Date: Tuesday, January 9, 2018 @ 14:05:10 Author: eschwartz Revision: 280697
archrelease: copy trunk to community-x86_64 Added: vault/repos/community-x86_64/PKGBUILD (from rev 280696, vault/trunk/PKGBUILD) vault/repos/community-x86_64/vault.hcl (from rev 280696, vault/trunk/vault.hcl) vault/repos/community-x86_64/vault.install (from rev 280696, vault/trunk/vault.install) vault/repos/community-x86_64/vault.service (from rev 280696, vault/trunk/vault.service) vault/repos/community-x86_64/vault.sysusers (from rev 280696, vault/trunk/vault.sysusers) vault/repos/community-x86_64/vault.tmpfiles (from rev 280696, vault/trunk/vault.tmpfiles) Deleted: vault/repos/community-x86_64/PKGBUILD vault/repos/community-x86_64/vault.hcl vault/repos/community-x86_64/vault.install vault/repos/community-x86_64/vault.service ----------------+ PKGBUILD | 91 +++++++++++++++++++++++++++++-------------------------- vault.hcl | 38 +++++++++++----------- vault.install | 34 +++----------------- vault.service | 44 +++++++++++++------------- vault.sysusers | 1 vault.tmpfiles | 1 6 files changed, 97 insertions(+), 112 deletions(-) Deleted: PKGBUILD =================================================================== --- PKGBUILD 2018-01-09 14:04:37 UTC (rev 280696) +++ PKGBUILD 2018-01-09 14:05:10 UTC (rev 280697) @@ -1,42 +0,0 @@ -# Maintainer : Christian Rebischke <chris.rebisc...@archlinux.org> -pkgname='vault' -pkgdesc='A tool for managing secrets' -pkgver='0.9.0' -pkgrel='3' -url='https://vaultproject.io/' -license=('MPL') -arch=('x86_64') -makedepends=('go-pie' 'git') -depends=('glibc') -install='vault.install' -backup=('etc/vault.hcl') -_vault_commit='bdac1854478538052ba5b7ec9a9ec688d35a3335' -source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}" - 'vault.service' - 'vault.hcl') -sha512sums=('SKIP' - '6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2' - '46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe') - -prepare () { - export GOPATH="${srcdir}" - export PATH="$PATH:$GOPATH/bin" - mkdir -p src/github.com/hashicorp/ - mv ${pkgname} src/github.com/hashicorp/ -} - -build () { - cd src/github.com/hashicorp/${pkgname} - go build -o vault-binary -} - -package () { - cd src/github.com/hashicorp/${pkgname} - install -Dm755 vault-binary "${pkgdir}/usr/bin/vault" - install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" - install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl" - install -Dm644 "${srcdir}/vault.service" "${pkgdir}/usr/lib/systemd/system/vault.service" - for file in README.md CHANGELOG.md ; do - install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}" - done -} Copied: vault/repos/community-x86_64/PKGBUILD (from rev 280696, vault/trunk/PKGBUILD) =================================================================== --- PKGBUILD (rev 0) +++ PKGBUILD 2018-01-09 14:05:10 UTC (rev 280697) @@ -0,0 +1,49 @@ +# Maintainer : Christian Rebischke <chris.rebisc...@archlinux.org> + +pkgname='vault' +pkgdesc='A tool for managing secrets' +pkgver='0.9.0' +pkgrel='4' +url='https://vaultproject.io/' +license=('MPL') +arch=('x86_64') +makedepends=('go-pie' 'git') +depends=('glibc') +install='vault.install' +backup=('etc/vault.hcl') +_vault_commit='bdac1854478538052ba5b7ec9a9ec688d35a3335' +source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}" + 'vault.service' + 'vault.sysusers' + 'vault.tmpfiles' + 'vault.hcl') +sha512sums=('SKIP' + '6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2' + '92616ccf83fa5ca9f8b0d022cf8ceb1f3549e12b66bf21d9f77f3eb26bd75ec1dc36c155948ec987c642067b85fbfc30a9217d6c503d952a402aa5ef63e50928' + '073f0f400cba78521cd2709ce86d88fbb14125117f9f3beca657f625d04eab8e00f7a01b5d9a1cfc03e9038844f5732bdbb1a85dd65a803d3f0b90f8bf87880e' + '46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe') + +prepare () { + export GOPATH="${srcdir}" + export PATH="$PATH:$GOPATH/bin" + mkdir -p src/github.com/hashicorp/ + mv ${pkgname} src/github.com/hashicorp/ +} + +build () { + cd src/github.com/hashicorp/${pkgname} + go build -o vault-binary +} + +package () { + cd src/github.com/hashicorp/${pkgname} + install -Dm755 vault-binary "${pkgdir}/usr/bin/vault" + install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" + install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl" + install -Dm644 "${srcdir}/vault.service" "${pkgdir}/usr/lib/systemd/system/vault.service" + install -Dm644 "${srcdir}/vault.sysusers" "${pkgdir}/usr/lib/sysusers.d/vault.conf" + install -Dm644 "${srcdir}/vault.tmpfiles" "${pkgdir}/usr/lib/tmpfiles.d/vault.conf" + for file in README.md CHANGELOG.md ; do + install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}" + done +} Deleted: vault.hcl =================================================================== --- vault.hcl 2018-01-09 14:04:37 UTC (rev 280696) +++ vault.hcl 2018-01-09 14:05:10 UTC (rev 280697) @@ -1,19 +0,0 @@ -/* - * Vault configuration. See: https://vaultproject.io/docs/config/ - */ - -backend "file" { - path = "/var/lib/vault" -} - -listener "tcp" { - /* - * By default Vault listens on localhost only. - * Make sure to enable TLS support otherwise. - * - * Note that VAULT_ADDR=http://127.0.0.1:8200 must - * be set in the environment in order for the client - * to work because it uses HTTPS by default. - */ - tls_disable = 1 -} Copied: vault/repos/community-x86_64/vault.hcl (from rev 280696, vault/trunk/vault.hcl) =================================================================== --- vault.hcl (rev 0) +++ vault.hcl 2018-01-09 14:05:10 UTC (rev 280697) @@ -0,0 +1,19 @@ +/* + * Vault configuration. See: https://vaultproject.io/docs/config/ + */ + +backend "file" { + path = "/var/lib/vault" +} + +listener "tcp" { + /* + * By default Vault listens on localhost only. + * Make sure to enable TLS support otherwise. + * + * Note that VAULT_ADDR=http://127.0.0.1:8200 must + * be set in the environment in order for the client + * to work because it uses HTTPS by default. + */ + tls_disable = 1 +} Deleted: vault.install =================================================================== --- vault.install 2018-01-09 14:04:37 UTC (rev 280696) +++ vault.install 2018-01-09 14:05:10 UTC (rev 280697) @@ -1,29 +0,0 @@ -# vim: ft=sh ts=4 sw=4 et - -post_install () { - getent passwd vault > /dev/null || useradd \ - -s /bin/nologin -c 'Vault daemon' -d /var/lib/vault -M -r -U vault - if [[ ! -d /var/lib/vault ]] ; then - mkdir /var/lib/vault - chown vault:vault /var/lib/vault - fi - setcap cap_ipc_lock=+ep /usr/bin/vault -} - -post_upgrade () { - if [[ -d /var/lib/vault ]] ; then - local badperms=false - while read -r path ; do - if [[ $(stat --format=%U:%G "${path}") != vault:vault ]] - then - badperms=true - break - fi - done < <( find /var/lib/vault ) - if ${badperms} ; then - echo 'Bad permissions detected in /var/lib/vault, fixing...' - chown -R vault:vault /var/lib/vault - fi - fi - post_install -} Copied: vault/repos/community-x86_64/vault.install (from rev 280696, vault/trunk/vault.install) =================================================================== --- vault.install (rev 0) +++ vault.install 2018-01-09 14:05:10 UTC (rev 280697) @@ -0,0 +1,5 @@ +# vim: ft=sh ts=4 sw=4 et + +post_install () { + setcap cap_ipc_lock=+ep /usr/bin/vault +} Deleted: vault.service =================================================================== --- vault.service 2018-01-09 14:04:37 UTC (rev 280696) +++ vault.service 2018-01-09 14:05:10 UTC (rev 280697) @@ -1,22 +0,0 @@ -[Unit] -Description=Vault server -Requires=basic.target network.target -After=basic.target network.target - -[Service] -User=vault -Group=vault -PrivateTmp=yes -ProtectSystem=full -ProtectHome=read-only -CapabilityBoundingSet=CAP_IPC_LOCK -Environment=GOMAXPROCS=2 -ExecStart=/bin/vault server -config=/etc/vault.hcl -KillSignal=SIGINT -TimeoutStopSec=30s -Restart=on-failure -StartLimitInterval=60s -StartLimitBurst=3 - -[Install] -WantedBy=multi-user.target Copied: vault/repos/community-x86_64/vault.service (from rev 280696, vault/trunk/vault.service) =================================================================== --- vault.service (rev 0) +++ vault.service 2018-01-09 14:05:10 UTC (rev 280697) @@ -0,0 +1,22 @@ +[Unit] +Description=Vault server +Requires=basic.target network.target +After=basic.target network.target + +[Service] +User=vault +Group=vault +PrivateTmp=yes +ProtectSystem=full +ProtectHome=read-only +CapabilityBoundingSet=CAP_IPC_LOCK +Environment=GOMAXPROCS=2 +ExecStart=/bin/vault server -config=/etc/vault.hcl +KillSignal=SIGINT +TimeoutStopSec=30s +Restart=on-failure +StartLimitInterval=60s +StartLimitBurst=3 + +[Install] +WantedBy=multi-user.target Copied: vault/repos/community-x86_64/vault.sysusers (from rev 280696, vault/trunk/vault.sysusers) =================================================================== --- vault.sysusers (rev 0) +++ vault.sysusers 2018-01-09 14:05:10 UTC (rev 280697) @@ -0,0 +1 @@ +u vault - "Vault daemon" /var/lib/vault Copied: vault/repos/community-x86_64/vault.tmpfiles (from rev 280696, vault/trunk/vault.tmpfiles) =================================================================== --- vault.tmpfiles (rev 0) +++ vault.tmpfiles 2018-01-09 14:05:10 UTC (rev 280697) @@ -0,0 +1 @@ +d /var/lib/vault 0755 vault vault - -