Date: Wednesday, February 14, 2018 @ 09:04:19 Author: shibumi Revision: 294192
archrelease: copy trunk to community-x86_64 Added: vault/repos/community-x86_64/PKGBUILD (from rev 294191, vault/trunk/PKGBUILD) vault/repos/community-x86_64/vault.hcl (from rev 294191, vault/trunk/vault.hcl) vault/repos/community-x86_64/vault.install (from rev 294191, vault/trunk/vault.install) vault/repos/community-x86_64/vault.service (from rev 294191, vault/trunk/vault.service) vault/repos/community-x86_64/vault.sysusers (from rev 294191, vault/trunk/vault.sysusers) vault/repos/community-x86_64/vault.tmpfiles (from rev 294191, vault/trunk/vault.tmpfiles) Deleted: vault/repos/community-x86_64/PKGBUILD vault/repos/community-x86_64/vault.hcl vault/repos/community-x86_64/vault.install vault/repos/community-x86_64/vault.service vault/repos/community-x86_64/vault.sysusers vault/repos/community-x86_64/vault.tmpfiles ----------------+ PKGBUILD | 98 +++++++++++++++++++++++++++---------------------------- vault.hcl | 38 ++++++++++----------- vault.install | 10 ++--- vault.service | 44 ++++++++++++------------ vault.sysusers | 2 - vault.tmpfiles | 2 - 6 files changed, 97 insertions(+), 97 deletions(-) Deleted: PKGBUILD =================================================================== --- PKGBUILD 2018-02-14 09:04:10 UTC (rev 294191) +++ PKGBUILD 2018-02-14 09:04:19 UTC (rev 294192) @@ -1,49 +0,0 @@ -# Maintainer : Christian Rebischke <chris.rebisc...@archlinux.org> - -pkgname='vault' -pkgdesc='A tool for managing secrets' -pkgver='0.9.1' -pkgrel='1' -url='https://vaultproject.io/' -license=('MPL') -arch=('x86_64') -makedepends=('go-pie' 'git') -depends=('glibc') -install='vault.install' -backup=('etc/vault.hcl') -_vault_commit='87b6919dea55da61d7cd444b2442cabb8ede8ab1' -source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}" - 'vault.service' - 'vault.sysusers' - 'vault.tmpfiles' - 'vault.hcl') -sha512sums=('SKIP' - '6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2' - '92616ccf83fa5ca9f8b0d022cf8ceb1f3549e12b66bf21d9f77f3eb26bd75ec1dc36c155948ec987c642067b85fbfc30a9217d6c503d952a402aa5ef63e50928' - '073f0f400cba78521cd2709ce86d88fbb14125117f9f3beca657f625d04eab8e00f7a01b5d9a1cfc03e9038844f5732bdbb1a85dd65a803d3f0b90f8bf87880e' - '46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe') - -prepare () { - export GOPATH="${srcdir}" - export PATH="$PATH:$GOPATH/bin" - mkdir -p src/github.com/hashicorp/ - mv ${pkgname} src/github.com/hashicorp/ -} - -build () { - cd src/github.com/hashicorp/${pkgname} - go build -o vault-binary -} - -package () { - cd src/github.com/hashicorp/${pkgname} - install -Dm755 vault-binary "${pkgdir}/usr/bin/vault" - install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" - install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl" - install -Dm644 "${srcdir}/vault.service" "${pkgdir}/usr/lib/systemd/system/vault.service" - install -Dm644 "${srcdir}/vault.sysusers" "${pkgdir}/usr/lib/sysusers.d/vault.conf" - install -Dm644 "${srcdir}/vault.tmpfiles" "${pkgdir}/usr/lib/tmpfiles.d/vault.conf" - for file in README.md CHANGELOG.md ; do - install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}" - done -} Copied: vault/repos/community-x86_64/PKGBUILD (from rev 294191, vault/trunk/PKGBUILD) =================================================================== --- PKGBUILD (rev 0) +++ PKGBUILD 2018-02-14 09:04:19 UTC (rev 294192) @@ -0,0 +1,49 @@ +# Maintainer : Christian Rebischke <chris.rebisc...@archlinux.org> + +pkgname='vault' +pkgdesc='A tool for managing secrets' +pkgver='0.9.3' +pkgrel='1' +url='https://vaultproject.io/' +license=('MPL') +arch=('x86_64') +makedepends=('go-pie' 'git') +depends=('glibc') +install='vault.install' +backup=('etc/vault.hcl') +_vault_commit='5acd6a21d5a69ab49d0f7c0bf540123a9b2c696d' +source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}" + 'vault.service' + 'vault.sysusers' + 'vault.tmpfiles' + 'vault.hcl') +sha512sums=('SKIP' + '6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2' + '92616ccf83fa5ca9f8b0d022cf8ceb1f3549e12b66bf21d9f77f3eb26bd75ec1dc36c155948ec987c642067b85fbfc30a9217d6c503d952a402aa5ef63e50928' + '073f0f400cba78521cd2709ce86d88fbb14125117f9f3beca657f625d04eab8e00f7a01b5d9a1cfc03e9038844f5732bdbb1a85dd65a803d3f0b90f8bf87880e' + '46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe') + +prepare () { + export GOPATH="${srcdir}" + export PATH="$PATH:$GOPATH/bin" + mkdir -p src/github.com/hashicorp/ + mv "${pkgname}" src/github.com/hashicorp/ +} + +build () { + cd src/github.com/hashicorp/"${pkgname}" + go build -o vault-binary +} + +package () { + cd src/github.com/hashicorp/"${pkgname}" + install -Dm755 vault-binary "${pkgdir}/usr/bin/vault" + install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" + install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl" + install -Dm644 "${srcdir}/vault.service" "${pkgdir}/usr/lib/systemd/system/vault.service" + install -Dm644 "${srcdir}/vault.sysusers" "${pkgdir}/usr/lib/sysusers.d/vault.conf" + install -Dm644 "${srcdir}/vault.tmpfiles" "${pkgdir}/usr/lib/tmpfiles.d/vault.conf" + for file in README.md CHANGELOG.md ; do + install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}" + done +} Deleted: vault.hcl =================================================================== --- vault.hcl 2018-02-14 09:04:10 UTC (rev 294191) +++ vault.hcl 2018-02-14 09:04:19 UTC (rev 294192) @@ -1,19 +0,0 @@ -/* - * Vault configuration. See: https://vaultproject.io/docs/config/ - */ - -backend "file" { - path = "/var/lib/vault" -} - -listener "tcp" { - /* - * By default Vault listens on localhost only. - * Make sure to enable TLS support otherwise. - * - * Note that VAULT_ADDR=http://127.0.0.1:8200 must - * be set in the environment in order for the client - * to work because it uses HTTPS by default. - */ - tls_disable = 1 -} Copied: vault/repos/community-x86_64/vault.hcl (from rev 294191, vault/trunk/vault.hcl) =================================================================== --- vault.hcl (rev 0) +++ vault.hcl 2018-02-14 09:04:19 UTC (rev 294192) @@ -0,0 +1,19 @@ +/* + * Vault configuration. See: https://vaultproject.io/docs/config/ + */ + +backend "file" { + path = "/var/lib/vault" +} + +listener "tcp" { + /* + * By default Vault listens on localhost only. + * Make sure to enable TLS support otherwise. + * + * Note that VAULT_ADDR=http://127.0.0.1:8200 must + * be set in the environment in order for the client + * to work because it uses HTTPS by default. + */ + tls_disable = 1 +} Deleted: vault.install =================================================================== --- vault.install 2018-02-14 09:04:10 UTC (rev 294191) +++ vault.install 2018-02-14 09:04:19 UTC (rev 294192) @@ -1,5 +0,0 @@ -# vim: ft=sh ts=4 sw=4 et - -post_install () { - setcap cap_ipc_lock=+ep /usr/bin/vault -} Copied: vault/repos/community-x86_64/vault.install (from rev 294191, vault/trunk/vault.install) =================================================================== --- vault.install (rev 0) +++ vault.install 2018-02-14 09:04:19 UTC (rev 294192) @@ -0,0 +1,5 @@ +# vim: ft=sh ts=4 sw=4 et + +post_install () { + setcap cap_ipc_lock=+ep /usr/bin/vault +} Deleted: vault.service =================================================================== --- vault.service 2018-02-14 09:04:10 UTC (rev 294191) +++ vault.service 2018-02-14 09:04:19 UTC (rev 294192) @@ -1,22 +0,0 @@ -[Unit] -Description=Vault server -Requires=basic.target network.target -After=basic.target network.target - -[Service] -User=vault -Group=vault -PrivateTmp=yes -ProtectSystem=full -ProtectHome=read-only -CapabilityBoundingSet=CAP_IPC_LOCK -Environment=GOMAXPROCS=2 -ExecStart=/bin/vault server -config=/etc/vault.hcl -KillSignal=SIGINT -TimeoutStopSec=30s -Restart=on-failure -StartLimitInterval=60s -StartLimitBurst=3 - -[Install] -WantedBy=multi-user.target Copied: vault/repos/community-x86_64/vault.service (from rev 294191, vault/trunk/vault.service) =================================================================== --- vault.service (rev 0) +++ vault.service 2018-02-14 09:04:19 UTC (rev 294192) @@ -0,0 +1,22 @@ +[Unit] +Description=Vault server +Requires=basic.target network.target +After=basic.target network.target + +[Service] +User=vault +Group=vault +PrivateTmp=yes +ProtectSystem=full +ProtectHome=read-only +CapabilityBoundingSet=CAP_IPC_LOCK +Environment=GOMAXPROCS=2 +ExecStart=/bin/vault server -config=/etc/vault.hcl +KillSignal=SIGINT +TimeoutStopSec=30s +Restart=on-failure +StartLimitInterval=60s +StartLimitBurst=3 + +[Install] +WantedBy=multi-user.target Deleted: vault.sysusers =================================================================== --- vault.sysusers 2018-02-14 09:04:10 UTC (rev 294191) +++ vault.sysusers 2018-02-14 09:04:19 UTC (rev 294192) @@ -1 +0,0 @@ -u vault - "Vault daemon" /var/lib/vault Copied: vault/repos/community-x86_64/vault.sysusers (from rev 294191, vault/trunk/vault.sysusers) =================================================================== --- vault.sysusers (rev 0) +++ vault.sysusers 2018-02-14 09:04:19 UTC (rev 294192) @@ -0,0 +1 @@ +u vault - "Vault daemon" /var/lib/vault Deleted: vault.tmpfiles =================================================================== --- vault.tmpfiles 2018-02-14 09:04:10 UTC (rev 294191) +++ vault.tmpfiles 2018-02-14 09:04:19 UTC (rev 294192) @@ -1 +0,0 @@ -d /var/lib/vault 0755 vault vault - - Copied: vault/repos/community-x86_64/vault.tmpfiles (from rev 294191, vault/trunk/vault.tmpfiles) =================================================================== --- vault.tmpfiles (rev 0) +++ vault.tmpfiles 2018-02-14 09:04:19 UTC (rev 294192) @@ -0,0 +1 @@ +d /var/lib/vault 0755 vault vault - -