Date: Wednesday, March 23, 2022 @ 16:50:46 Author: hashworks Revision: 1171548
archrelease: copy trunk to community-x86_64 Added: vault/repos/community-x86_64/PKGBUILD (from rev 1171547, vault/trunk/PKGBUILD) vault/repos/community-x86_64/vault.hcl (from rev 1171547, vault/trunk/vault.hcl) vault/repos/community-x86_64/vault.install (from rev 1171547, vault/trunk/vault.install) vault/repos/community-x86_64/vault.service (from rev 1171547, vault/trunk/vault.service) vault/repos/community-x86_64/vault.sysusers (from rev 1171547, vault/trunk/vault.sysusers) vault/repos/community-x86_64/vault.tmpfiles (from rev 1171547, vault/trunk/vault.tmpfiles) Deleted: vault/repos/community-x86_64/PKGBUILD vault/repos/community-x86_64/vault.hcl vault/repos/community-x86_64/vault.install vault/repos/community-x86_64/vault.service vault/repos/community-x86_64/vault.sysusers vault/repos/community-x86_64/vault.tmpfiles ----------------+ PKGBUILD | 140 +++++++++++++++++++++++++++---------------------------- vault.hcl | 38 +++++++------- vault.install | 18 +++---- vault.service | 44 ++++++++--------- vault.sysusers | 2 vault.tmpfiles | 2 6 files changed, 122 insertions(+), 122 deletions(-) Deleted: PKGBUILD =================================================================== --- PKGBUILD 2022-03-23 16:50:37 UTC (rev 1171547) +++ PKGBUILD 2022-03-23 16:50:46 UTC (rev 1171548) @@ -1,70 +0,0 @@ -# Maintainer : Christian Rebischke <chris.rebisc...@archlinux.org> -# Contributor: Tim Meusel <t...@bastelfreak.de> -# Contributor: Sebastian Rakel <sebast...@devunit.eu> -# Contributor: Justin Kromlinger <hashwo...@archlinux.org> -# Contributor: Andrew Tyler <assimi...@gmail.com> - -pkgname='vault' -pkgdesc='A tool for managing secrets' -pkgver=1.9.4 -pkgrel=2 -url="https://vaultproject.io/" -license=('MPL') -arch=('x86_64') -makedepends=('go' 'git' 'yarn' 'bower' 'nodejs-lts-fermium' 'npm' 'zip' 'gox' 'go-tools') -depends=('glibc') -install='vault.install' -backup=('etc/vault.hcl') -_vault_commit='fcbe948b2542a13ee8036ad07dd8ebf8554f56cb' -source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}" - 'vault.service' - 'vault.sysusers' - 'vault.tmpfiles' - 'vault.hcl') -sha512sums=('SKIP' - '6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2' - '92616ccf83fa5ca9f8b0d022cf8ceb1f3549e12b66bf21d9f77f3eb26bd75ec1dc36c155948ec987c642067b85fbfc30a9217d6c503d952a402aa5ef63e50928' - '073f0f400cba78521cd2709ce86d88fbb14125117f9f3beca657f625d04eab8e00f7a01b5d9a1cfc03e9038844f5732bdbb1a85dd65a803d3f0b90f8bf87880e' - '46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe') - -prepare() { - export GOPATH="${srcdir}" - mkdir -p src/github.com/hashicorp/ "$GOPATH/bin" - mv "${pkgname}" "src/github.com/hashicorp/${pkgname}" - export PACKAGE_ROOT="${GOPATH}/src/github.com/hashicorp/${pkgname}" - cd $PACKAGE_ROOT - - sed -i 's/gofumpt/gofmt/g' Makefile -} - -pkgver() { - cd $PACKAGE_ROOT - git describe --tags --match 'v*' | sed 's/^v//;s/\([^-]*-g\)/r\1/;s/-/./g' -} - -build() { - cd $PACKAGE_ROOT - export CGO_CPPFLAGS="${CPPFLAGS}" - export CGO_CFLAGS="${CFLAGS}" - export CGO_CXXFLAGS="${CXXFLAGS}" - export CGO_LDFLAGS="${LDFLAGS}" - export GOFLAGS="-buildmode=pie -trimpath -mod=readonly -modcacherw" - export XC_OSARCH='linux/amd64' - grep "^[a-z].*plugin[:]" Makefile | cut -f1 -d: | while IFS= read -r plugin; do - make "$plugin" - done - make static-dist bin -} - -package() { - cd ${PACKAGE_ROOT} - install -Dm755 bin/vault "${pkgdir}/usr/bin/vault" - install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" - install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl" - install -Dm644 "${srcdir}/vault.service" "${pkgdir}/usr/lib/systemd/system/vault.service" - install -Dm644 "${srcdir}/vault.sysusers" "${pkgdir}/usr/lib/sysusers.d/vault.conf" - install -Dm644 "${srcdir}/vault.tmpfiles" "${pkgdir}/usr/lib/tmpfiles.d/vault.conf" - for file in README.md CHANGELOG.md CONTRIBUTING.md; do - install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}" - done -} Copied: vault/repos/community-x86_64/PKGBUILD (from rev 1171547, vault/trunk/PKGBUILD) =================================================================== --- PKGBUILD (rev 0) +++ PKGBUILD 2022-03-23 16:50:46 UTC (rev 1171548) @@ -0,0 +1,70 @@ +# Maintainer : Christian Rebischke <chris.rebisc...@archlinux.org> +# Contributor: Tim Meusel <t...@bastelfreak.de> +# Contributor: Sebastian Rakel <sebast...@devunit.eu> +# Contributor: Justin Kromlinger <hashwo...@archlinux.org> +# Contributor: Andrew Tyler <assimi...@gmail.com> + +pkgname='vault' +pkgdesc='A tool for managing secrets' +pkgver=1.10.0 +pkgrel=1 +url="https://vaultproject.io/" +license=('MPL') +arch=('x86_64') +makedepends=('go' 'git' 'yarn' 'bower' 'nodejs-lts-fermium' 'npm' 'zip' 'gox' 'go-tools') +depends=('glibc') +install='vault.install' +backup=('etc/vault.hcl') +_vault_commit='7738ec5d0d6f5bf94a809ee0f6ff0142cfa525a6' +source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}" + 'vault.service' + 'vault.sysusers' + 'vault.tmpfiles' + 'vault.hcl') +sha512sums=('SKIP' + '6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2' + '92616ccf83fa5ca9f8b0d022cf8ceb1f3549e12b66bf21d9f77f3eb26bd75ec1dc36c155948ec987c642067b85fbfc30a9217d6c503d952a402aa5ef63e50928' + '073f0f400cba78521cd2709ce86d88fbb14125117f9f3beca657f625d04eab8e00f7a01b5d9a1cfc03e9038844f5732bdbb1a85dd65a803d3f0b90f8bf87880e' + '46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe') + +prepare() { + export GOPATH="${srcdir}" + mkdir -p src/github.com/hashicorp/ "$GOPATH/bin" + mv "${pkgname}" "src/github.com/hashicorp/${pkgname}" + export PACKAGE_ROOT="${GOPATH}/src/github.com/hashicorp/${pkgname}" + cd $PACKAGE_ROOT + + sed -i 's/gofumpt/gofmt/g' Makefile +} + +pkgver() { + cd $PACKAGE_ROOT + git describe --tags --match 'v*' | sed 's/^v//;s/\([^-]*-g\)/r\1/;s/-/./g' +} + +build() { + cd $PACKAGE_ROOT + export CGO_CPPFLAGS="${CPPFLAGS}" + export CGO_CFLAGS="${CFLAGS}" + export CGO_CXXFLAGS="${CXXFLAGS}" + export CGO_LDFLAGS="${LDFLAGS}" + export GOFLAGS="-buildmode=pie -trimpath -mod=readonly -modcacherw" + export XC_OSARCH='linux/amd64' + grep "^[a-z].*plugin[:]" Makefile | cut -f1 -d: | while IFS= read -r plugin; do + make "$plugin" + done + make static-dist bin +} + +package() { + cd ${PACKAGE_ROOT} + install -Dm755 bin/vault "${pkgdir}/usr/bin/vault" + install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" + install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl" + install -Dm644 "${srcdir}/vault.service" "${pkgdir}/usr/lib/systemd/system/vault.service" + install -Dm644 "${srcdir}/vault.sysusers" "${pkgdir}/usr/lib/sysusers.d/vault.conf" + install -Dm644 "${srcdir}/vault.tmpfiles" "${pkgdir}/usr/lib/tmpfiles.d/vault.conf" + for file in README.md CHANGELOG.md CONTRIBUTING.md; do + install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}" + done +} Deleted: vault.hcl =================================================================== --- vault.hcl 2022-03-23 16:50:37 UTC (rev 1171547) +++ vault.hcl 2022-03-23 16:50:46 UTC (rev 1171548) @@ -1,19 +0,0 @@ -/* - * Vault configuration. See: https://vaultproject.io/docs/config/ - */ - -backend "file" { - path = "/var/lib/vault" -} - -listener "tcp" { - /* - * By default Vault listens on localhost only. - * Make sure to enable TLS support otherwise. - * - * Note that VAULT_ADDR=http://127.0.0.1:8200 must - * be set in the environment in order for the client - * to work because it uses HTTPS by default. - */ - tls_disable = 1 -} Copied: vault/repos/community-x86_64/vault.hcl (from rev 1171547, vault/trunk/vault.hcl) =================================================================== --- vault.hcl (rev 0) +++ vault.hcl 2022-03-23 16:50:46 UTC (rev 1171548) @@ -0,0 +1,19 @@ +/* + * Vault configuration. See: https://vaultproject.io/docs/config/ + */ + +backend "file" { + path = "/var/lib/vault" +} + +listener "tcp" { + /* + * By default Vault listens on localhost only. + * Make sure to enable TLS support otherwise. + * + * Note that VAULT_ADDR=http://127.0.0.1:8200 must + * be set in the environment in order for the client + * to work because it uses HTTPS by default. + */ + tls_disable = 1 +} Deleted: vault.install =================================================================== --- vault.install 2022-03-23 16:50:37 UTC (rev 1171547) +++ vault.install 2022-03-23 16:50:46 UTC (rev 1171548) @@ -1,9 +0,0 @@ -# vim: ft=sh ts=4 sw=4 et - -post_install () { - setcap cap_ipc_lock=+ep /usr/bin/vault -} - -post_upgrade () { - setcap cap_ipc_lock=+ep /usr/bin/vault -} Copied: vault/repos/community-x86_64/vault.install (from rev 1171547, vault/trunk/vault.install) =================================================================== --- vault.install (rev 0) +++ vault.install 2022-03-23 16:50:46 UTC (rev 1171548) @@ -0,0 +1,9 @@ +# vim: ft=sh ts=4 sw=4 et + +post_install () { + setcap cap_ipc_lock=+ep /usr/bin/vault +} + +post_upgrade () { + setcap cap_ipc_lock=+ep /usr/bin/vault +} Deleted: vault.service =================================================================== --- vault.service 2022-03-23 16:50:37 UTC (rev 1171547) +++ vault.service 2022-03-23 16:50:46 UTC (rev 1171548) @@ -1,22 +0,0 @@ -[Unit] -Description=Vault server -Requires=basic.target network.target -After=basic.target network.target - -[Service] -User=vault -Group=vault -PrivateTmp=yes -ProtectSystem=full -ProtectHome=read-only -CapabilityBoundingSet=CAP_IPC_LOCK -Environment=GOMAXPROCS=2 -ExecStart=/bin/vault server -config=/etc/vault.hcl -KillSignal=SIGINT -TimeoutStopSec=30s -Restart=on-failure -StartLimitInterval=60s -StartLimitBurst=3 - -[Install] -WantedBy=multi-user.target Copied: vault/repos/community-x86_64/vault.service (from rev 1171547, vault/trunk/vault.service) =================================================================== --- vault.service (rev 0) +++ vault.service 2022-03-23 16:50:46 UTC (rev 1171548) @@ -0,0 +1,22 @@ +[Unit] +Description=Vault server +Requires=basic.target network.target +After=basic.target network.target + +[Service] +User=vault +Group=vault +PrivateTmp=yes +ProtectSystem=full +ProtectHome=read-only +CapabilityBoundingSet=CAP_IPC_LOCK +Environment=GOMAXPROCS=2 +ExecStart=/bin/vault server -config=/etc/vault.hcl +KillSignal=SIGINT +TimeoutStopSec=30s +Restart=on-failure +StartLimitInterval=60s +StartLimitBurst=3 + +[Install] +WantedBy=multi-user.target Deleted: vault.sysusers =================================================================== --- vault.sysusers 2022-03-23 16:50:37 UTC (rev 1171547) +++ vault.sysusers 2022-03-23 16:50:46 UTC (rev 1171548) @@ -1 +0,0 @@ -u vault - "Vault daemon" /var/lib/vault Copied: vault/repos/community-x86_64/vault.sysusers (from rev 1171547, vault/trunk/vault.sysusers) =================================================================== --- vault.sysusers (rev 0) +++ vault.sysusers 2022-03-23 16:50:46 UTC (rev 1171548) @@ -0,0 +1 @@ +u vault - "Vault daemon" /var/lib/vault Deleted: vault.tmpfiles =================================================================== --- vault.tmpfiles 2022-03-23 16:50:37 UTC (rev 1171547) +++ vault.tmpfiles 2022-03-23 16:50:46 UTC (rev 1171548) @@ -1 +0,0 @@ -d /var/lib/vault 0755 vault vault - - Copied: vault/repos/community-x86_64/vault.tmpfiles (from rev 1171547, vault/trunk/vault.tmpfiles) =================================================================== --- vault.tmpfiles (rev 0) +++ vault.tmpfiles 2022-03-23 16:50:46 UTC (rev 1171548) @@ -0,0 +1 @@ +d /var/lib/vault 0755 vault vault - -