Date: Wednesday, March 23, 2022 @ 16:50:46
  Author: hashworks
Revision: 1171548

archrelease: copy trunk to community-x86_64

Added:
  vault/repos/community-x86_64/PKGBUILD
    (from rev 1171547, vault/trunk/PKGBUILD)
  vault/repos/community-x86_64/vault.hcl
    (from rev 1171547, vault/trunk/vault.hcl)
  vault/repos/community-x86_64/vault.install
    (from rev 1171547, vault/trunk/vault.install)
  vault/repos/community-x86_64/vault.service
    (from rev 1171547, vault/trunk/vault.service)
  vault/repos/community-x86_64/vault.sysusers
    (from rev 1171547, vault/trunk/vault.sysusers)
  vault/repos/community-x86_64/vault.tmpfiles
    (from rev 1171547, vault/trunk/vault.tmpfiles)
Deleted:
  vault/repos/community-x86_64/PKGBUILD
  vault/repos/community-x86_64/vault.hcl
  vault/repos/community-x86_64/vault.install
  vault/repos/community-x86_64/vault.service
  vault/repos/community-x86_64/vault.sysusers
  vault/repos/community-x86_64/vault.tmpfiles

----------------+
 PKGBUILD       |  140 +++++++++++++++++++++++++++----------------------------
 vault.hcl      |   38 +++++++-------
 vault.install  |   18 +++----
 vault.service  |   44 ++++++++---------
 vault.sysusers |    2 
 vault.tmpfiles |    2 
 6 files changed, 122 insertions(+), 122 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD    2022-03-23 16:50:37 UTC (rev 1171547)
+++ PKGBUILD    2022-03-23 16:50:46 UTC (rev 1171548)
@@ -1,70 +0,0 @@
-# Maintainer : Christian Rebischke <chris.rebisc...@archlinux.org>
-# Contributor: Tim Meusel <t...@bastelfreak.de>
-# Contributor: Sebastian Rakel <sebast...@devunit.eu>
-# Contributor: Justin Kromlinger <hashwo...@archlinux.org>
-# Contributor: Andrew Tyler <assimi...@gmail.com>
-
-pkgname='vault'
-pkgdesc='A tool for managing secrets'
-pkgver=1.9.4
-pkgrel=2
-url="https://vaultproject.io/";
-license=('MPL')
-arch=('x86_64')
-makedepends=('go' 'git' 'yarn' 'bower' 'nodejs-lts-fermium' 'npm' 'zip' 'gox' 
'go-tools')
-depends=('glibc')
-install='vault.install'
-backup=('etc/vault.hcl')
-_vault_commit='fcbe948b2542a13ee8036ad07dd8ebf8554f56cb'
-source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}";
-  'vault.service'
-  'vault.sysusers'
-  'vault.tmpfiles'
-  'vault.hcl')
-sha512sums=('SKIP'
-            
'6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2'
-            
'92616ccf83fa5ca9f8b0d022cf8ceb1f3549e12b66bf21d9f77f3eb26bd75ec1dc36c155948ec987c642067b85fbfc30a9217d6c503d952a402aa5ef63e50928'
-            
'073f0f400cba78521cd2709ce86d88fbb14125117f9f3beca657f625d04eab8e00f7a01b5d9a1cfc03e9038844f5732bdbb1a85dd65a803d3f0b90f8bf87880e'
-            
'46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe')
-
-prepare() {
-  export GOPATH="${srcdir}"
-  mkdir -p src/github.com/hashicorp/ "$GOPATH/bin"
-  mv "${pkgname}" "src/github.com/hashicorp/${pkgname}"
-  export PACKAGE_ROOT="${GOPATH}/src/github.com/hashicorp/${pkgname}"
-  cd $PACKAGE_ROOT
-
-  sed -i 's/gofumpt/gofmt/g' Makefile
-}
-
-pkgver() {
-  cd $PACKAGE_ROOT
-  git describe --tags --match 'v*' | sed 's/^v//;s/\([^-]*-g\)/r\1/;s/-/./g'
-}
-
-build() {
-  cd $PACKAGE_ROOT
-  export CGO_CPPFLAGS="${CPPFLAGS}"
-  export CGO_CFLAGS="${CFLAGS}"
-  export CGO_CXXFLAGS="${CXXFLAGS}"
-  export CGO_LDFLAGS="${LDFLAGS}"
-  export GOFLAGS="-buildmode=pie -trimpath -mod=readonly -modcacherw"
-  export XC_OSARCH='linux/amd64'
-  grep "^[a-z].*plugin[:]" Makefile | cut -f1 -d: | while IFS= read -r plugin; 
do
-    make "$plugin"
-  done
-  make static-dist bin
-}
-
-package() {
-  cd ${PACKAGE_ROOT}
-  install -Dm755 bin/vault "${pkgdir}/usr/bin/vault"
-  install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
-  install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl"
-  install -Dm644 "${srcdir}/vault.service" 
"${pkgdir}/usr/lib/systemd/system/vault.service"
-  install -Dm644 "${srcdir}/vault.sysusers" 
"${pkgdir}/usr/lib/sysusers.d/vault.conf"
-  install -Dm644 "${srcdir}/vault.tmpfiles" 
"${pkgdir}/usr/lib/tmpfiles.d/vault.conf"
-  for file in README.md CHANGELOG.md CONTRIBUTING.md; do
-    install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}"
-  done
-}

Copied: vault/repos/community-x86_64/PKGBUILD (from rev 1171547, 
vault/trunk/PKGBUILD)
===================================================================
--- PKGBUILD                            (rev 0)
+++ PKGBUILD    2022-03-23 16:50:46 UTC (rev 1171548)
@@ -0,0 +1,70 @@
+# Maintainer : Christian Rebischke <chris.rebisc...@archlinux.org>
+# Contributor: Tim Meusel <t...@bastelfreak.de>
+# Contributor: Sebastian Rakel <sebast...@devunit.eu>
+# Contributor: Justin Kromlinger <hashwo...@archlinux.org>
+# Contributor: Andrew Tyler <assimi...@gmail.com>
+
+pkgname='vault'
+pkgdesc='A tool for managing secrets'
+pkgver=1.10.0
+pkgrel=1
+url="https://vaultproject.io/";
+license=('MPL')
+arch=('x86_64')
+makedepends=('go' 'git' 'yarn' 'bower' 'nodejs-lts-fermium' 'npm' 'zip' 'gox' 
'go-tools')
+depends=('glibc')
+install='vault.install'
+backup=('etc/vault.hcl')
+_vault_commit='7738ec5d0d6f5bf94a809ee0f6ff0142cfa525a6'
+source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}";
+  'vault.service'
+  'vault.sysusers'
+  'vault.tmpfiles'
+  'vault.hcl')
+sha512sums=('SKIP'
+            
'6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2'
+            
'92616ccf83fa5ca9f8b0d022cf8ceb1f3549e12b66bf21d9f77f3eb26bd75ec1dc36c155948ec987c642067b85fbfc30a9217d6c503d952a402aa5ef63e50928'
+            
'073f0f400cba78521cd2709ce86d88fbb14125117f9f3beca657f625d04eab8e00f7a01b5d9a1cfc03e9038844f5732bdbb1a85dd65a803d3f0b90f8bf87880e'
+            
'46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe')
+
+prepare() {
+  export GOPATH="${srcdir}"
+  mkdir -p src/github.com/hashicorp/ "$GOPATH/bin"
+  mv "${pkgname}" "src/github.com/hashicorp/${pkgname}"
+  export PACKAGE_ROOT="${GOPATH}/src/github.com/hashicorp/${pkgname}"
+  cd $PACKAGE_ROOT
+
+  sed -i 's/gofumpt/gofmt/g' Makefile
+}
+
+pkgver() {
+  cd $PACKAGE_ROOT
+  git describe --tags --match 'v*' | sed 's/^v//;s/\([^-]*-g\)/r\1/;s/-/./g'
+}
+
+build() {
+  cd $PACKAGE_ROOT
+  export CGO_CPPFLAGS="${CPPFLAGS}"
+  export CGO_CFLAGS="${CFLAGS}"
+  export CGO_CXXFLAGS="${CXXFLAGS}"
+  export CGO_LDFLAGS="${LDFLAGS}"
+  export GOFLAGS="-buildmode=pie -trimpath -mod=readonly -modcacherw"
+  export XC_OSARCH='linux/amd64'
+  grep "^[a-z].*plugin[:]" Makefile | cut -f1 -d: | while IFS= read -r plugin; 
do
+    make "$plugin"
+  done
+  make static-dist bin
+}
+
+package() {
+  cd ${PACKAGE_ROOT}
+  install -Dm755 bin/vault "${pkgdir}/usr/bin/vault"
+  install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+  install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl"
+  install -Dm644 "${srcdir}/vault.service" 
"${pkgdir}/usr/lib/systemd/system/vault.service"
+  install -Dm644 "${srcdir}/vault.sysusers" 
"${pkgdir}/usr/lib/sysusers.d/vault.conf"
+  install -Dm644 "${srcdir}/vault.tmpfiles" 
"${pkgdir}/usr/lib/tmpfiles.d/vault.conf"
+  for file in README.md CHANGELOG.md CONTRIBUTING.md; do
+    install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}"
+  done
+}

Deleted: vault.hcl
===================================================================
--- vault.hcl   2022-03-23 16:50:37 UTC (rev 1171547)
+++ vault.hcl   2022-03-23 16:50:46 UTC (rev 1171548)
@@ -1,19 +0,0 @@
-/*
- * Vault configuration. See: https://vaultproject.io/docs/config/
- */
-
-backend "file" {
-       path = "/var/lib/vault"
-}
-
-listener "tcp" {
-       /*
-        * By default Vault listens on localhost only.
-        * Make sure to enable TLS support otherwise.
-        *
-        * Note that VAULT_ADDR=http://127.0.0.1:8200 must
-        * be set in the environment in order for the client
-        * to work because it uses HTTPS by default.
-        */
-       tls_disable = 1
-}

Copied: vault/repos/community-x86_64/vault.hcl (from rev 1171547, 
vault/trunk/vault.hcl)
===================================================================
--- vault.hcl                           (rev 0)
+++ vault.hcl   2022-03-23 16:50:46 UTC (rev 1171548)
@@ -0,0 +1,19 @@
+/*
+ * Vault configuration. See: https://vaultproject.io/docs/config/
+ */
+
+backend "file" {
+       path = "/var/lib/vault"
+}
+
+listener "tcp" {
+       /*
+        * By default Vault listens on localhost only.
+        * Make sure to enable TLS support otherwise.
+        *
+        * Note that VAULT_ADDR=http://127.0.0.1:8200 must
+        * be set in the environment in order for the client
+        * to work because it uses HTTPS by default.
+        */
+       tls_disable = 1
+}

Deleted: vault.install
===================================================================
--- vault.install       2022-03-23 16:50:37 UTC (rev 1171547)
+++ vault.install       2022-03-23 16:50:46 UTC (rev 1171548)
@@ -1,9 +0,0 @@
-# vim: ft=sh ts=4 sw=4 et
-
-post_install () {
-    setcap cap_ipc_lock=+ep /usr/bin/vault
-}
-
-post_upgrade () {
-    setcap cap_ipc_lock=+ep /usr/bin/vault
-}

Copied: vault/repos/community-x86_64/vault.install (from rev 1171547, 
vault/trunk/vault.install)
===================================================================
--- vault.install                               (rev 0)
+++ vault.install       2022-03-23 16:50:46 UTC (rev 1171548)
@@ -0,0 +1,9 @@
+# vim: ft=sh ts=4 sw=4 et
+
+post_install () {
+    setcap cap_ipc_lock=+ep /usr/bin/vault
+}
+
+post_upgrade () {
+    setcap cap_ipc_lock=+ep /usr/bin/vault
+}

Deleted: vault.service
===================================================================
--- vault.service       2022-03-23 16:50:37 UTC (rev 1171547)
+++ vault.service       2022-03-23 16:50:46 UTC (rev 1171548)
@@ -1,22 +0,0 @@
-[Unit]
-Description=Vault server
-Requires=basic.target network.target
-After=basic.target network.target
-
-[Service]
-User=vault
-Group=vault
-PrivateTmp=yes
-ProtectSystem=full
-ProtectHome=read-only
-CapabilityBoundingSet=CAP_IPC_LOCK
-Environment=GOMAXPROCS=2
-ExecStart=/bin/vault server -config=/etc/vault.hcl
-KillSignal=SIGINT
-TimeoutStopSec=30s
-Restart=on-failure
-StartLimitInterval=60s
-StartLimitBurst=3
-
-[Install]
-WantedBy=multi-user.target

Copied: vault/repos/community-x86_64/vault.service (from rev 1171547, 
vault/trunk/vault.service)
===================================================================
--- vault.service                               (rev 0)
+++ vault.service       2022-03-23 16:50:46 UTC (rev 1171548)
@@ -0,0 +1,22 @@
+[Unit]
+Description=Vault server
+Requires=basic.target network.target
+After=basic.target network.target
+
+[Service]
+User=vault
+Group=vault
+PrivateTmp=yes
+ProtectSystem=full
+ProtectHome=read-only
+CapabilityBoundingSet=CAP_IPC_LOCK
+Environment=GOMAXPROCS=2
+ExecStart=/bin/vault server -config=/etc/vault.hcl
+KillSignal=SIGINT
+TimeoutStopSec=30s
+Restart=on-failure
+StartLimitInterval=60s
+StartLimitBurst=3
+
+[Install]
+WantedBy=multi-user.target

Deleted: vault.sysusers
===================================================================
--- vault.sysusers      2022-03-23 16:50:37 UTC (rev 1171547)
+++ vault.sysusers      2022-03-23 16:50:46 UTC (rev 1171548)
@@ -1 +0,0 @@
-u vault - "Vault daemon" /var/lib/vault

Copied: vault/repos/community-x86_64/vault.sysusers (from rev 1171547, 
vault/trunk/vault.sysusers)
===================================================================
--- vault.sysusers                              (rev 0)
+++ vault.sysusers      2022-03-23 16:50:46 UTC (rev 1171548)
@@ -0,0 +1 @@
+u vault - "Vault daemon" /var/lib/vault

Deleted: vault.tmpfiles
===================================================================
--- vault.tmpfiles      2022-03-23 16:50:37 UTC (rev 1171547)
+++ vault.tmpfiles      2022-03-23 16:50:46 UTC (rev 1171548)
@@ -1 +0,0 @@
-d /var/lib/vault 0755 vault vault - -

Copied: vault/repos/community-x86_64/vault.tmpfiles (from rev 1171547, 
vault/trunk/vault.tmpfiles)
===================================================================
--- vault.tmpfiles                              (rev 0)
+++ vault.tmpfiles      2022-03-23 16:50:46 UTC (rev 1171548)
@@ -0,0 +1 @@
+d /var/lib/vault 0755 vault vault - -

Reply via email to