[arch-commits] Commit in consul/repos/community-testing-x86_64 (20 files)

Eli Schwartz eschwartz at archlinux.org
Wed Feb 6 21:37:18 UTC 2019


    Date: Wednesday, February 6, 2019 @ 21:37:17
  Author: eschwartz
Revision: 429784

archrelease: copy trunk to community-testing-x86_64

Added:
  consul/repos/community-testing-x86_64/PKGBUILD
    (from rev 429781, consul/trunk/PKGBUILD)
  consul/repos/community-testing-x86_64/consul-ldflags.patch
    (from rev 429781, consul/trunk/consul-ldflags.patch)
  consul/repos/community-testing-x86_64/consul.default
    (from rev 429781, consul/trunk/consul.default)
  consul/repos/community-testing-x86_64/consul.install
    (from rev 429782, consul/trunk/consul.install)
  consul/repos/community-testing-x86_64/consul.service
    (from rev 429782, consul/trunk/consul.service)
  consul/repos/community-testing-x86_64/consul.sysusers
    (from rev 429782, consul/trunk/consul.sysusers)
  consul/repos/community-testing-x86_64/disable-syslog-test.patch
    (from rev 429782, consul/trunk/disable-syslog-test.patch)
  consul/repos/community-testing-x86_64/example.json
    (from rev 429782, consul/trunk/example.json)
  consul/repos/community-testing-x86_64/fix-build-version-info.patch
    (from rev 429782, consul/trunk/fix-build-version-info.patch)
  consul/repos/community-testing-x86_64/unparallelize-or-disable-flaky-tests.patch
    (from rev 429783, consul/trunk/unparallelize-or-disable-flaky-tests.patch)
Deleted:
  consul/repos/community-testing-x86_64/PKGBUILD
  consul/repos/community-testing-x86_64/consul-ldflags.patch
  consul/repos/community-testing-x86_64/consul.default
  consul/repos/community-testing-x86_64/consul.install
  consul/repos/community-testing-x86_64/consul.service
  consul/repos/community-testing-x86_64/consul.sysusers
  consul/repos/community-testing-x86_64/disable-syslog-test.patch
  consul/repos/community-testing-x86_64/example.json
  consul/repos/community-testing-x86_64/fix-build-version-info.patch
  consul/repos/community-testing-x86_64/unparallelize-or-disable-flaky-tests.patch

--------------------------------------------+
 PKGBUILD                                   |  188 +++++++++++++--------------
 consul-ldflags.patch                       |   58 ++++----
 consul.default                             |    2 
 consul.install                             |   18 +-
 consul.service                             |   32 ++--
 consul.sysusers                            |    2 
 disable-syslog-test.patch                  |   24 +--
 example.json                               |   14 +-
 fix-build-version-info.patch               |  150 ++++++++++-----------
 unparallelize-or-disable-flaky-tests.patch |  126 +++++++++---------
 10 files changed, 308 insertions(+), 306 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD	2019-02-06 21:37:05 UTC (rev 429783)
+++ PKGBUILD	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1,93 +0,0 @@
-# Maintainer: Thore Bödecker <foxxx0 at archlinux.org>
-# Maintainer: Felix Yan <felixonmars at archlinux.org>
-
-pkgname=consul
-pkgver=1.4.0
-pkgrel=1
-pkgdesc="A tool for service discovery, monitoring and configuration."
-arch=('x86_64')
-_gocli_commit='3d22a244be8aa6fb16ac24af0e195c08b7d973aa' # HEAD
-url="https://www.consul.io"
-license=('MPL2')
-depends=('glibc')
-makedepends=('git' 'go-pie' 'procps-ng' 'zip')
-source=("${pkgname}-${pkgver}.tar.gz::https://github.com/hashicorp/consul/archive/v${pkgver}.tar.gz"
-        "gocli::git+https://github.com/mitchellh/cli#commit=${_gocli_commit}"
-        'consul.service'
-        'consul.default'
-        'consul.sysusers'
-        'example.json'
-        'consul-ldflags.patch'
-        'fix-build-version-info.patch'
-        'disable-syslog-test.patch'
-        'unparallelize-or-disable-flaky-tests.patch')
-install=consul.install
-backup=('etc/default/consul')
-sha512sums=('a9f253ef5baa4e43800a0982ecb6893bf9487775cdcbe3a17bc7c45d601b6dca4e4c398ae3b70cdc1880577dbe1504d1a1f0cb702a1dd8c98b108e059fc721a0'
-            'SKIP'
-            'c70b9d1556f6c7ecb2e915ab685f289cef0e31198bd2e50c74a0483bbfb387beec67334f539a90adbf68b61b07946e98b300ab8a8e26e53b35f4ab4894adeb04'
-            'ec5a800529a297c709fa383c094ecf106351cf0f8ac7b613b972d415d77fe001088902d7ab805e63e78a8e6360323fec1b795db5a4446df1e21b9b4ed31e7079'
-            'ef872aedb2bc022a29292b7972a792b22e684c1ccb904a2b2cfec6d8966c28fb19be1452ce060821c419f1b646b236ba2e783175595e4bb6926d164c27a15c87'
-            'c4292b8f56ee955ed7385a49843fd90d6434029891b3e1e724cb2fc841514c06e2554a26d3937c114371b18c2168c4e64319eb2cbd726ee8b35870df19089348'
-            'cca5c71839c0a93515e8b2b6fa9d0a70e55b9e3cd1dcc9b8f9cbd94e7982ee695daec793a8ca9cb6245ff822dbbac4bf1af104c7ddef0ae9605d97a5fc08ed99'
-            '34a02f05216ff9a0274b1be384f92d15f1c2d4c6bdd502d7b133e54850074105c3b2068bbb8f7902f083efbb319ecf1e448025b452eac5d420cb5fe322befe0b'
-            '2a2e31469708f66877885c9e38f2044da13067c4111fc081ffea6187ff39acea6b17c0d33b2d0ada614315c3e5759a7592fbf7b0e9e9094ba2c31003bf1dbd4c'
-            '509c0b615f1a282f80004449e94ca8a51ac52cd4babfda0e670f22bcdaa5f9b2bb88189d09764333b31e8b3a449524979919fabb77886573a63c8bd582398933')
-
-prepare() {
-  export  GOPATH="${srcdir}"
-  export  PATH="$PATH:$GOPATH/bin"
-  mkdir -p "src/github.com/mitchellh"
-  mkdir -p "src/github.com/hashicorp"
-
-  mv "${pkgname}-${pkgver}" "${srcdir}/src/github.com/hashicorp/${pkgname}"
-  mv "gocli" "${srcdir}/src/github.com/mitchellh/cli"
-
-  cd "${srcdir}/src/github.com/hashicorp/${pkgname}"
-
-  # go ldflags hardening (e.g. RELRO, ...)
-  patch -p1 -N -l -i "${srcdir}/consul-ldflags.patch"
-
-  # use proper release build version string (w/o '-dev' suffix)
-  patch -p1 -N -l -i "${srcdir}/fix-build-version-info.patch"
-
-  # disable syslog test (requires running syslog service)
-  patch -p1 -N -l -i "${srcdir}/disable-syslog-test.patch"
-
-  # workaround/disable flaky tests tests
-  patch -p1 -N -l -i "${srcdir}/unparallelize-or-disable-flaky-tests.patch"
-}
-
-build() {
-  cd "${srcdir}/src/github.com/hashicorp/${pkgname}"
-  export GOOS='linux'
-  export GOARCH='amd64'
-  make linux
-}
-
-check() {
-  cd "${srcdir}/src/github.com/hashicorp/${pkgname}"
-  # weird race conditions when being run overparallelized
-  export GOMAXPROCS="2"
-  export GOOS='linux'
-  export GOARCH='amd64'
-  export GOTEST_FLAGS="-p 2 -parallel 2"
-  export CONSUL_TEST_SKIP_SYSLOG='true'
-  make -j1 test
-}
-
-package() {
-  cd "${srcdir}/src/github.com/hashicorp/${pkgname}"
-
-  install -D -d -m750 -o 208 -g 208 "${pkgdir}/var/lib/consul"
-  install -D -d -m750 -o   0 -g 208 "${pkgdir}/etc/consul.d"
-
-  install -D -m644 "${srcdir}/consul.default" "${pkgdir}/etc/default/consul"
-  install -D -m644 -o 0 -g 0 "${srcdir}/example.json" "${pkgdir}/usr/share/doc/consul/config.example.json"
-  install -Dm755 "bin/consul" "${pkgdir}/usr/bin/consul"
-
-  install -Dm644 "${srcdir}/consul.service" "${pkgdir}/usr/lib/systemd/system/consul.service"
-  install -Dm644 "${srcdir}/consul.sysusers" "${pkgdir}/usr/lib/sysusers.d/consul.conf"
-}
-
-# vim:set ts=2 sw=2 et:

Copied: consul/repos/community-testing-x86_64/PKGBUILD (from rev 429781, consul/trunk/PKGBUILD)
===================================================================
--- PKGBUILD	                        (rev 0)
+++ PKGBUILD	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1,95 @@
+# Maintainer: Thore Bödecker <foxxx0 at archlinux.org>
+# Maintainer: Felix Yan <felixonmars at archlinux.org>
+
+pkgname=consul
+pkgver=1.4.0
+pkgrel=2
+pkgdesc="A tool for service discovery, monitoring and configuration."
+arch=('x86_64')
+_gocli_commit='3d22a244be8aa6fb16ac24af0e195c08b7d973aa' # HEAD
+url="https://www.consul.io"
+license=('MPL2')
+depends=('glibc')
+makedepends=('git' 'go-pie' 'procps-ng' 'zip')
+source=("${pkgname}-${pkgver}.tar.gz::https://github.com/hashicorp/consul/archive/v${pkgver}.tar.gz"
+        "gocli::git+https://github.com/mitchellh/cli#commit=${_gocli_commit}"
+        'consul.service'
+        'consul.default'
+        'consul.sysusers'
+        'example.json'
+        'consul-ldflags.patch'
+        'fix-build-version-info.patch'
+        'disable-syslog-test.patch'
+        'unparallelize-or-disable-flaky-tests.patch')
+install=consul.install
+backup=('etc/default/consul')
+sha512sums=('a9f253ef5baa4e43800a0982ecb6893bf9487775cdcbe3a17bc7c45d601b6dca4e4c398ae3b70cdc1880577dbe1504d1a1f0cb702a1dd8c98b108e059fc721a0'
+            'SKIP'
+            'c70b9d1556f6c7ecb2e915ab685f289cef0e31198bd2e50c74a0483bbfb387beec67334f539a90adbf68b61b07946e98b300ab8a8e26e53b35f4ab4894adeb04'
+            'ec5a800529a297c709fa383c094ecf106351cf0f8ac7b613b972d415d77fe001088902d7ab805e63e78a8e6360323fec1b795db5a4446df1e21b9b4ed31e7079'
+            'ef872aedb2bc022a29292b7972a792b22e684c1ccb904a2b2cfec6d8966c28fb19be1452ce060821c419f1b646b236ba2e783175595e4bb6926d164c27a15c87'
+            'c4292b8f56ee955ed7385a49843fd90d6434029891b3e1e724cb2fc841514c06e2554a26d3937c114371b18c2168c4e64319eb2cbd726ee8b35870df19089348'
+            'cca5c71839c0a93515e8b2b6fa9d0a70e55b9e3cd1dcc9b8f9cbd94e7982ee695daec793a8ca9cb6245ff822dbbac4bf1af104c7ddef0ae9605d97a5fc08ed99'
+            '34a02f05216ff9a0274b1be384f92d15f1c2d4c6bdd502d7b133e54850074105c3b2068bbb8f7902f083efbb319ecf1e448025b452eac5d420cb5fe322befe0b'
+            '2a2e31469708f66877885c9e38f2044da13067c4111fc081ffea6187ff39acea6b17c0d33b2d0ada614315c3e5759a7592fbf7b0e9e9094ba2c31003bf1dbd4c'
+            '509c0b615f1a282f80004449e94ca8a51ac52cd4babfda0e670f22bcdaa5f9b2bb88189d09764333b31e8b3a449524979919fabb77886573a63c8bd582398933')
+
+prepare() {
+  mkdir -p "src/github.com/mitchellh"
+  mkdir -p "src/github.com/hashicorp"
+
+  mv "${pkgname}-${pkgver}" "${srcdir}/src/github.com/hashicorp/${pkgname}"
+  mv "gocli" "${srcdir}/src/github.com/mitchellh/cli"
+
+  cd "${srcdir}/src/github.com/hashicorp/${pkgname}"
+
+  # go ldflags hardening (e.g. RELRO, ...)
+  patch -p1 -N -l -i "${srcdir}/consul-ldflags.patch"
+
+  # use proper release build version string (w/o '-dev' suffix)
+  patch -p1 -N -l -i "${srcdir}/fix-build-version-info.patch"
+
+  # disable syslog test (requires running syslog service)
+  patch -p1 -N -l -i "${srcdir}/disable-syslog-test.patch"
+
+  # workaround/disable flaky tests tests
+  patch -p1 -N -l -i "${srcdir}/unparallelize-or-disable-flaky-tests.patch"
+}
+
+build() {
+  cd "${srcdir}/src/github.com/hashicorp/${pkgname}"
+  export GOPATH="${srcdir}"
+  export PATH="$PATH:$GOPATH/bin"
+  export GOOS='linux'
+  export GOARCH='amd64'
+  make linux
+}
+
+check() {
+  cd "${srcdir}/src/github.com/hashicorp/${pkgname}"
+  export GOPATH="${srcdir}"
+  export PATH="$PATH:$GOPATH/bin"
+  # weird race conditions when being run overparallelized
+  export GOMAXPROCS="2"
+  export GOOS='linux'
+  export GOARCH='amd64'
+  export GOTEST_FLAGS="-p 2 -parallel 2"
+  export CONSUL_TEST_SKIP_SYSLOG='true'
+  make -j1 test
+}
+
+package() {
+  cd "${srcdir}/src/github.com/hashicorp/${pkgname}"
+
+  install -D -d -m750 -o 208 -g 208 "${pkgdir}/var/lib/consul"
+  install -D -d -m750 -o   0 -g 208 "${pkgdir}/etc/consul.d"
+
+  install -D -m644 "${srcdir}/consul.default" "${pkgdir}/etc/default/consul"
+  install -D -m644 -o 0 -g 0 "${srcdir}/example.json" "${pkgdir}/usr/share/doc/consul/config.example.json"
+  install -Dm755 "bin/consul" "${pkgdir}/usr/bin/consul"
+
+  install -Dm644 "${srcdir}/consul.service" "${pkgdir}/usr/lib/systemd/system/consul.service"
+  install -Dm644 "${srcdir}/consul.sysusers" "${pkgdir}/usr/lib/sysusers.d/consul.conf"
+}
+
+# vim:set ts=2 sw=2 et:

Deleted: consul-ldflags.patch
===================================================================
--- consul-ldflags.patch	2019-02-06 21:37:05 UTC (rev 429783)
+++ consul-ldflags.patch	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1,29 +0,0 @@
---- a/GNUmakefile	2018-11-14 23:37:47.000000000 +0100
-+++ b/GNUmakefile	2019-01-08 15:44:48.494251517 +0100
-@@ -27,6 +27,7 @@ GIT_DIRTY?=$(shell test -n "`git status
- GIT_DESCRIBE?=$(shell git describe --tags --always)
- GIT_IMPORT=github.com/hashicorp/consul/version
- GOLDFLAGS=-X $(GIT_IMPORT).GitCommit=$(GIT_COMMIT)$(GIT_DIRTY) -X $(GIT_IMPORT).GitDescribe=$(GIT_DESCRIBE)
-+EXTLDFLAGS := ${LDFLAGS}
- 
- ifeq ($(FORCE_REBUILD),1)
- NOCACHE=--no-cache
-@@ -96,6 +97,7 @@ export GIT_DIRTY
- export GIT_DESCRIBE
- export GOTAGS
- export GOLDFLAGS
-+export EXTLDFLAGS
- 
- 
- DEV_PUSH?=0
---- a/build-support/functions/20-build.sh	2018-11-14 23:37:47.000000000 +0100
-+++ b/build-support/functions/20-build.sh	2019-01-08 15:03:55.598451424 +0100
-@@ -468,7 +468,7 @@ function build_consul_local {
-             if [ $os == "windows" ];then
-                 binname="consul.exe"
-             fi
--            CGO_ENABLED=0 GOOS=${os} GOARCH=${arch} go install -ldflags "${GOLDFLAGS}" -tags "${GOTAGS}" && cp "${MAIN_GOPATH}/bin/${GOBIN_EXTRA}${binname}" "${outdir}/${binname}"
-+            CGO_ENABLED=0 GOOS=${os} GOARCH=${arch} go install -ldflags "-linkmode external -extldflags ${EXTLDFLAGS} -s -w ${GOLDFLAGS}" -tags "${GOTAGS}" && cp "${MAIN_GOPATH}/bin/${GOBIN_EXTRA}${binname}" "${outdir}/${binname}"
-             if test $? -ne 0
-             then
-                err "ERROR: Failed to build Consul for ${osarch}"

Copied: consul/repos/community-testing-x86_64/consul-ldflags.patch (from rev 429781, consul/trunk/consul-ldflags.patch)
===================================================================
--- consul-ldflags.patch	                        (rev 0)
+++ consul-ldflags.patch	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1,29 @@
+--- a/GNUmakefile	2018-11-14 23:37:47.000000000 +0100
++++ b/GNUmakefile	2019-01-08 15:44:48.494251517 +0100
+@@ -27,6 +27,7 @@ GIT_DIRTY?=$(shell test -n "`git status
+ GIT_DESCRIBE?=$(shell git describe --tags --always)
+ GIT_IMPORT=github.com/hashicorp/consul/version
+ GOLDFLAGS=-X $(GIT_IMPORT).GitCommit=$(GIT_COMMIT)$(GIT_DIRTY) -X $(GIT_IMPORT).GitDescribe=$(GIT_DESCRIBE)
++EXTLDFLAGS := ${LDFLAGS}
+ 
+ ifeq ($(FORCE_REBUILD),1)
+ NOCACHE=--no-cache
+@@ -96,6 +97,7 @@ export GIT_DIRTY
+ export GIT_DESCRIBE
+ export GOTAGS
+ export GOLDFLAGS
++export EXTLDFLAGS
+ 
+ 
+ DEV_PUSH?=0
+--- a/build-support/functions/20-build.sh	2018-11-14 23:37:47.000000000 +0100
++++ b/build-support/functions/20-build.sh	2019-01-08 15:03:55.598451424 +0100
+@@ -468,7 +468,7 @@ function build_consul_local {
+             if [ $os == "windows" ];then
+                 binname="consul.exe"
+             fi
+-            CGO_ENABLED=0 GOOS=${os} GOARCH=${arch} go install -ldflags "${GOLDFLAGS}" -tags "${GOTAGS}" && cp "${MAIN_GOPATH}/bin/${GOBIN_EXTRA}${binname}" "${outdir}/${binname}"
++            CGO_ENABLED=0 GOOS=${os} GOARCH=${arch} go install -ldflags "-linkmode external -extldflags ${EXTLDFLAGS} -s -w ${GOLDFLAGS}" -tags "${GOTAGS}" && cp "${MAIN_GOPATH}/bin/${GOBIN_EXTRA}${binname}" "${outdir}/${binname}"
+             if test $? -ne 0
+             then
+                err "ERROR: Failed to build Consul for ${osarch}"

Deleted: consul.default
===================================================================
--- consul.default	2019-02-06 21:37:05 UTC (rev 429783)
+++ consul.default	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1 +0,0 @@
-CONSUL_FLAGS=""

Copied: consul/repos/community-testing-x86_64/consul.default (from rev 429781, consul/trunk/consul.default)
===================================================================
--- consul.default	                        (rev 0)
+++ consul.default	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1 @@
+CONSUL_FLAGS=""

Deleted: consul.install
===================================================================
--- consul.install	2019-02-06 21:37:05 UTC (rev 429783)
+++ consul.install	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1,9 +0,0 @@
-post_upgrade() {
-	# improved permissions since 0.9.3-1
-	if  [ "$(vercmp "$2" "0.9.3")" -lt 0 ]; then
-		chown 0:208 /etc/consul.d
-		chmod 0750 /etc/consul.d
-		echo -en "----\nThe directory permissions for /etc/consul.d/ have been fixed.\n----\n"
-	fi
-	true
-}

Copied: consul/repos/community-testing-x86_64/consul.install (from rev 429782, consul/trunk/consul.install)
===================================================================
--- consul.install	                        (rev 0)
+++ consul.install	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1,9 @@
+post_upgrade() {
+	# improved permissions since 0.9.3-1
+	if  [ "$(vercmp "$2" "0.9.3")" -lt 0 ]; then
+		chown 0:208 /etc/consul.d
+		chmod 0750 /etc/consul.d
+		echo -en "----\nThe directory permissions for /etc/consul.d/ have been fixed.\n----\n"
+	fi
+	true
+}

Deleted: consul.service
===================================================================
--- consul.service	2019-02-06 21:37:05 UTC (rev 429783)
+++ consul.service	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1,16 +0,0 @@
-[Unit]
-Description=Consul Agent
-Requires=network-online.target
-After=network-online.target
-
-[Service]
-User=consul
-Group=consul
-EnvironmentFile=-/etc/default/consul
-Restart=on-failure
-ExecStart=/usr/bin/consul agent $CONSUL_FLAGS -config-dir=/etc/consul.d
-ExecReload=/usr/bin/kill -HUP $MAINPID
-KillSignal=SIGINT
-
-[Install]
-WantedBy=multi-user.target

Copied: consul/repos/community-testing-x86_64/consul.service (from rev 429782, consul/trunk/consul.service)
===================================================================
--- consul.service	                        (rev 0)
+++ consul.service	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1,16 @@
+[Unit]
+Description=Consul Agent
+Requires=network-online.target
+After=network-online.target
+
+[Service]
+User=consul
+Group=consul
+EnvironmentFile=-/etc/default/consul
+Restart=on-failure
+ExecStart=/usr/bin/consul agent $CONSUL_FLAGS -config-dir=/etc/consul.d
+ExecReload=/usr/bin/kill -HUP $MAINPID
+KillSignal=SIGINT
+
+[Install]
+WantedBy=multi-user.target

Deleted: consul.sysusers
===================================================================
--- consul.sysusers	2019-02-06 21:37:05 UTC (rev 429783)
+++ consul.sysusers	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1 +0,0 @@
-u consul 208 - /var/lib/consul

Copied: consul/repos/community-testing-x86_64/consul.sysusers (from rev 429782, consul/trunk/consul.sysusers)
===================================================================
--- consul.sysusers	                        (rev 0)
+++ consul.sysusers	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1 @@
+u consul 208 - /var/lib/consul

Deleted: disable-syslog-test.patch
===================================================================
--- disable-syslog-test.patch	2019-02-06 21:37:05 UTC (rev 429783)
+++ disable-syslog-test.patch	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1,12 +0,0 @@
---- a/./logger/syslog_test.go	2018-11-14 23:37:47.000000000 +0100
-+++ b/./logger/syslog_test.go	2019-01-04 14:16:21.575451546 +0100
-@@ -16,6 +16,9 @@ func TestSyslogFilter(t *testing.T) {
- 	if os.Getenv("TRAVIS") == "true" {
- 		t.Skip("Syslog not supported on travis-ci")
- 	}
-+	if os.Getenv("CONSUL_TEST_SKIP_SYSLOG") == "true" {
-+		t.Skip("Skipping test due to env var CONSUL_TEST_SKIP_SYSLOG being set")
-+	}
- 
- 	l, err := gsyslog.NewLogger(gsyslog.LOG_NOTICE, "LOCAL0", "consul")
- 	if err != nil {

Copied: consul/repos/community-testing-x86_64/disable-syslog-test.patch (from rev 429782, consul/trunk/disable-syslog-test.patch)
===================================================================
--- disable-syslog-test.patch	                        (rev 0)
+++ disable-syslog-test.patch	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1,12 @@
+--- a/./logger/syslog_test.go	2018-11-14 23:37:47.000000000 +0100
++++ b/./logger/syslog_test.go	2019-01-04 14:16:21.575451546 +0100
+@@ -16,6 +16,9 @@ func TestSyslogFilter(t *testing.T) {
+ 	if os.Getenv("TRAVIS") == "true" {
+ 		t.Skip("Syslog not supported on travis-ci")
+ 	}
++	if os.Getenv("CONSUL_TEST_SKIP_SYSLOG") == "true" {
++		t.Skip("Skipping test due to env var CONSUL_TEST_SKIP_SYSLOG being set")
++	}
+ 
+ 	l, err := gsyslog.NewLogger(gsyslog.LOG_NOTICE, "LOCAL0", "consul")
+ 	if err != nil {

Deleted: example.json
===================================================================
--- example.json	2019-02-06 21:37:05 UTC (rev 429783)
+++ example.json	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1,7 +0,0 @@
-{
-  "data_dir": "/var/lib/consul",
-  "disable_update_check": true,
-  "log_level": "INFO",
-  "node_name": "example.localdomain",
-  "server": true
-}

Copied: consul/repos/community-testing-x86_64/example.json (from rev 429782, consul/trunk/example.json)
===================================================================
--- example.json	                        (rev 0)
+++ example.json	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1,7 @@
+{
+  "data_dir": "/var/lib/consul",
+  "disable_update_check": true,
+  "log_level": "INFO",
+  "node_name": "example.localdomain",
+  "server": true
+}

Deleted: fix-build-version-info.patch
===================================================================
--- fix-build-version-info.patch	2019-02-06 21:37:05 UTC (rev 429783)
+++ fix-build-version-info.patch	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1,75 +0,0 @@
---- a/version/version.go	2018-06-26 09:57:33.703932696 +0200
-+++ b/version/version.go	2018-06-26 09:59:05.986536238 +0200
-@@ -1,7 +1,6 @@
- package version
- 
- import (
--	"fmt"
- 	"strings"
- )
- 
-@@ -27,24 +26,6 @@ var (
- // for displaying to humans.
- func GetHumanVersion() string {
- 	version := Version
--	if GitDescribe != "" {
--		version = GitDescribe
--	}
--
--	release := VersionPrerelease
--	if GitDescribe == "" && release == "" {
--		release = "dev"
--	}
--
--	if release != "" {
--		if !strings.HasSuffix(version, "-"+release) {
--			// if we tagged a prerelease version then the release is in the version already
--			version += fmt.Sprintf("-%s", release)
--		}
--		if GitCommit != "" {
--			version += fmt.Sprintf(" (%s)", GitCommit)
--		}
--	}
- 
- 	// Strip off any single quotes added by the git information.
- 	return strings.Replace(version, "'", "", -1)
---- b/GNUmakefile	2019-01-08 15:44:48.494251517 +0100
-+++ c/GNUmakefile	2019-01-08 15:48:07.639739133 +0100
-@@ -21,12 +21,7 @@ GOARCH?=$(shell go env GOARCH)
- GOPATH=$(shell go env GOPATH)
- 
- ASSETFS_PATH?=agent/bindata_assetfs.go
--# Get the git commit
--GIT_COMMIT?=$(shell git rev-parse --short HEAD)
--GIT_DIRTY?=$(shell test -n "`git status --porcelain`" && echo "+CHANGES" || true)
--GIT_DESCRIBE?=$(shell git describe --tags --always)
--GIT_IMPORT=github.com/hashicorp/consul/version
--GOLDFLAGS=-X $(GIT_IMPORT).GitCommit=$(GIT_COMMIT)$(GIT_DIRTY) -X $(GIT_IMPORT).GitDescribe=$(GIT_DESCRIBE)
-+GOLDFLAGS=
- EXTLDFLAGS := ${LDFLAGS}
- 
- ifeq ($(FORCE_REBUILD),1)
-@@ -236,17 +231,6 @@ ui: ui-legacy-docker ui-docker static-as
- tools:
- 	go get -u -v $(GOTOOLS)
- 
--version:
--	@echo -n "Version:                    "
--	@$(SHELL) $(CURDIR)/build-support/scripts/version.sh
--	@echo -n "Version + release:          "
--	@$(SHELL) $(CURDIR)/build-support/scripts/version.sh -r
--	@echo -n "Version + git:              "
--	@$(SHELL) $(CURDIR)/build-support/scripts/version.sh  -g
--	@echo -n "Version + release + git:    "
--	@$(SHELL) $(CURDIR)/build-support/scripts/version.sh -r -g
--
--
- docker-images: go-build-image ui-build-image ui-legacy-build-image
- 
- go-build-image:
-@@ -275,4 +259,4 @@ ui-legacy-docker: ui-legacy-build-image
- 
- 
- .PHONY: all ci bin dev dist cov test test-ci test-internal test-install-deps cover format vet ui static-assets tools vendorfmt
--.PHONY: docker-images go-build-image ui-build-image ui-legacy-build-image static-assets-docker consul-docker ui-docker ui-legacy-docker version
-+.PHONY: docker-images go-build-image ui-build-image ui-legacy-build-image static-assets-docker consul-docker ui-docker ui-legacy-docker

Copied: consul/repos/community-testing-x86_64/fix-build-version-info.patch (from rev 429782, consul/trunk/fix-build-version-info.patch)
===================================================================
--- fix-build-version-info.patch	                        (rev 0)
+++ fix-build-version-info.patch	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1,75 @@
+--- a/version/version.go	2018-06-26 09:57:33.703932696 +0200
++++ b/version/version.go	2018-06-26 09:59:05.986536238 +0200
+@@ -1,7 +1,6 @@
+ package version
+ 
+ import (
+-	"fmt"
+ 	"strings"
+ )
+ 
+@@ -27,24 +26,6 @@ var (
+ // for displaying to humans.
+ func GetHumanVersion() string {
+ 	version := Version
+-	if GitDescribe != "" {
+-		version = GitDescribe
+-	}
+-
+-	release := VersionPrerelease
+-	if GitDescribe == "" && release == "" {
+-		release = "dev"
+-	}
+-
+-	if release != "" {
+-		if !strings.HasSuffix(version, "-"+release) {
+-			// if we tagged a prerelease version then the release is in the version already
+-			version += fmt.Sprintf("-%s", release)
+-		}
+-		if GitCommit != "" {
+-			version += fmt.Sprintf(" (%s)", GitCommit)
+-		}
+-	}
+ 
+ 	// Strip off any single quotes added by the git information.
+ 	return strings.Replace(version, "'", "", -1)
+--- b/GNUmakefile	2019-01-08 15:44:48.494251517 +0100
++++ c/GNUmakefile	2019-01-08 15:48:07.639739133 +0100
+@@ -21,12 +21,7 @@ GOARCH?=$(shell go env GOARCH)
+ GOPATH=$(shell go env GOPATH)
+ 
+ ASSETFS_PATH?=agent/bindata_assetfs.go
+-# Get the git commit
+-GIT_COMMIT?=$(shell git rev-parse --short HEAD)
+-GIT_DIRTY?=$(shell test -n "`git status --porcelain`" && echo "+CHANGES" || true)
+-GIT_DESCRIBE?=$(shell git describe --tags --always)
+-GIT_IMPORT=github.com/hashicorp/consul/version
+-GOLDFLAGS=-X $(GIT_IMPORT).GitCommit=$(GIT_COMMIT)$(GIT_DIRTY) -X $(GIT_IMPORT).GitDescribe=$(GIT_DESCRIBE)
++GOLDFLAGS=
+ EXTLDFLAGS := ${LDFLAGS}
+ 
+ ifeq ($(FORCE_REBUILD),1)
+@@ -236,17 +231,6 @@ ui: ui-legacy-docker ui-docker static-as
+ tools:
+ 	go get -u -v $(GOTOOLS)
+ 
+-version:
+-	@echo -n "Version:                    "
+-	@$(SHELL) $(CURDIR)/build-support/scripts/version.sh
+-	@echo -n "Version + release:          "
+-	@$(SHELL) $(CURDIR)/build-support/scripts/version.sh -r
+-	@echo -n "Version + git:              "
+-	@$(SHELL) $(CURDIR)/build-support/scripts/version.sh  -g
+-	@echo -n "Version + release + git:    "
+-	@$(SHELL) $(CURDIR)/build-support/scripts/version.sh -r -g
+-
+-
+ docker-images: go-build-image ui-build-image ui-legacy-build-image
+ 
+ go-build-image:
+@@ -275,4 +259,4 @@ ui-legacy-docker: ui-legacy-build-image
+ 
+ 
+ .PHONY: all ci bin dev dist cov test test-ci test-internal test-install-deps cover format vet ui static-assets tools vendorfmt
+-.PHONY: docker-images go-build-image ui-build-image ui-legacy-build-image static-assets-docker consul-docker ui-docker ui-legacy-docker version
++.PHONY: docker-images go-build-image ui-build-image ui-legacy-build-image static-assets-docker consul-docker ui-docker ui-legacy-docker

Deleted: unparallelize-or-disable-flaky-tests.patch
===================================================================
--- unparallelize-or-disable-flaky-tests.patch	2019-02-06 21:37:05 UTC (rev 429783)
+++ unparallelize-or-disable-flaky-tests.patch	2019-02-06 21:37:17 UTC (rev 429784)
@@ -1,63 +0,0 @@
-diff -upr a/agent/cache/cache_test.go b/agent/cache/cache_test.go
---- a/agent/cache/cache_test.go	2018-11-14 23:37:47.000000000 +0100
-+++ b/agent/cache/cache_test.go	2019-01-08 15:23:12.540631267 +0100
-@@ -152,7 +152,6 @@ func TestCacheGet_blockingInitSameKey(t
- // Test that Get with different cache keys both block on initial value
- // but that the fetches were both properly called.
- func TestCacheGet_blockingInitDiffKeys(t *testing.T) {
--	t.Parallel()
- 
- 	require := require.New(t)
- 
-@@ -238,7 +237,6 @@ func TestCacheGet_blockingIndex(t *testi
- // Test a get with an index set will timeout if the fetch doesn't return
- // anything.
- func TestCacheGet_blockingIndexTimeout(t *testing.T) {
--	t.Parallel()
- 
- 	typ := TestType(t)
- 	defer typ.AssertExpectations(t)
-@@ -346,7 +344,6 @@ func TestCacheGet_emptyFetchResult(t *te
- // Test that a type registered with a periodic refresh will perform
- // that refresh after the timer is up.
- func TestCacheGet_periodicRefresh(t *testing.T) {
--	t.Parallel()
- 
- 	typ := TestType(t)
- 	defer typ.AssertExpectations(t)
-@@ -433,7 +430,6 @@ func TestCacheGet_periodicRefreshMultipl
- 
- // Test that a refresh performs a backoff.
- func TestCacheGet_periodicRefreshErrorBackoff(t *testing.T) {
--	t.Parallel()
- 
- 	typ := TestType(t)
- 	defer typ.AssertExpectations(t)
-@@ -474,7 +470,6 @@ func TestCacheGet_periodicRefreshErrorBa
- 
- // Test that a badly behaved RPC that returns 0 index will perform a backoff.
- func TestCacheGet_periodicRefreshBadRPCZeroIndexErrorBackoff(t *testing.T) {
--	t.Parallel()
- 
- 	typ := TestType(t)
- 	defer typ.AssertExpectations(t)
-diff -upr a/agent/cache-types/connect_ca_leaf_test.go b/agent/cache-types/connect_ca_leaf_test.go
---- a/agent/cache-types/connect_ca_leaf_test.go	2018-11-14 23:37:47.000000000 +0100
-+++ b/agent/cache-types/connect_ca_leaf_test.go	2019-01-08 15:23:55.670339830 +0100
-@@ -94,7 +94,6 @@ func TestConnectCALeaf_changingRoots(t *
- // Test that after an initial signing, an expiringLeaf will trigger a
- // blocking query to resign.
- func TestConnectCALeaf_expiringLeaf(t *testing.T) {
--	t.Parallel()
- 
- 	require := require.New(t)
- 	rpc := TestRPC(t)
-@@ -178,7 +177,7 @@ func TestConnectCALeaf_expiringLeaf(t *t
- // with a given token but can't if a client using that token was served a cert
- // generated under a different token (say the agent token).
- func TestConnectCALeaf_multipleClientsDifferentTokens(t *testing.T) {
--	t.Parallel()
-+	t.Skip("disabled flaky test")
- 
- 	require := require.New(t)
- 	rpc := TestRPC(t)

Copied: consul/repos/community-testing-x86_64/unparallelize-or-disable-flaky-tests.patch (from rev 429783, consul/trunk/unparallelize-or-disable-flaky-tests.patch)
===================================================================
--- unparallelize-or-disable-flaky-tests.patch	                        (rev 0)
+++ unparallelize-or-disable-flaky-tests.patch	2019-02-06 21:37:17 UTC (rev 429784)
@@ -0,0 +1,63 @@
+diff -upr a/agent/cache/cache_test.go b/agent/cache/cache_test.go
+--- a/agent/cache/cache_test.go	2018-11-14 23:37:47.000000000 +0100
++++ b/agent/cache/cache_test.go	2019-01-08 15:23:12.540631267 +0100
+@@ -152,7 +152,6 @@ func TestCacheGet_blockingInitSameKey(t
+ // Test that Get with different cache keys both block on initial value
+ // but that the fetches were both properly called.
+ func TestCacheGet_blockingInitDiffKeys(t *testing.T) {
+-	t.Parallel()
+ 
+ 	require := require.New(t)
+ 
+@@ -238,7 +237,6 @@ func TestCacheGet_blockingIndex(t *testi
+ // Test a get with an index set will timeout if the fetch doesn't return
+ // anything.
+ func TestCacheGet_blockingIndexTimeout(t *testing.T) {
+-	t.Parallel()
+ 
+ 	typ := TestType(t)
+ 	defer typ.AssertExpectations(t)
+@@ -346,7 +344,6 @@ func TestCacheGet_emptyFetchResult(t *te
+ // Test that a type registered with a periodic refresh will perform
+ // that refresh after the timer is up.
+ func TestCacheGet_periodicRefresh(t *testing.T) {
+-	t.Parallel()
+ 
+ 	typ := TestType(t)
+ 	defer typ.AssertExpectations(t)
+@@ -433,7 +430,6 @@ func TestCacheGet_periodicRefreshMultipl
+ 
+ // Test that a refresh performs a backoff.
+ func TestCacheGet_periodicRefreshErrorBackoff(t *testing.T) {
+-	t.Parallel()
+ 
+ 	typ := TestType(t)
+ 	defer typ.AssertExpectations(t)
+@@ -474,7 +470,6 @@ func TestCacheGet_periodicRefreshErrorBa
+ 
+ // Test that a badly behaved RPC that returns 0 index will perform a backoff.
+ func TestCacheGet_periodicRefreshBadRPCZeroIndexErrorBackoff(t *testing.T) {
+-	t.Parallel()
+ 
+ 	typ := TestType(t)
+ 	defer typ.AssertExpectations(t)
+diff -upr a/agent/cache-types/connect_ca_leaf_test.go b/agent/cache-types/connect_ca_leaf_test.go
+--- a/agent/cache-types/connect_ca_leaf_test.go	2018-11-14 23:37:47.000000000 +0100
++++ b/agent/cache-types/connect_ca_leaf_test.go	2019-01-08 15:23:55.670339830 +0100
+@@ -94,7 +94,6 @@ func TestConnectCALeaf_changingRoots(t *
+ // Test that after an initial signing, an expiringLeaf will trigger a
+ // blocking query to resign.
+ func TestConnectCALeaf_expiringLeaf(t *testing.T) {
+-	t.Parallel()
+ 
+ 	require := require.New(t)
+ 	rpc := TestRPC(t)
+@@ -178,7 +177,7 @@ func TestConnectCALeaf_expiringLeaf(t *t
+ // with a given token but can't if a client using that token was served a cert
+ // generated under a different token (say the agent token).
+ func TestConnectCALeaf_multipleClientsDifferentTokens(t *testing.T) {
+-	t.Parallel()
++	t.Skip("disabled flaky test")
+ 
+ 	require := require.New(t)
+ 	rpc := TestRPC(t)



More information about the arch-commits mailing list