s + server app1 127.0.0.1:5001 check + server app2 127.0.0.1:5002 check + server app3 127.0.0.1:5003 check + server app4 127.0.0.1:5004 check Copied: haproxy/repos/community-testing-i686/haproxy.install (from rev 196519, haproxy/trunk/haproxy.install) =================================================================== --- community-testing-i686/haproxy.install (rev 0) +++ community-testing-i686/haproxy.install 2016-11-22 11:24:02 UTC (rev 196520) @@ -0,0 +1,12 @@ +post_install() { + getent passwd haproxy >/dev/null || useradd -r -M -d / \ + -s /usr/bin/nologin haproxy >/dev/null + + printf '==> %s\n' "The example config chroots HAProxy, meaning that logging to journald won't work." + printf ' %s\n' "Either disable chrooting, use rsyslog, or bind /run/systemd/journal/dev-log into the chroot." +} + +post_upgrade() { + printf '==> %s\n' "The example config chroots HAProxy, meaning that logging to journald won't work." + printf ' %s\n' "Either disable chrooting, use rsyslog, or bind /run/systemd/journal/dev-log into the chroot." +} Copied: haproxy/repos/community-testing-x86_64/PKGBUILD (from rev 196519, haproxy/trunk/PKGBUILD) =================================================================== --- community-testing-x86_64/PKGBUILD (rev 0) +++ community-testing-x86_64/PKGBUILD 2016-11-22 11:24:02 UTC (rev 196520) @@ -0,0 +1,70 @@ +# $Id$ +# Maintainer: Johannes Löthberg <johan...@kyriasis.com> +# Contributor: Bartłomiej Piotrowski <bpiotrow...@archlinux.org> + +pkgname=haproxy +pkgver=1.6.10 +pkgrel=1 + +pkgdesc='Reliable, high performance TCP/HTTP load balancer' +url='http://haproxy.org/' +arch=('i686' 'x86_64') +license=('GPL') + +depends=('openssl' 'pcre' 'zlib' 'lua') + +backup=('etc/haproxy/haproxy.cfg') + +install=haproxy.install + +source=(http://haproxy.org/download/${pkgver%.*}/src/haproxy-$pkgver.tar.gz + haproxy.cfg) + +md5sums=('6d47461c008b823a0088d19ec30dbe4e' + '02241a8ca257d12f7eb131e2d7da3f3b') + +prepare() { + cd haproxy-$pkgver + sed -i 's:/usr/sbin/haproxy:/usr/bin/haproxy:' src/haproxy-systemd-wrapper.c +} + +build() { + cd haproxy-$pkgver + + make CPU=generic TARGET=linux2628 \ + USE_GETADDRINFO=1 \ + USE_OPENSSL=1 \ + USE_PCRE=1 USE_PCRE_JIT=1 \ + USE_ZLIB=1 \ + USE_LUA=1 + + for contrib in halog iprange systemd; do + make -C contrib/$contrib SBINDIR=/usr/bin + done +} + +package() { + cd haproxy-$pkgver + make \ + EXTRA=haproxy-systemd-wrapper \ + PREFIX="$pkgdir"/usr \ + SBINDIR="$pkgdir"/usr/bin \ + DOCDIR="$pkgdir"/usr/share/$pkgname \ + install + + for contrib in halog iprange; do + install -Dm755 contrib/$contrib/$contrib "$pkgdir"/usr/bin/$contrib + done + + install -Dm644 ../haproxy.cfg "$pkgdir"/etc/haproxy/haproxy.cfg + install -Dm644 contrib/systemd/haproxy.service \ + "$pkgdir"/usr/lib/systemd/system/haproxy.service + + install -d "$pkgdir"/usr/share/haproxy/examples/errorfiles + install -m644 examples/*.cfg "$pkgdir"/usr/share/haproxy/examples/ + install -m644 examples/errorfiles/*.http \ + "$pkgdir"/usr/share/haproxy/examples/errorfiles/ + + install -Dm644 examples/haproxy.vim \ + "$pkgdir"/usr/share/vim/vimfiles/syntax/haproxy.vim +} Copied: haproxy/repos/community-testing-x86_64/haproxy.cfg (from rev 196519, haproxy/trunk/haproxy.cfg) =================================================================== --- community-testing-x86_64/haproxy.cfg (rev 0) +++ community-testing-x86_64/haproxy.cfg 2016-11-22 11:24:02 UTC (rev 196520) @@ -0,0 +1,49 @@ +#--------------------------------------------------------------------- +# Example configuration. See the full configuration manual online. +# +# http://www.haproxy.org/download/1.6/doc/configuration.txt +# +#--------------------------------------------------------------------- + +global + maxconn 20000 + log 127.0.0.1 local0 + user haproxy + chroot /usr/share/haproxy + pidfile /run/haproxy.pid + daemon + +frontend main + bind :5000 + mode http + log global + option httplog + option dontlognull + option http_proxy + option forwardfor except 127.0.0.0/8 + maxconn 8000 + timeout client 30s + + acl url_static path_beg -i /static /images /javascript /stylesheets + acl url_static path_end -i .jpg .gif .png .css .js + + use_backend static if url_static + default_backend app + +backend static + mode http + balance roundrobin + timeout connect 5s + timeout server 5s + server static 127.0.0.1:4331 check + +backend app + mode http + balance roundrobin + timeout connect 5s + timeout server 30s + timeout queue 30s + server app1 127.0.0.1:5001 check + server app2 127.0.0.1:5002 check + server app3 127.0.0.1:5003 check + server app4 127.0.0.1:5004 check Copied: haproxy/repos/community-testing-x86_64/haproxy.install (from rev 196519, haproxy/trunk/haproxy.install) =================================================================== --- community-testing-x86_64/haproxy.install (rev 0) +++ community-testing-x86_64/haproxy.install 2016-11-22 11:24:02 UTC (rev 196520) @@ -0,0 +1,12 @@ +post_install() { + getent passwd haproxy >/dev/null || useradd -r -M -d / \ + -s /usr/bin/nologin haproxy >/dev/null + + printf '==> %s\n' "The example config chroots HAProxy, meaning that logging to journald won't work." + printf ' %s\n' "Either disable chrooting, use rsyslog, or bind /run/systemd/journal/dev-log into the chroot." +} + +post_upgrade() { + printf '==> %s\n' "The example config chroots HAProxy, meaning that logging to journald won't work." + printf ' %s\n' "Either disable chrooting, use rsyslog, or bind /run/systemd/journal/dev-log into the chroot." +}