Date: Monday, January 31, 2022 @ 23:29:47 Author: grawlinson Revision: 1121512
archrelease: copy trunk to community-x86_64 Added: vaultwarden/repos/community-x86_64/PKGBUILD (from rev 1121511, vaultwarden/trunk/PKGBUILD) vaultwarden/repos/community-x86_64/vaultwarden.install (from rev 1121511, vaultwarden/trunk/vaultwarden.install) vaultwarden/repos/community-x86_64/vaultwarden.service (from rev 1121511, vaultwarden/trunk/vaultwarden.service) vaultwarden/repos/community-x86_64/vaultwarden.sysusers.conf (from rev 1121511, vaultwarden/trunk/vaultwarden.sysusers.conf) vaultwarden/repos/community-x86_64/vaultwarden.tmpfiles (from rev 1121511, vaultwarden/trunk/vaultwarden.tmpfiles) Deleted: vaultwarden/repos/community-x86_64/PKGBUILD vaultwarden/repos/community-x86_64/vaultwarden.install vaultwarden/repos/community-x86_64/vaultwarden.service vaultwarden/repos/community-x86_64/vaultwarden.sysusers.conf vaultwarden/repos/community-x86_64/vaultwarden.tmpfiles ---------------------------+ PKGBUILD | 140 ++++++++++++++++++++++---------------------- vaultwarden.install | 64 ++++++++++---------- vaultwarden.service | 108 ++++++++++++++++----------------- vaultwarden.sysusers.conf | 2 vaultwarden.tmpfiles | 6 - 5 files changed, 160 insertions(+), 160 deletions(-) Deleted: PKGBUILD =================================================================== --- PKGBUILD 2022-01-31 23:28:36 UTC (rev 1121511) +++ PKGBUILD 2022-01-31 23:29:47 UTC (rev 1121512) @@ -1,70 +0,0 @@ -# Maintainer: Daniel M. Capella <poly...@archlinux.org> -# Maintainer: George Rawlinson <grawlin...@archlinux.org> -# Contributor: Markus Richter <mqus at disroot dot org> -# Contributor: Timothée Ravier <t...@siosm.fr - -pkgname=vaultwarden -pkgver=1.23.1 -pkgrel=2 -pkgdesc='Unofficial Bitwarden compatible server written in Rust' -arch=('x86_64') -url=https://github.com/dani-garcia/vaultwarden -license=('GPL3') -depends=('mariadb-libs' 'openssl' 'postgresql-libs' 'sqlite') -makedepends=('rustup') -optdepends=('vaultwarden-web: for the web app') -provides=('bitwarden_rs') -replaces=('bitwarden_rs') -backup=('etc/vaultwarden.env') -options=('!lto') -install=$pkgname.install -source=("$url/archive/$pkgver/$pkgname-$pkgver.tar.gz" - "$pkgname.service" - "$pkgname.sysusers.conf" - "$pkgname.tmpfiles") -b2sums=('398abeb7c84380a49c2b6e734a88d23d0fdbb23dcd2cd7c1ff0b86475ff0785baf65dc82a14f21e101c117429aa778c450b65757c6442908f37a03b0e609d984' - 'ff8e896f820b88f079d3d4f4c2eb394362569c921f53693e25d3badaf9fdca841e4d7665862e09d22421f544802f3a64014696fd92d7f0b923faf41f8d99e472' - '6580cf4031f262638abf11e529e8dfc489197afd6cd616c6a7810741e03c004706a5f9358f825aac6644c0ab6b251627ff988ed68f8264120b3575a655972390' - '9cdcd6c997c884eb3c1ad0c9b8cd91e68ec6762a27f9b80a7eb6c0cb1ffa4e500a654da6f17e9f985cc67add154efe737761f74e4e5f72892fc0e9d457314973') - -prepare() { - cd $pkgname-$pkgver - - # change various defaults - sed -i "s,# DATA_FOLDER=data,DATA_FOLDER=/var/lib/$pkgname, - s,web-vault/,/usr/share/webapps/$pkgname-web, - s,# WEB_VAULT_ENABLED=true,WEB_VAULT_ENABLED=false, - s,/path/to/log,/var/log/$pkgname.log, - /^# ROCKET_TLS/a ROCKET_LIMITS={json=10485760}" .env.template - - # download dependencies - cargo fetch --locked --target "$CARCH-unknown-linux-gnu" -} - -build() { - cd $pkgname-$pkgver - rustup set profile minimal - BWRS_VERSION="$pkgver" cargo build --release --frozen --features sqlite,mysql,postgresql -} - -check() { - cd $pkgname-$pkgver - cargo test --frozen --features sqlite,mysql,postgresql -} - -package() { - # systemd integration - install -Dm644 -t "$pkgdir"/usr/lib/systemd/system $pkgname.service - install -Dm644 $pkgname.sysusers.conf "$pkgdir"/usr/lib/sysusers.d/$pkgname.conf - install -Dm644 $pkgname.tmpfiles "$pkgdir"/usr/lib/tmpfiles.d/$pkgname.conf - - cd $pkgname-$pkgver - - # configuration - install -Dm644 .env.template "$pkgdir"/etc/$pkgname.env - - # binary - install -Dt "$pkgdir"/usr/bin target/release/$pkgname -} - -# vim:set ts=2 sw=2 et: Copied: vaultwarden/repos/community-x86_64/PKGBUILD (from rev 1121511, vaultwarden/trunk/PKGBUILD) =================================================================== --- PKGBUILD (rev 0) +++ PKGBUILD 2022-01-31 23:29:47 UTC (rev 1121512) @@ -0,0 +1,70 @@ +# Maintainer: Daniel M. Capella <poly...@archlinux.org> +# Maintainer: George Rawlinson <grawlin...@archlinux.org> +# Contributor: Markus Richter <mqus at disroot dot org> +# Contributor: Timothée Ravier <t...@siosm.fr + +pkgname=vaultwarden +pkgver=1.24.0 +pkgrel=1 +pkgdesc='Unofficial Bitwarden compatible server written in Rust' +arch=('x86_64') +url=https://github.com/dani-garcia/vaultwarden +license=('GPL3') +depends=('mariadb-libs' 'openssl' 'postgresql-libs' 'sqlite') +makedepends=('rustup') +optdepends=('vaultwarden-web: for the web app') +provides=('bitwarden_rs') +replaces=('bitwarden_rs') +backup=('etc/vaultwarden.env') +options=('!lto') +install=$pkgname.install +source=("$url/archive/$pkgver/$pkgname-$pkgver.tar.gz" + "$pkgname.service" + "$pkgname.sysusers.conf" + "$pkgname.tmpfiles") +b2sums=('0ef04c950167e4fab268a14f694c9bd1e7b76585cbac34e6c8e6e2bcf45264b23d3fe07d594eadb8a240d7af638d4e9ed2dcbcae6ad8360ed122fa59b66ebcf8' + 'ff8e896f820b88f079d3d4f4c2eb394362569c921f53693e25d3badaf9fdca841e4d7665862e09d22421f544802f3a64014696fd92d7f0b923faf41f8d99e472' + '6580cf4031f262638abf11e529e8dfc489197afd6cd616c6a7810741e03c004706a5f9358f825aac6644c0ab6b251627ff988ed68f8264120b3575a655972390' + '9cdcd6c997c884eb3c1ad0c9b8cd91e68ec6762a27f9b80a7eb6c0cb1ffa4e500a654da6f17e9f985cc67add154efe737761f74e4e5f72892fc0e9d457314973') + +prepare() { + cd $pkgname-$pkgver + + # change various defaults + sed -i "s,# DATA_FOLDER=data,DATA_FOLDER=/var/lib/$pkgname, + s,web-vault/,/usr/share/webapps/$pkgname-web, + s,# WEB_VAULT_ENABLED=true,WEB_VAULT_ENABLED=false, + s,/path/to/log,/var/log/$pkgname.log, + /^# ROCKET_TLS/a ROCKET_LIMITS={json=10485760}" .env.template + + # download dependencies + cargo fetch --locked --target "$CARCH-unknown-linux-gnu" +} + +build() { + cd $pkgname-$pkgver + rustup set profile minimal + BWRS_VERSION="$pkgver" cargo build --release --frozen --features sqlite,mysql,postgresql +} + +check() { + cd $pkgname-$pkgver + cargo test --frozen --features sqlite,mysql,postgresql +} + +package() { + # systemd integration + install -Dm644 -t "$pkgdir"/usr/lib/systemd/system $pkgname.service + install -Dm644 $pkgname.sysusers.conf "$pkgdir"/usr/lib/sysusers.d/$pkgname.conf + install -Dm644 $pkgname.tmpfiles "$pkgdir"/usr/lib/tmpfiles.d/$pkgname.conf + + cd $pkgname-$pkgver + + # configuration + install -Dm644 .env.template "$pkgdir"/etc/$pkgname.env + + # binary + install -Dt "$pkgdir"/usr/bin target/release/$pkgname +} + +# vim:set ts=2 sw=2 et: Deleted: vaultwarden.install =================================================================== --- vaultwarden.install 2022-01-31 23:28:36 UTC (rev 1121511) +++ vaultwarden.install 2022-01-31 23:29:47 UTC (rev 1121512) @@ -1,32 +0,0 @@ -post_install() { - cat << EOF -!NOTE! - bitwarden_rs is now vaultwarden: - https://github.com/dani-garcia/vaultwarden/discussions/1642 - - If upgrading from bitwarden_rs, do not to leave around files/directories - owned by the old bitwarden_rs user/group before removing the old bitwarden_rs - user/group. - -Configure the server via its environment variables in /etc/vaultwarden.env. - -If vaultwarden is run at ports >1024, you should apply these systemd unit -options via a drop-in file: -[Service] -CapabilityBoundingSet= -AmbientCapabilities= -PrivateUsers=yes - -If the service produces too much noise in your journal, you can redirect stdout -to /dev/null (vaultwarden will still also write to /var/log/vaultwarden.log if -configured to do so): -[Service] -StandardOutput=null - -Create or edit drop-in file: -# systemctl edit vaultwarden - -Start vaultwarden and enable its systemd service: -# systemctl enable --now vaultwarden -EOF -} Copied: vaultwarden/repos/community-x86_64/vaultwarden.install (from rev 1121511, vaultwarden/trunk/vaultwarden.install) =================================================================== --- vaultwarden.install (rev 0) +++ vaultwarden.install 2022-01-31 23:29:47 UTC (rev 1121512) @@ -0,0 +1,32 @@ +post_install() { + cat << EOF +!NOTE! + bitwarden_rs is now vaultwarden: + https://github.com/dani-garcia/vaultwarden/discussions/1642 + + If upgrading from bitwarden_rs, do not to leave around files/directories + owned by the old bitwarden_rs user/group before removing the old bitwarden_rs + user/group. + +Configure the server via its environment variables in /etc/vaultwarden.env. + +If vaultwarden is run at ports >1024, you should apply these systemd unit +options via a drop-in file: +[Service] +CapabilityBoundingSet= +AmbientCapabilities= +PrivateUsers=yes + +If the service produces too much noise in your journal, you can redirect stdout +to /dev/null (vaultwarden will still also write to /var/log/vaultwarden.log if +configured to do so): +[Service] +StandardOutput=null + +Create or edit drop-in file: +# systemctl edit vaultwarden + +Start vaultwarden and enable its systemd service: +# systemctl enable --now vaultwarden +EOF +} Deleted: vaultwarden.service =================================================================== --- vaultwarden.service 2022-01-31 23:28:36 UTC (rev 1121511) +++ vaultwarden.service 2022-01-31 23:29:47 UTC (rev 1121512) @@ -1,54 +0,0 @@ -[Unit] -Description=Vaultwarden Server -Documentation=https://github.com/dani-garcia/vaultwarden -After=network.target - -[Service] -ExecStart=/usr/bin/vaultwarden -WorkingDirectory=/var/lib/vaultwarden -User=vaultwarden -Group=vaultwarden - -# Allow vaultwarden to bind ports in the range of 0-1024 and restrict it to -# that capability -CapabilityBoundingSet=CAP_NET_BIND_SERVICE -AmbientCapabilities=CAP_NET_BIND_SERVICE - -# If vaultwarden is run at ports >1024, you should apply these options via a -# drop-in file -#CapabilityBoundingSet= -#AmbientCapabilities= -#PrivateUsers=yes - -NoNewPrivileges=yes - -LimitNOFILE=1048576 -UMask=0077 - -ProtectSystem=strict -ProtectHome=yes -ReadWritePaths=/var/lib/vaultwarden /var/log/vaultwarden.log -PrivateTmp=yes -PrivateDevices=yes -ProtectHostname=yes -ProtectClock=yes -ProtectKernelTunables=yes -ProtectKernelModules=yes -ProtectKernelLogs=yes -ProtectControlGroups=yes -RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 -RestrictNamespaces=yes -LockPersonality=yes -MemoryDenyWriteExecute=yes -RestrictRealtime=yes -RestrictSUIDSGID=yes -RemoveIPC=yes - -SystemCallFilter=@system-service -SystemCallFilter=~@privileged @resources -SystemCallArchitectures=native - -EnvironmentFile=/etc/vaultwarden.env - -[Install] -WantedBy=multi-user.target Copied: vaultwarden/repos/community-x86_64/vaultwarden.service (from rev 1121511, vaultwarden/trunk/vaultwarden.service) =================================================================== --- vaultwarden.service (rev 0) +++ vaultwarden.service 2022-01-31 23:29:47 UTC (rev 1121512) @@ -0,0 +1,54 @@ +[Unit] +Description=Vaultwarden Server +Documentation=https://github.com/dani-garcia/vaultwarden +After=network.target + +[Service] +ExecStart=/usr/bin/vaultwarden +WorkingDirectory=/var/lib/vaultwarden +User=vaultwarden +Group=vaultwarden + +# Allow vaultwarden to bind ports in the range of 0-1024 and restrict it to +# that capability +CapabilityBoundingSet=CAP_NET_BIND_SERVICE +AmbientCapabilities=CAP_NET_BIND_SERVICE + +# If vaultwarden is run at ports >1024, you should apply these options via a +# drop-in file +#CapabilityBoundingSet= +#AmbientCapabilities= +#PrivateUsers=yes + +NoNewPrivileges=yes + +LimitNOFILE=1048576 +UMask=0077 + +ProtectSystem=strict +ProtectHome=yes +ReadWritePaths=/var/lib/vaultwarden /var/log/vaultwarden.log +PrivateTmp=yes +PrivateDevices=yes +ProtectHostname=yes +ProtectClock=yes +ProtectKernelTunables=yes +ProtectKernelModules=yes +ProtectKernelLogs=yes +ProtectControlGroups=yes +RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 +RestrictNamespaces=yes +LockPersonality=yes +MemoryDenyWriteExecute=yes +RestrictRealtime=yes +RestrictSUIDSGID=yes +RemoveIPC=yes + +SystemCallFilter=@system-service +SystemCallFilter=~@privileged @resources +SystemCallArchitectures=native + +EnvironmentFile=/etc/vaultwarden.env + +[Install] +WantedBy=multi-user.target Deleted: vaultwarden.sysusers.conf =================================================================== --- vaultwarden.sysusers.conf 2022-01-31 23:28:36 UTC (rev 1121511) +++ vaultwarden.sysusers.conf 2022-01-31 23:29:47 UTC (rev 1121512) @@ -1 +0,0 @@ -u vaultwarden - "vaultwarden user" Copied: vaultwarden/repos/community-x86_64/vaultwarden.sysusers.conf (from rev 1121511, vaultwarden/trunk/vaultwarden.sysusers.conf) =================================================================== --- vaultwarden.sysusers.conf (rev 0) +++ vaultwarden.sysusers.conf 2022-01-31 23:29:47 UTC (rev 1121512) @@ -0,0 +1 @@ +u vaultwarden - "vaultwarden user" Deleted: vaultwarden.tmpfiles =================================================================== --- vaultwarden.tmpfiles 2022-01-31 23:28:36 UTC (rev 1121511) +++ vaultwarden.tmpfiles 2022-01-31 23:29:47 UTC (rev 1121512) @@ -1,3 +0,0 @@ -d /var/lib/vaultwarden 0750 vaultwarden vaultwarden -h /var/lib/vaultwarden - - - - +C -f /var/log/vaultwarden.log 0640 vaultwarden vaultwarden Copied: vaultwarden/repos/community-x86_64/vaultwarden.tmpfiles (from rev 1121511, vaultwarden/trunk/vaultwarden.tmpfiles) =================================================================== --- vaultwarden.tmpfiles (rev 0) +++ vaultwarden.tmpfiles 2022-01-31 23:29:47 UTC (rev 1121512) @@ -0,0 +1,3 @@ +d /var/lib/vaultwarden 0750 vaultwarden vaultwarden +h /var/lib/vaultwarden - - - - +C +f /var/log/vaultwarden.log 0640 vaultwarden vaultwarden