Date: Tuesday, April 27, 2021 @ 11:52:12 Author: polyzen Revision: 924763
archrelease: copy trunk to community-x86_64 Added: bitwarden_rs/repos/community-x86_64/PKGBUILD (from rev 924762, bitwarden_rs/trunk/PKGBUILD) bitwarden_rs/repos/community-x86_64/bitwarden_rs.install (from rev 924762, bitwarden_rs/trunk/bitwarden_rs.install) bitwarden_rs/repos/community-x86_64/bitwarden_rs.service (from rev 924762, bitwarden_rs/trunk/bitwarden_rs.service) bitwarden_rs/repos/community-x86_64/bitwarden_rs.sysusers.conf (from rev 924762, bitwarden_rs/trunk/bitwarden_rs.sysusers.conf) bitwarden_rs/repos/community-x86_64/bitwarden_rs.tmpfiles (from rev 924762, bitwarden_rs/trunk/bitwarden_rs.tmpfiles) Deleted: bitwarden_rs/repos/community-x86_64/PKGBUILD bitwarden_rs/repos/community-x86_64/bitwarden_rs.install bitwarden_rs/repos/community-x86_64/bitwarden_rs.service bitwarden_rs/repos/community-x86_64/bitwarden_rs.sysusers.conf bitwarden_rs/repos/community-x86_64/bitwarden_rs.tmpfiles ----------------------------+ PKGBUILD | 110 +++++++++++++++++++++---------------------- bitwarden_rs.install | 48 +++++++++--------- bitwarden_rs.service | 110 +++++++++++++++++++++---------------------- bitwarden_rs.sysusers.conf | 2 bitwarden_rs.tmpfiles | 6 +- 5 files changed, 138 insertions(+), 138 deletions(-) Deleted: PKGBUILD =================================================================== --- PKGBUILD 2021-04-27 11:50:21 UTC (rev 924762) +++ PKGBUILD 2021-04-27 11:52:12 UTC (rev 924763) @@ -1,55 +0,0 @@ -# Maintainer: Daniel M. Capella <poly...@archlinux.org> -# Contributor: Markus Richter <mqus at disroot dot org> -# Contributor: Timothée Ravier <t...@siosm.fr - -pkgname=bitwarden_rs -pkgver=1.20.0 -pkgrel=1 -pkgdesc='Unofficial Bitwarden compatible server written in Rust' -arch=('x86_64') -url=https://github.com/dani-garcia/bitwarden_rs -license=('GPL3') -depends=('mariadb-libs' 'openssl' 'postgresql-libs' 'sqlite') -makedepends=('rustup') -optdepends=('bitwarden_rs-web: for the web app') -backup=('etc/bitwarden_rs.env') -install=$pkgname.install -source=("$url/archive/$pkgver/$pkgname-$pkgver.tar.gz" - "$pkgname.service" - "$pkgname.sysusers.conf" - "$pkgname.tmpfiles") -b2sums=('22dccda4e0227df6726c74180dd3f6bf7cff0ef456c371d79f9f58c76398c7d61df72b0dad1bdd02d7411eb2ec2a91e7c7ae655c43786da6498c8485ca1a7d6b' - '22bc90b8c49b6a26610ec840f04481fe3c7fcffc82434df3ee6adba4555787ba44c7b58dfcb181a28d4a6c943db6e7f7f439b67995c5aa06c23035002765de09' - 'c44af94e19724ba23a11cec3ccc46ff9db307a058564d539dc533308e75ff43cfb5e42515bd49fdeb86e02cbc7575dc87c3b132d9d28d49f7e8fedab598c06f5' - 'a2a6a128a405b4dbd06eb84c25b1971a5dcab4b918d6fec74da317b76485eda6b4b16ad972a85d9c8267b0a848787761fae75cd6bbb81d970a8cbc8683a2fc42') - -prepare() { - cd $pkgname-$pkgver - sed -i 's,# DATA_FOLDER=data,DATA_FOLDER=/var/lib/bitwarden_rs, - s,web-vault/,/usr/share/bitwarden_rs-web, - s,# WEB_VAULT_ENABLED=true,WEB_VAULT_ENABLED=false, - s,/path/to/log,/var/log/bitwarden_rs.log, - /^# ROCKET_TLS/a ROCKET_LIMITS={json=10485760}' .env.template -} - -build() { - cd $pkgname-$pkgver - rustup set profile minimal - BWRS_VERSION="$pkgver" cargo build --release --locked --features sqlite,mysql,postgresql -} - -check() { - cd $pkgname-$pkgver - cargo test --release --locked --features sqlite,mysql,postgresql -} - -package() { - cd $pkgname-$pkgver - install -Dm644 .env.template "$pkgdir"/etc/bitwarden_rs.env - install -Dt "$pkgdir"/usr/bin target/release/bitwarden_rs - install -Dm644 -t "$pkgdir"/usr/lib/systemd/system ../bitwarden_rs.service - install -Dm644 ../$pkgname.sysusers.conf "$pkgdir"/usr/lib/sysusers.d/bitwarden_rs.conf - install -Dm644 ../bitwarden_rs.tmpfiles "$pkgdir"/usr/lib/tmpfiles.d/bitwarden_rs.conf -} - -# vim:set ts=2 sw=2 et: Copied: bitwarden_rs/repos/community-x86_64/PKGBUILD (from rev 924762, bitwarden_rs/trunk/PKGBUILD) =================================================================== --- PKGBUILD (rev 0) +++ PKGBUILD 2021-04-27 11:52:12 UTC (rev 924763) @@ -0,0 +1,55 @@ +# Maintainer: Daniel M. Capella <poly...@archlinux.org> +# Contributor: Markus Richter <mqus at disroot dot org> +# Contributor: Timothée Ravier <t...@siosm.fr + +pkgname=bitwarden_rs +pkgver=1.20.0 +pkgrel=2 +pkgdesc='Unofficial Bitwarden compatible server written in Rust' +arch=('x86_64') +url=https://github.com/dani-garcia/bitwarden_rs +license=('GPL3') +depends=('mariadb-libs' 'openssl' 'postgresql-libs' 'sqlite') +makedepends=('rustup') +optdepends=('bitwarden_rs-web: for the web app') +backup=('etc/bitwarden_rs.env') +install=$pkgname.install +source=("$url/archive/$pkgver/$pkgname-$pkgver.tar.gz" + "$pkgname.service" + "$pkgname.sysusers.conf" + "$pkgname.tmpfiles") +b2sums=('22dccda4e0227df6726c74180dd3f6bf7cff0ef456c371d79f9f58c76398c7d61df72b0dad1bdd02d7411eb2ec2a91e7c7ae655c43786da6498c8485ca1a7d6b' + '22bc90b8c49b6a26610ec840f04481fe3c7fcffc82434df3ee6adba4555787ba44c7b58dfcb181a28d4a6c943db6e7f7f439b67995c5aa06c23035002765de09' + 'c44af94e19724ba23a11cec3ccc46ff9db307a058564d539dc533308e75ff43cfb5e42515bd49fdeb86e02cbc7575dc87c3b132d9d28d49f7e8fedab598c06f5' + 'a2a6a128a405b4dbd06eb84c25b1971a5dcab4b918d6fec74da317b76485eda6b4b16ad972a85d9c8267b0a848787761fae75cd6bbb81d970a8cbc8683a2fc42') + +prepare() { + cd $pkgname-$pkgver + sed -i 's,# DATA_FOLDER=data,DATA_FOLDER=/var/lib/bitwarden_rs, + s,web-vault/,/usr/share/webapps/bitwarden_rs-web, + s,# WEB_VAULT_ENABLED=true,WEB_VAULT_ENABLED=false, + s,/path/to/log,/var/log/bitwarden_rs.log, + /^# ROCKET_TLS/a ROCKET_LIMITS={json=10485760}' .env.template +} + +build() { + cd $pkgname-$pkgver + rustup set profile minimal + BWRS_VERSION="$pkgver" cargo build --release --locked --features sqlite,mysql,postgresql +} + +check() { + cd $pkgname-$pkgver + cargo test --release --locked --features sqlite,mysql,postgresql +} + +package() { + cd $pkgname-$pkgver + install -Dm644 .env.template "$pkgdir"/etc/bitwarden_rs.env + install -Dt "$pkgdir"/usr/bin target/release/bitwarden_rs + install -Dm644 -t "$pkgdir"/usr/lib/systemd/system ../bitwarden_rs.service + install -Dm644 ../$pkgname.sysusers.conf "$pkgdir"/usr/lib/sysusers.d/bitwarden_rs.conf + install -Dm644 ../bitwarden_rs.tmpfiles "$pkgdir"/usr/lib/tmpfiles.d/bitwarden_rs.conf +} + +# vim:set ts=2 sw=2 et: Deleted: bitwarden_rs.install =================================================================== --- bitwarden_rs.install 2021-04-27 11:50:21 UTC (rev 924762) +++ bitwarden_rs.install 2021-04-27 11:52:12 UTC (rev 924763) @@ -1,24 +0,0 @@ -post_install() { - cat << EOF -Configure the server via its environment variables in /etc/bitwarden_rs.env. - -If bitwarden_rs is run at ports >1024, you should apply these systemd unit -options via a drop-in file: -[Service] -CapabilityBoundingSet= -AmbientCapabilities= -PrivateUsers=yes - -If the service produces too much noise in your journal, you can redirect stdout -to /dev/null (bitwarden_rs will still also write to /var/log/bitwarden_rs.log -if configured to do so): -[Service] -StandardOutput=null - -Create or edit drop-in file: -# systemctl edit bitwarden_rs - -Start bitwarden_rs and enable its systemd service: -# systemctl enable --now bitwarden_rs -EOF -} Copied: bitwarden_rs/repos/community-x86_64/bitwarden_rs.install (from rev 924762, bitwarden_rs/trunk/bitwarden_rs.install) =================================================================== --- bitwarden_rs.install (rev 0) +++ bitwarden_rs.install 2021-04-27 11:52:12 UTC (rev 924763) @@ -0,0 +1,24 @@ +post_install() { + cat << EOF +Configure the server via its environment variables in /etc/bitwarden_rs.env. + +If bitwarden_rs is run at ports >1024, you should apply these systemd unit +options via a drop-in file: +[Service] +CapabilityBoundingSet= +AmbientCapabilities= +PrivateUsers=yes + +If the service produces too much noise in your journal, you can redirect stdout +to /dev/null (bitwarden_rs will still also write to /var/log/bitwarden_rs.log +if configured to do so): +[Service] +StandardOutput=null + +Create or edit drop-in file: +# systemctl edit bitwarden_rs + +Start bitwarden_rs and enable its systemd service: +# systemctl enable --now bitwarden_rs +EOF +} Deleted: bitwarden_rs.service =================================================================== --- bitwarden_rs.service 2021-04-27 11:50:21 UTC (rev 924762) +++ bitwarden_rs.service 2021-04-27 11:52:12 UTC (rev 924763) @@ -1,55 +0,0 @@ -[Unit] -Description=Bitwarden Server (Rust Edition) -Documentation=https://github.com/dani-garcia/bitwarden_rs -After=network.target - -[Service] -ExecStart=/usr/bin/bitwarden_rs -WorkingDirectory=/var/lib/bitwarden_rs -User=bitwarden_rs -Group=bitwarden_rs - -# Allow bitwarden_rs to bind ports in the range of 0-1024 and restrict it to -# that capability -CapabilityBoundingSet=CAP_NET_BIND_SERVICE -AmbientCapabilities=CAP_NET_BIND_SERVICE - -# If bitwarden_rs is run at ports >1024, you should apply these options via a -# drop-in file -#CapabilityBoundingSet= -#AmbientCapabilities= -#PrivateUsers=yes - -NoNewPrivileges=yes - -LimitNOFILE=1048576 -LimitNPROC=64 -UMask=0077 - -ProtectSystem=strict -ProtectHome=yes -ReadWritePaths=/var/lib/bitwarden_rs /var/log/bitwarden_rs.log -PrivateTmp=yes -PrivateDevices=yes -ProtectHostname=yes -ProtectClock=yes -ProtectKernelTunables=yes -ProtectKernelModules=yes -ProtectKernelLogs=yes -ProtectControlGroups=yes -RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 -RestrictNamespaces=yes -LockPersonality=yes -MemoryDenyWriteExecute=yes -RestrictRealtime=yes -RestrictSUIDSGID=yes -RemoveIPC=yes - -SystemCallFilter=@system-service -SystemCallFilter=~@privileged @resources -SystemCallArchitectures=native - -EnvironmentFile=/etc/bitwarden_rs.env - -[Install] -WantedBy=multi-user.target Copied: bitwarden_rs/repos/community-x86_64/bitwarden_rs.service (from rev 924762, bitwarden_rs/trunk/bitwarden_rs.service) =================================================================== --- bitwarden_rs.service (rev 0) +++ bitwarden_rs.service 2021-04-27 11:52:12 UTC (rev 924763) @@ -0,0 +1,55 @@ +[Unit] +Description=Bitwarden Server (Rust Edition) +Documentation=https://github.com/dani-garcia/bitwarden_rs +After=network.target + +[Service] +ExecStart=/usr/bin/bitwarden_rs +WorkingDirectory=/var/lib/bitwarden_rs +User=bitwarden_rs +Group=bitwarden_rs + +# Allow bitwarden_rs to bind ports in the range of 0-1024 and restrict it to +# that capability +CapabilityBoundingSet=CAP_NET_BIND_SERVICE +AmbientCapabilities=CAP_NET_BIND_SERVICE + +# If bitwarden_rs is run at ports >1024, you should apply these options via a +# drop-in file +#CapabilityBoundingSet= +#AmbientCapabilities= +#PrivateUsers=yes + +NoNewPrivileges=yes + +LimitNOFILE=1048576 +LimitNPROC=64 +UMask=0077 + +ProtectSystem=strict +ProtectHome=yes +ReadWritePaths=/var/lib/bitwarden_rs /var/log/bitwarden_rs.log +PrivateTmp=yes +PrivateDevices=yes +ProtectHostname=yes +ProtectClock=yes +ProtectKernelTunables=yes +ProtectKernelModules=yes +ProtectKernelLogs=yes +ProtectControlGroups=yes +RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6 +RestrictNamespaces=yes +LockPersonality=yes +MemoryDenyWriteExecute=yes +RestrictRealtime=yes +RestrictSUIDSGID=yes +RemoveIPC=yes + +SystemCallFilter=@system-service +SystemCallFilter=~@privileged @resources +SystemCallArchitectures=native + +EnvironmentFile=/etc/bitwarden_rs.env + +[Install] +WantedBy=multi-user.target Deleted: bitwarden_rs.sysusers.conf =================================================================== --- bitwarden_rs.sysusers.conf 2021-04-27 11:50:21 UTC (rev 924762) +++ bitwarden_rs.sysusers.conf 2021-04-27 11:52:12 UTC (rev 924763) @@ -1 +0,0 @@ -u bitwarden_rs - "bitwarden_rs user" Copied: bitwarden_rs/repos/community-x86_64/bitwarden_rs.sysusers.conf (from rev 924762, bitwarden_rs/trunk/bitwarden_rs.sysusers.conf) =================================================================== --- bitwarden_rs.sysusers.conf (rev 0) +++ bitwarden_rs.sysusers.conf 2021-04-27 11:52:12 UTC (rev 924763) @@ -0,0 +1 @@ +u bitwarden_rs - "bitwarden_rs user" Deleted: bitwarden_rs.tmpfiles =================================================================== --- bitwarden_rs.tmpfiles 2021-04-27 11:50:21 UTC (rev 924762) +++ bitwarden_rs.tmpfiles 2021-04-27 11:52:12 UTC (rev 924763) @@ -1,3 +0,0 @@ -d /var/lib/bitwarden_rs 0750 bitwarden_rs bitwarden_rs -h /var/lib/bitwarden_rs - - - - +C -f /var/log/bitwarden_rs.log 0640 bitwarden_rs bitwarden_rs Copied: bitwarden_rs/repos/community-x86_64/bitwarden_rs.tmpfiles (from rev 924762, bitwarden_rs/trunk/bitwarden_rs.tmpfiles) =================================================================== --- bitwarden_rs.tmpfiles (rev 0) +++ bitwarden_rs.tmpfiles 2021-04-27 11:52:12 UTC (rev 924763) @@ -0,0 +1,3 @@ +d /var/lib/bitwarden_rs 0750 bitwarden_rs bitwarden_rs +h /var/lib/bitwarden_rs - - - - +C +f /var/log/bitwarden_rs.log 0640 bitwarden_rs bitwarden_rs