[arch-commits] Commit in gnupg/repos (4 files)
Date: Sunday, May 24, 2020 @ 06:06:09 Author: allan Revision: 387477 archrelease: copy trunk to testing-x86_64 Added: gnupg/repos/testing-x86_64/ gnupg/repos/testing-x86_64/PKGBUILD (from rev 387476, gnupg/trunk/PKGBUILD) gnupg/repos/testing-x86_64/install (from rev 387476, gnupg/trunk/install) gnupg/repos/testing-x86_64/self-sigs-only.patch (from rev 387476, gnupg/trunk/self-sigs-only.patch) --+ PKGBUILD | 69 + install | 31 ++ self-sigs-only.patch | 56 +++ 3 files changed, 156 insertions(+) Copied: gnupg/repos/testing-x86_64/PKGBUILD (from rev 387476, gnupg/trunk/PKGBUILD) === --- testing-x86_64/PKGBUILD (rev 0) +++ testing-x86_64/PKGBUILD 2020-05-24 06:06:09 UTC (rev 387477) @@ -0,0 +1,69 @@ +# Maintainer: Gaetan Bisson +# Contributor: Tobias Powalowski +# Contributor: Andreas Radke +# Contributor: Judd Vinet + +pkgname=gnupg +pkgver=2.2.20 +pkgrel=2 +pkgdesc='Complete and free implementation of the OpenPGP standard' +url='https://www.gnupg.org/' +license=('GPL') +arch=('x86_64') +checkdepends=('openssh') +makedepends=('libldap' 'libusb-compat' 'pcsclite') +depends=('npth' 'libgpg-error' 'libgcrypt' 'libksba' 'libassuan' + 'pinentry' 'bzip2' 'readline' 'gnutls' 'sqlite') +optdepends=('libldap: gpg2keys_ldap' +'libusb-compat: scdaemon' +'pcsclite: scdaemon') +validpgpkeys=('D8692123C4065DEA5E0F3AB5249B39D24F25E3B6' + '46CC730865BB5C78EBABADCF04376F3EE0856959' + '031EC2536E580D8EA286A9F22071B08A33BD3F06' + '5B80C5754298F0CB55D8ED6ABCEF7E294B092E28') +source=("https://gnupg.org/ftp/gcrypt/${pkgname}/${pkgname}-${pkgver}.tar.bz2"{,.sig} +'self-sigs-only.patch') +sha256sums=('04a7c9d48b74c399168ee8270e548588ddbe52218c337703d7f06373d326ca30' +'SKIP' +'0130c43321c16f53ab2290833007212f8a26b1b73bd4edc2b2b1c9db2b2d0218') + +install=install + +prepare() { + cd "${srcdir}/${pkgname}-${pkgver}" + sed '/noinst_SCRIPTS = gpg-zip/c sbin_SCRIPTS += gpg-zip' -i tools/Makefile.in + patch -R -p1 -i ../self-sigs-only.patch + + # remove to ensure this is built for reproducibility + rm doc/gnupg.info* +} + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + ./configure \ + --prefix=/usr \ + --sysconfdir=/etc \ + --sbindir=/usr/bin \ + --libexecdir=/usr/lib/gnupg \ + --enable-maintainer-mode \ + --enable-symcryptrun \ + + make +} + +check() { + cd "${srcdir}/${pkgname}-${pkgver}" + make check +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install + ln -s gpg "${pkgdir}"/usr/bin/gpg2 + ln -s gpgv "${pkgdir}"/usr/bin/gpgv2 + + cd doc/examples/systemd-user + for i in *.*; do + install -Dm644 "$i" "${pkgdir}/usr/lib/systemd/user/$i" + done +} Copied: gnupg/repos/testing-x86_64/install (from rev 387476, gnupg/trunk/install) === --- testing-x86_64/install (rev 0) +++ testing-x86_64/install 2020-05-24 06:06:09 UTC (rev 387477) @@ -0,0 +1,31 @@ +_global_units() { + _units=(dirmngr.socket gpg-agent.socket gpg-agent-{browser,extra,ssh}.socket) + _dir=/etc/systemd/user/sockets.target.wants + + case $1 in + enable) + mkdir -p $_dir + for _u in "${_units[@]}"; do + ln -sf /usr/lib/systemd/user/$_u $_dir/$_u + done + ;; + disable) + for _u in "${_units[@]}"; do + rm -f $_dir/$_u + done + rmdir -p --ignore-fail-on-non-empty $_dir + ;; + esac +} + +post_install() { + # See FS#42798 and FS#47371 + dirmngr /dev/null + + # Let systemd supervise daemons by default + _global_units enable +} + +pre_remove() { + _global_units disable +} Copied: gnupg/repos/testing-x86_64/self-sigs-only.patch (from rev 387476, gnupg/trunk/self-sigs-only.patch) === --- testing-x86_64/self-sigs-only.patch (rev 0) +++ testing-x86_64/self-sigs-only.patch 2020-05-24 06:06:09 UTC (rev 387477) @@ -0,0 +1,56 @@ +From: Werner Koch +Date: Thu, 4 Jul 2019 13:45:39 + (+0200) +Subject: gpg: Add "self-sigs-only" and "import-clean" to the keyserver options. +X-Git-Url: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff_plain;h=23c978640812d123eaff
[arch-commits] Commit in gnupg/repos (4 files)
Date: Friday, March 20, 2020 @ 21:52:01 Author: bisson Revision: 378018 archrelease: copy trunk to testing-x86_64 Added: gnupg/repos/testing-x86_64/ gnupg/repos/testing-x86_64/PKGBUILD (from rev 378017, gnupg/trunk/PKGBUILD) gnupg/repos/testing-x86_64/install (from rev 378017, gnupg/trunk/install) gnupg/repos/testing-x86_64/self-sigs-only.patch (from rev 378017, gnupg/trunk/self-sigs-only.patch) --+ PKGBUILD | 66 + install | 31 +++ self-sigs-only.patch | 56 + 3 files changed, 153 insertions(+) Copied: gnupg/repos/testing-x86_64/PKGBUILD (from rev 378017, gnupg/trunk/PKGBUILD) === --- testing-x86_64/PKGBUILD (rev 0) +++ testing-x86_64/PKGBUILD 2020-03-20 21:52:01 UTC (rev 378018) @@ -0,0 +1,66 @@ +# Maintainer: Gaetan Bisson +# Contributor: Tobias Powalowski +# Contributor: Andreas Radke +# Contributor: Judd Vinet + +pkgname=gnupg +pkgver=2.2.20 +pkgrel=1 +pkgdesc='Complete and free implementation of the OpenPGP standard' +url='https://www.gnupg.org/' +license=('GPL') +arch=('x86_64') +checkdepends=('openssh') +makedepends=('libldap' 'libusb-compat' 'pcsclite') +depends=('npth' 'libgpg-error' 'libgcrypt' 'libksba' 'libassuan' + 'pinentry' 'bzip2' 'readline' 'gnutls' 'sqlite') +optdepends=('libldap: gpg2keys_ldap' +'libusb-compat: scdaemon' +'pcsclite: scdaemon') +validpgpkeys=('D8692123C4065DEA5E0F3AB5249B39D24F25E3B6' + '46CC730865BB5C78EBABADCF04376F3EE0856959' + '031EC2536E580D8EA286A9F22071B08A33BD3F06' + '5B80C5754298F0CB55D8ED6ABCEF7E294B092E28') +source=("https://gnupg.org/ftp/gcrypt/${pkgname}/${pkgname}-${pkgver}.tar.bz2"{,.sig} +'self-sigs-only.patch') +sha256sums=('04a7c9d48b74c399168ee8270e548588ddbe52218c337703d7f06373d326ca30' +'SKIP' +'0130c43321c16f53ab2290833007212f8a26b1b73bd4edc2b2b1c9db2b2d0218') + +install=install + +prepare() { + cd "${srcdir}/${pkgname}-${pkgver}" + sed '/noinst_SCRIPTS = gpg-zip/c sbin_SCRIPTS += gpg-zip' -i tools/Makefile.in + patch -R -p1 -i ../self-sigs-only.patch +} + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + ./configure \ + --prefix=/usr \ + --sysconfdir=/etc \ + --sbindir=/usr/bin \ + --libexecdir=/usr/lib/gnupg \ + --enable-maintainer-mode \ + --enable-symcryptrun \ + + make +} + +check() { + cd "${srcdir}/${pkgname}-${pkgver}" + make check +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install + ln -s gpg "${pkgdir}"/usr/bin/gpg2 + ln -s gpgv "${pkgdir}"/usr/bin/gpgv2 + + cd doc/examples/systemd-user + for i in *.*; do + install -Dm644 "$i" "${pkgdir}/usr/lib/systemd/user/$i" + done +} Copied: gnupg/repos/testing-x86_64/install (from rev 378017, gnupg/trunk/install) === --- testing-x86_64/install (rev 0) +++ testing-x86_64/install 2020-03-20 21:52:01 UTC (rev 378018) @@ -0,0 +1,31 @@ +_global_units() { + _units=(dirmngr.socket gpg-agent.socket gpg-agent-{browser,extra,ssh}.socket) + _dir=/etc/systemd/user/sockets.target.wants + + case $1 in + enable) + mkdir -p $_dir + for _u in "${_units[@]}"; do + ln -sf /usr/lib/systemd/user/$_u $_dir/$_u + done + ;; + disable) + for _u in "${_units[@]}"; do + rm -f $_dir/$_u + done + rmdir -p --ignore-fail-on-non-empty $_dir + ;; + esac +} + +post_install() { + # See FS#42798 and FS#47371 + dirmngr /dev/null + + # Let systemd supervise daemons by default + _global_units enable +} + +pre_remove() { + _global_units disable +} Copied: gnupg/repos/testing-x86_64/self-sigs-only.patch (from rev 378017, gnupg/trunk/self-sigs-only.patch) === --- testing-x86_64/self-sigs-only.patch (rev 0) +++ testing-x86_64/self-sigs-only.patch 2020-03-20 21:52:01 UTC (rev 378018) @@ -0,0 +1,56 @@ +From: Werner Koch +Date: Thu, 4 Jul 2019 13:45:39 + (+0200) +Subject: gpg: Add "self-sigs-only" and "import-clean" to the keyserver options. +X-Git-Url: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff_plain;h=23c978640812d123eaffd4108744bdfcf48f7c93 + +gpg: Add "self-sigs-only" and "import-clean" to the keyserve
[arch-commits] Commit in gnupg/repos (4 files)
Date: Sunday, December 8, 2019 @ 09:06:47 Author: bisson Revision: 370532 archrelease: copy trunk to testing-x86_64 Added: gnupg/repos/testing-x86_64/ gnupg/repos/testing-x86_64/PKGBUILD (from rev 370531, gnupg/trunk/PKGBUILD) gnupg/repos/testing-x86_64/install (from rev 370531, gnupg/trunk/install) gnupg/repos/testing-x86_64/self-sigs-only.patch (from rev 370531, gnupg/trunk/self-sigs-only.patch) --+ PKGBUILD | 66 + install | 31 +++ self-sigs-only.patch | 56 + 3 files changed, 153 insertions(+) Copied: gnupg/repos/testing-x86_64/PKGBUILD (from rev 370531, gnupg/trunk/PKGBUILD) === --- testing-x86_64/PKGBUILD (rev 0) +++ testing-x86_64/PKGBUILD 2019-12-08 09:06:47 UTC (rev 370532) @@ -0,0 +1,66 @@ +# Maintainer: Gaetan Bisson +# Contributor: Tobias Powalowski +# Contributor: Andreas Radke +# Contributor: Judd Vinet + +pkgname=gnupg +pkgver=2.2.19 +pkgrel=1 +pkgdesc='Complete and free implementation of the OpenPGP standard' +url='https://www.gnupg.org/' +license=('GPL') +arch=('x86_64') +checkdepends=('openssh') +makedepends=('libldap' 'libusb-compat' 'pcsclite') +depends=('npth' 'libgpg-error' 'libgcrypt' 'libksba' 'libassuan' + 'pinentry' 'bzip2' 'readline' 'gnutls' 'sqlite') +optdepends=('libldap: gpg2keys_ldap' +'libusb-compat: scdaemon' +'pcsclite: scdaemon') +validpgpkeys=('D8692123C4065DEA5E0F3AB5249B39D24F25E3B6' + '46CC730865BB5C78EBABADCF04376F3EE0856959' + '031EC2536E580D8EA286A9F22071B08A33BD3F06' + '5B80C5754298F0CB55D8ED6ABCEF7E294B092E28') +source=("https://gnupg.org/ftp/gcrypt/${pkgname}/${pkgname}-${pkgver}.tar.bz2"{,.sig} +'self-sigs-only.patch') +sha256sums=('242554c0e06f3a83c420b052f750b65ead711cc3fb5e7274fcdbb4e9dec0' +'SKIP' +'0130c43321c16f53ab2290833007212f8a26b1b73bd4edc2b2b1c9db2b2d0218') + +install=install + +prepare() { + cd "${srcdir}/${pkgname}-${pkgver}" + sed '/noinst_SCRIPTS = gpg-zip/c sbin_SCRIPTS += gpg-zip' -i tools/Makefile.in + patch -R -p1 -i ../self-sigs-only.patch +} + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + ./configure \ + --prefix=/usr \ + --sysconfdir=/etc \ + --sbindir=/usr/bin \ + --libexecdir=/usr/lib/gnupg \ + --enable-maintainer-mode \ + --enable-symcryptrun \ + + make +} + +check() { + cd "${srcdir}/${pkgname}-${pkgver}" + make check +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install + ln -s gpg "${pkgdir}"/usr/bin/gpg2 + ln -s gpgv "${pkgdir}"/usr/bin/gpgv2 + + cd doc/examples/systemd-user + for i in *.*; do + install -Dm644 "$i" "${pkgdir}/usr/lib/systemd/user/$i" + done +} Copied: gnupg/repos/testing-x86_64/install (from rev 370531, gnupg/trunk/install) === --- testing-x86_64/install (rev 0) +++ testing-x86_64/install 2019-12-08 09:06:47 UTC (rev 370532) @@ -0,0 +1,31 @@ +_global_units() { + _units=(dirmngr.socket gpg-agent.socket gpg-agent-{browser,extra,ssh}.socket) + _dir=/etc/systemd/user/sockets.target.wants + + case $1 in + enable) + mkdir -p $_dir + for _u in "${_units[@]}"; do + ln -sf /usr/lib/systemd/user/$_u $_dir/$_u + done + ;; + disable) + for _u in "${_units[@]}"; do + rm -f $_dir/$_u + done + rmdir -p --ignore-fail-on-non-empty $_dir + ;; + esac +} + +post_install() { + # See FS#42798 and FS#47371 + dirmngr /dev/null + + # Let systemd supervise daemons by default + _global_units enable +} + +pre_remove() { + _global_units disable +} Copied: gnupg/repos/testing-x86_64/self-sigs-only.patch (from rev 370531, gnupg/trunk/self-sigs-only.patch) === --- testing-x86_64/self-sigs-only.patch (rev 0) +++ testing-x86_64/self-sigs-only.patch 2019-12-08 09:06:47 UTC (rev 370532) @@ -0,0 +1,56 @@ +From: Werner Koch +Date: Thu, 4 Jul 2019 13:45:39 + (+0200) +Subject: gpg: Add "self-sigs-only" and "import-clean" to the keyserver options. +X-Git-Url: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff_plain;h=23c978640812d123eaffd4108744bdfcf48f7c93 + +gpg: Add "self-sigs-only" and "import-clean" to the keyser
[arch-commits] Commit in gnupg/repos (4 files)
Date: Monday, November 25, 2019 @ 22:40:22 Author: bisson Revision: 369778 archrelease: copy trunk to testing-x86_64 Added: gnupg/repos/testing-x86_64/ gnupg/repos/testing-x86_64/PKGBUILD (from rev 369777, gnupg/trunk/PKGBUILD) gnupg/repos/testing-x86_64/install (from rev 369777, gnupg/trunk/install) gnupg/repos/testing-x86_64/self-sigs-only.patch (from rev 369777, gnupg/trunk/self-sigs-only.patch) --+ PKGBUILD | 66 + install | 31 +++ self-sigs-only.patch | 56 + 3 files changed, 153 insertions(+) Copied: gnupg/repos/testing-x86_64/PKGBUILD (from rev 369777, gnupg/trunk/PKGBUILD) === --- testing-x86_64/PKGBUILD (rev 0) +++ testing-x86_64/PKGBUILD 2019-11-25 22:40:22 UTC (rev 369778) @@ -0,0 +1,66 @@ +# Maintainer: Gaetan Bisson +# Contributor: Tobias Powalowski +# Contributor: Andreas Radke +# Contributor: Judd Vinet + +pkgname=gnupg +pkgver=2.2.18 +pkgrel=1 +pkgdesc='Complete and free implementation of the OpenPGP standard' +url='https://www.gnupg.org/' +license=('GPL') +arch=('x86_64') +checkdepends=('openssh') +makedepends=('libldap' 'libusb-compat' 'pcsclite') +depends=('npth' 'libgpg-error' 'libgcrypt' 'libksba' 'libassuan' + 'pinentry' 'bzip2' 'readline' 'gnutls' 'sqlite') +optdepends=('libldap: gpg2keys_ldap' +'libusb-compat: scdaemon' +'pcsclite: scdaemon') +validpgpkeys=('D8692123C4065DEA5E0F3AB5249B39D24F25E3B6' + '46CC730865BB5C78EBABADCF04376F3EE0856959' + '031EC2536E580D8EA286A9F22071B08A33BD3F06' + '5B80C5754298F0CB55D8ED6ABCEF7E294B092E28') +source=("https://gnupg.org/ftp/gcrypt/${pkgname}/${pkgname}-${pkgver}.tar.bz2"{,.sig} +'self-sigs-only.patch') +sha256sums=('30d37ce2ca55b2b9b61480b2a175a3b22066ab41cd3f84688448919b566dec0a' +'SKIP' +'0130c43321c16f53ab2290833007212f8a26b1b73bd4edc2b2b1c9db2b2d0218') + +install=install + +prepare() { + cd "${srcdir}/${pkgname}-${pkgver}" + sed '/noinst_SCRIPTS = gpg-zip/c sbin_SCRIPTS += gpg-zip' -i tools/Makefile.in + patch -R -p1 -i ../self-sigs-only.patch +} + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + ./configure \ + --prefix=/usr \ + --sysconfdir=/etc \ + --sbindir=/usr/bin \ + --libexecdir=/usr/lib/gnupg \ + --enable-maintainer-mode \ + --enable-symcryptrun \ + + make +} + +check() { + cd "${srcdir}/${pkgname}-${pkgver}" + make check +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install + ln -s gpg "${pkgdir}"/usr/bin/gpg2 + ln -s gpgv "${pkgdir}"/usr/bin/gpgv2 + + cd doc/examples/systemd-user + for i in *.*; do + install -Dm644 "$i" "${pkgdir}/usr/lib/systemd/user/$i" + done +} Copied: gnupg/repos/testing-x86_64/install (from rev 369777, gnupg/trunk/install) === --- testing-x86_64/install (rev 0) +++ testing-x86_64/install 2019-11-25 22:40:22 UTC (rev 369778) @@ -0,0 +1,31 @@ +_global_units() { + _units=(dirmngr.socket gpg-agent.socket gpg-agent-{browser,extra,ssh}.socket) + _dir=/etc/systemd/user/sockets.target.wants + + case $1 in + enable) + mkdir -p $_dir + for _u in "${_units[@]}"; do + ln -sf /usr/lib/systemd/user/$_u $_dir/$_u + done + ;; + disable) + for _u in "${_units[@]}"; do + rm -f $_dir/$_u + done + rmdir -p --ignore-fail-on-non-empty $_dir + ;; + esac +} + +post_install() { + # See FS#42798 and FS#47371 + dirmngr /dev/null + + # Let systemd supervise daemons by default + _global_units enable +} + +pre_remove() { + _global_units disable +} Copied: gnupg/repos/testing-x86_64/self-sigs-only.patch (from rev 369777, gnupg/trunk/self-sigs-only.patch) === --- testing-x86_64/self-sigs-only.patch (rev 0) +++ testing-x86_64/self-sigs-only.patch 2019-11-25 22:40:22 UTC (rev 369778) @@ -0,0 +1,56 @@ +From: Werner Koch +Date: Thu, 4 Jul 2019 13:45:39 + (+0200) +Subject: gpg: Add "self-sigs-only" and "import-clean" to the keyserver options. +X-Git-Url: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff_plain;h=23c978640812d123eaffd4108744bdfcf48f7c93 + +gpg: Add "self-sigs-only" and "import-clean" to the keyse
[arch-commits] Commit in gnupg/repos (4 files)
Date: Wednesday, November 13, 2019 @ 17:16:58 Author: felixonmars Revision: 368317 archrelease: copy trunk to staging-x86_64 Added: gnupg/repos/staging-x86_64/ gnupg/repos/staging-x86_64/PKGBUILD (from rev 368316, gnupg/trunk/PKGBUILD) gnupg/repos/staging-x86_64/install (from rev 368316, gnupg/trunk/install) gnupg/repos/staging-x86_64/self-sigs-only.patch (from rev 368316, gnupg/trunk/self-sigs-only.patch) --+ PKGBUILD | 66 + install | 31 +++ self-sigs-only.patch | 56 + 3 files changed, 153 insertions(+) Copied: gnupg/repos/staging-x86_64/PKGBUILD (from rev 368316, gnupg/trunk/PKGBUILD) === --- staging-x86_64/PKGBUILD (rev 0) +++ staging-x86_64/PKGBUILD 2019-11-13 17:16:58 UTC (rev 368317) @@ -0,0 +1,66 @@ +# Maintainer: Gaetan Bisson +# Contributor: Tobias Powalowski +# Contributor: Andreas Radke +# Contributor: Judd Vinet + +pkgname=gnupg +pkgver=2.2.17 +pkgrel=3 +pkgdesc='Complete and free implementation of the OpenPGP standard' +url='https://www.gnupg.org/' +license=('GPL') +arch=('x86_64') +checkdepends=('openssh') +makedepends=('libldap' 'libusb-compat' 'pcsclite') +depends=('npth' 'libgpg-error' 'libgcrypt' 'libksba' 'libassuan' + 'pinentry' 'bzip2' 'readline' 'gnutls' 'sqlite') +optdepends=('libldap: gpg2keys_ldap' +'libusb-compat: scdaemon' +'pcsclite: scdaemon') +validpgpkeys=('D8692123C4065DEA5E0F3AB5249B39D24F25E3B6' + '46CC730865BB5C78EBABADCF04376F3EE0856959' + '031EC2536E580D8EA286A9F22071B08A33BD3F06' + '5B80C5754298F0CB55D8ED6ABCEF7E294B092E28') +source=("https://gnupg.org/ftp/gcrypt/${pkgname}/${pkgname}-${pkgver}.tar.bz2"{,.sig} +'self-sigs-only.patch') +sha256sums=('afa262868e39b651a2db4c071fba90415154243e83a830ca00516f9a807fd514' +'SKIP' +'0130c43321c16f53ab2290833007212f8a26b1b73bd4edc2b2b1c9db2b2d0218') + +install=install + +prepare() { + cd "${srcdir}/${pkgname}-${pkgver}" + sed '/noinst_SCRIPTS = gpg-zip/c sbin_SCRIPTS += gpg-zip' -i tools/Makefile.in + patch -R -p1 -i ../self-sigs-only.patch +} + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + ./configure \ + --prefix=/usr \ + --sysconfdir=/etc \ + --sbindir=/usr/bin \ + --libexecdir=/usr/lib/gnupg \ + --enable-maintainer-mode \ + --enable-symcryptrun \ + + make +} + +check() { + cd "${srcdir}/${pkgname}-${pkgver}" + make check +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install + ln -s gpg "${pkgdir}"/usr/bin/gpg2 + ln -s gpgv "${pkgdir}"/usr/bin/gpgv2 + + cd doc/examples/systemd-user + for i in *.*; do + install -Dm644 "$i" "${pkgdir}/usr/lib/systemd/user/$i" + done +} Copied: gnupg/repos/staging-x86_64/install (from rev 368316, gnupg/trunk/install) === --- staging-x86_64/install (rev 0) +++ staging-x86_64/install 2019-11-13 17:16:58 UTC (rev 368317) @@ -0,0 +1,31 @@ +_global_units() { + _units=(dirmngr.socket gpg-agent.socket gpg-agent-{browser,extra,ssh}.socket) + _dir=/etc/systemd/user/sockets.target.wants + + case $1 in + enable) + mkdir -p $_dir + for _u in "${_units[@]}"; do + ln -sf /usr/lib/systemd/user/$_u $_dir/$_u + done + ;; + disable) + for _u in "${_units[@]}"; do + rm -f $_dir/$_u + done + rmdir -p --ignore-fail-on-non-empty $_dir + ;; + esac +} + +post_install() { + # See FS#42798 and FS#47371 + dirmngr /dev/null + + # Let systemd supervise daemons by default + _global_units enable +} + +pre_remove() { + _global_units disable +} Copied: gnupg/repos/staging-x86_64/self-sigs-only.patch (from rev 368316, gnupg/trunk/self-sigs-only.patch) === --- staging-x86_64/self-sigs-only.patch (rev 0) +++ staging-x86_64/self-sigs-only.patch 2019-11-13 17:16:58 UTC (rev 368317) @@ -0,0 +1,56 @@ +From: Werner Koch +Date: Thu, 4 Jul 2019 13:45:39 + (+0200) +Subject: gpg: Add "self-sigs-only" and "import-clean" to the keyserver options. +X-Git-Url: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff_plain;h=23c978640812d123eaffd4108744bdfcf48f7c93 + +gpg: Add "self-sigs-only" and "import-clean" to t
[arch-commits] Commit in gnupg/repos (4 files)
Date: Thursday, April 5, 2018 @ 20:34:56 Author: bisson Revision: 320987 archrelease: copy trunk to testing-x86_64 Added: gnupg/repos/testing-x86_64/ gnupg/repos/testing-x86_64/PKGBUILD (from rev 320986, gnupg/trunk/PKGBUILD) gnupg/repos/testing-x86_64/install (from rev 320986, gnupg/trunk/install) gnupg/repos/testing-x86_64/req_usage.patch (from rev 320986, gnupg/trunk/req_usage.patch) -+ PKGBUILD| 73 ++ install | 41 ++ req_usage.patch | 12 3 files changed, 126 insertions(+) Copied: gnupg/repos/testing-x86_64/PKGBUILD (from rev 320986, gnupg/trunk/PKGBUILD) === --- testing-x86_64/PKGBUILD (rev 0) +++ testing-x86_64/PKGBUILD 2018-04-05 20:34:56 UTC (rev 320987) @@ -0,0 +1,73 @@ +# $Id$ +# Maintainer: Gaetan Bisson +# Contributor: Tobias Powalowski +# Contributor: Andreas Radke +# Contributor: Judd Vinet + +pkgname=gnupg +pkgver=2.2.5 +pkgrel=2 +pkgdesc='Complete and free implementation of the OpenPGP standard' +url='http://www.gnupg.org/' +license=('GPL') +arch=('x86_64') +optdepends=('libldap: gpg2keys_ldap' +'libusb-compat: scdaemon' +'pcsclite: scdaemon') +makedepends=('libldap' 'libusb-compat' 'pcsclite') +checkdepends=('openssh') +depends=('npth' 'libgpg-error' 'libgcrypt' 'libksba' 'libassuan' + 'pinentry' 'bzip2' 'readline' 'gnutls' 'sqlite') +validpgpkeys=('D8692123C4065DEA5E0F3AB5249B39D24F25E3B6' + '46CC730865BB5C78EBABADCF04376F3EE0856959' + '031EC2536E580D8EA286A9F22071B08A33BD3F06' + 'D238EA65D64C67ED4C3073F28A861B1C7EFD60D9') +source=("https://gnupg.org/ftp/gcrypt/${pkgname}/${pkgname}-${pkgver}.tar.bz2"{,.sig} +'req_usage.patch') +sha256sums=('3fa189a32d4fb62147874eb1389047c267d9ba088f57ab521cb0df46f08aef57' +'SKIP' +'f8bef4891c1b9f81f305753dac7780ad4cfd56ec853502ba1d9d6400c69a518e') + +install=install + +conflicts=('dirmngr' 'gnupg2') +provides=('dirmngr' "gnupg2=${pkgver}") +replaces=('dirmngr' 'gnupg2') + +prepare() { + cd "${srcdir}/${pkgname}-${pkgver}" + sed '/noinst_SCRIPTS = gpg-zip/c sbin_SCRIPTS += gpg-zip' -i tools/Makefile.in + + # See: https://dev.gnupg.org/rGa17d2d1f690ebe5d005b4589a5fe378b6487c657 + patch -p1 -i ../req_usage.patch +} + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + ./configure \ + --prefix=/usr \ + --sysconfdir=/etc \ + --sbindir=/usr/bin \ + --libexecdir=/usr/lib/gnupg \ + --enable-maintainer-mode \ + --enable-symcryptrun \ + + make +} + +check() { + cd "${srcdir}/${pkgname}-${pkgver}" + make check +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install + ln -s gpg "${pkgdir}"/usr/bin/gpg2 + ln -s gpgv "${pkgdir}"/usr/bin/gpgv2 + + cd doc/examples/systemd-user + for i in *.*; do + install -Dm644 "$i" "${pkgdir}/usr/lib/systemd/user/$i" + done +} Copied: gnupg/repos/testing-x86_64/install (from rev 320986, gnupg/trunk/install) === --- testing-x86_64/install (rev 0) +++ testing-x86_64/install 2018-04-05 20:34:56 UTC (rev 320987) @@ -0,0 +1,41 @@ +_global_units() { + _units=(dirmngr.socket gpg-agent.socket gpg-agent-{browser,extra,ssh}.socket) + _dir=/etc/systemd/user/sockets.target.wants + + case $1 in + enable) + mkdir -p $_dir + for _u in "${_units[@]}"; do + ln -sf /usr/lib/systemd/user/$_u $_dir/$_u + done + ;; + disable) + for _u in "${_units[@]}"; do + rm -f $_dir/$_u + done + rmdir -p --ignore-fail-on-non-empty $_dir + ;; + esac +} + +post_install() { + # See FS#42798 and FS#47371 + dirmngr /dev/null + + # Let systemd supervise daemons by default + _global_units enable +} + +post_upgrade() { + if (( $(vercmp $2 2.1.13-1) < 0 )); then + echo "==> Please kill running gpg-agent and dirmngr processes before using this release." + fi + + if (( $(vercmp $2 2.1.21-3) < 0 )); then + _global_units enable + fi +} + +pre_remove() { + _global_units disable +} Copied: gnupg/repos/testing-x86_64/req_usage.patch (from rev 320986, gnupg/trunk/req_usage.patch) === --- testing-x86_64/req_usage.patch (rev 0) +++ testing-x86_64/re
[arch-commits] Commit in gnupg/repos (4 files)
Date: Monday, January 16, 2012 @ 17:52:44 Author: dreisner Revision: 146739 db-move: moved gnupg from [extra] to [core] (x86_64) Added: gnupg/repos/core-x86_64/ gnupg/repos/core-x86_64/PKGBUILD (from rev 146735, gnupg/repos/extra-x86_64/PKGBUILD) gnupg/repos/core-x86_64/gnupg.install (from rev 146735, gnupg/repos/extra-x86_64/gnupg.install) Deleted: gnupg/repos/extra-x86_64/ ---+ PKGBUILD | 36 gnupg.install | 21 + 2 files changed, 57 insertions(+) Copied: gnupg/repos/core-x86_64/PKGBUILD (from rev 146735, gnupg/repos/extra-x86_64/PKGBUILD) === --- core-x86_64/PKGBUILD(rev 0) +++ core-x86_64/PKGBUILD2012-01-16 22:52:44 UTC (rev 146739) @@ -0,0 +1,36 @@ +# $Id$ +# Maintainer: Andreas Radke +# Committer: Judd Vinet +pkgname=gnupg +pkgver=1.4.11 +pkgrel=3 +pkgdesc="GNU Privacy Guard - a PGP replacement tool" +arch=('i686' 'x86_64') +license=('GPL3') +depends=('zlib' 'bzip2' 'libldap>=2.4.18' 'libusb-compat' 'curl>=7.16.2' 'readline>=6.0.00') +source=(ftp://ftp.franken.de/pub/crypt/mirror/ftp.gnupg.org/gcrypt/gnupg/$pkgname-$pkgver.tar.bz2) +install=gnupg.install +url="http://www.gnupg.org/"; +md5sums=('411744e1ef8ce90b87938c4203f001f1') + +build() { + cd ${srcdir}/${pkgname}-${pkgver} + ./configure --prefix=/usr \ + --libexecdir=/usr/lib \ + --enable-noexecstack + make + #ln -s ${pkgname}-${pkgver}/scripts .. # seems obsolete now +} + +check() { + cd "$srcdir/$pkgname-$pkgver" + make -k check #All 27 tests passed +} + +package () { + cd ${srcdir}/${pkgname}-${pkgver} + make DESTDIR=${pkgdir} install + + # fix fileconflict with gnupg2 pkg + rm ${pkgdir}/usr/share/man/man1/gpg-zip.1 +} Copied: gnupg/repos/core-x86_64/gnupg.install (from rev 146735, gnupg/repos/extra-x86_64/gnupg.install) === --- core-x86_64/gnupg.install (rev 0) +++ core-x86_64/gnupg.install 2012-01-16 22:52:44 UTC (rev 146739) @@ -0,0 +1,21 @@ +info_dir=/usr/share/info +info_files=(gnupg1.info) + +post_install() { + [ -x usr/bin/install-info ] || return 0 + for f in ${info_files[@]}; do +usr/bin/install-info ${info_dir}/$f.gz ${info_dir}/dir 2> /dev/null + done +} + +post_upgrade() { + post_install $1 +} + +pre_remove() { + [ -x usr/bin/install-info ] || return 0 + for f in ${info_files[@]}; do +usr/bin/install-info --delete ${info_dir}/$f.gz ${info_dir}/dir 2> /dev/null + done +} +# vim:set ts=2 sw=2 et:
[arch-commits] Commit in gnupg/repos (4 files)
Date: Monday, January 16, 2012 @ 17:52:43 Author: dreisner Revision: 146738 db-move: moved gnupg from [extra] to [core] (i686) Added: gnupg/repos/core-i686/ gnupg/repos/core-i686/PKGBUILD (from rev 146735, gnupg/repos/extra-i686/PKGBUILD) gnupg/repos/core-i686/gnupg.install (from rev 146735, gnupg/repos/extra-i686/gnupg.install) Deleted: gnupg/repos/extra-i686/ ---+ PKGBUILD | 36 gnupg.install | 21 + 2 files changed, 57 insertions(+) Copied: gnupg/repos/core-i686/PKGBUILD (from rev 146735, gnupg/repos/extra-i686/PKGBUILD) === --- core-i686/PKGBUILD (rev 0) +++ core-i686/PKGBUILD 2012-01-16 22:52:43 UTC (rev 146738) @@ -0,0 +1,36 @@ +# $Id$ +# Maintainer: Andreas Radke +# Committer: Judd Vinet +pkgname=gnupg +pkgver=1.4.11 +pkgrel=3 +pkgdesc="GNU Privacy Guard - a PGP replacement tool" +arch=('i686' 'x86_64') +license=('GPL3') +depends=('zlib' 'bzip2' 'libldap>=2.4.18' 'libusb-compat' 'curl>=7.16.2' 'readline>=6.0.00') +source=(ftp://ftp.franken.de/pub/crypt/mirror/ftp.gnupg.org/gcrypt/gnupg/$pkgname-$pkgver.tar.bz2) +install=gnupg.install +url="http://www.gnupg.org/"; +md5sums=('411744e1ef8ce90b87938c4203f001f1') + +build() { + cd ${srcdir}/${pkgname}-${pkgver} + ./configure --prefix=/usr \ + --libexecdir=/usr/lib \ + --enable-noexecstack + make + #ln -s ${pkgname}-${pkgver}/scripts .. # seems obsolete now +} + +check() { + cd "$srcdir/$pkgname-$pkgver" + make -k check #All 27 tests passed +} + +package () { + cd ${srcdir}/${pkgname}-${pkgver} + make DESTDIR=${pkgdir} install + + # fix fileconflict with gnupg2 pkg + rm ${pkgdir}/usr/share/man/man1/gpg-zip.1 +} Copied: gnupg/repos/core-i686/gnupg.install (from rev 146735, gnupg/repos/extra-i686/gnupg.install) === --- core-i686/gnupg.install (rev 0) +++ core-i686/gnupg.install 2012-01-16 22:52:43 UTC (rev 146738) @@ -0,0 +1,21 @@ +info_dir=/usr/share/info +info_files=(gnupg1.info) + +post_install() { + [ -x usr/bin/install-info ] || return 0 + for f in ${info_files[@]}; do +usr/bin/install-info ${info_dir}/$f.gz ${info_dir}/dir 2> /dev/null + done +} + +post_upgrade() { + post_install $1 +} + +pre_remove() { + [ -x usr/bin/install-info ] || return 0 + for f in ${info_files[@]}; do +usr/bin/install-info --delete ${info_dir}/$f.gz ${info_dir}/dir 2> /dev/null + done +} +# vim:set ts=2 sw=2 et: