[arch-commits] Commit in vault/repos/community-x86_64 (12 files)
Christian Rebischke
shibumi at archlinux.org
Wed May 8 21:14:55 UTC 2019
Date: Wednesday, May 8, 2019 @ 21:14:55
Author: shibumi
Revision: 463314
archrelease: copy trunk to community-x86_64
Added:
vault/repos/community-x86_64/PKGBUILD
(from rev 463313, vault/trunk/PKGBUILD)
vault/repos/community-x86_64/vault.hcl
(from rev 463313, vault/trunk/vault.hcl)
vault/repos/community-x86_64/vault.install
(from rev 463313, vault/trunk/vault.install)
vault/repos/community-x86_64/vault.service
(from rev 463313, vault/trunk/vault.service)
vault/repos/community-x86_64/vault.sysusers
(from rev 463313, vault/trunk/vault.sysusers)
vault/repos/community-x86_64/vault.tmpfiles
(from rev 463313, vault/trunk/vault.tmpfiles)
Deleted:
vault/repos/community-x86_64/PKGBUILD
vault/repos/community-x86_64/vault.hcl
vault/repos/community-x86_64/vault.install
vault/repos/community-x86_64/vault.service
vault/repos/community-x86_64/vault.sysusers
vault/repos/community-x86_64/vault.tmpfiles
----------------+
PKGBUILD | 146 +++++++++++++++++++++++++++----------------------------
vault.hcl | 38 +++++++-------
vault.install | 18 +++---
vault.service | 44 ++++++++--------
vault.sysusers | 2
vault.tmpfiles | 2
6 files changed, 125 insertions(+), 125 deletions(-)
Deleted: PKGBUILD
===================================================================
--- PKGBUILD 2019-05-08 21:14:46 UTC (rev 463313)
+++ PKGBUILD 2019-05-08 21:14:55 UTC (rev 463314)
@@ -1,73 +0,0 @@
-# Maintainer : Christian Rebischke <Chris.Rebischke at archlinux.org>
-# Contributor: Tim Meusel <tim at bastelfreak.de>
-# Contributor: Sebastian Rakel sebastian at devunit.eu
-
-pkgname='vault'
-pkgdesc='A tool for managing secrets'
-pkgver='1.1.1'
-pkgrel='1'
-url="https://vaultproject.io/"
-license=('MPL')
-arch=('x86_64')
-makedepends=('go-pie' 'git' 'yarn' 'python2' 'bower' 'npm' 'zip')
-depends=('glibc')
-install='vault.install'
-backup=('etc/vault.hcl')
-_vault_commit='a3dcd63451cf6da1d04928b601bbe9748d53842e'
-source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}"
- 'vault.service'
- 'vault.sysusers'
- 'vault.tmpfiles'
- 'vault.hcl')
-sha512sums=('SKIP'
- '6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2'
- '92616ccf83fa5ca9f8b0d022cf8ceb1f3549e12b66bf21d9f77f3eb26bd75ec1dc36c155948ec987c642067b85fbfc30a9217d6c503d952a402aa5ef63e50928'
- '073f0f400cba78521cd2709ce86d88fbb14125117f9f3beca657f625d04eab8e00f7a01b5d9a1cfc03e9038844f5732bdbb1a85dd65a803d3f0b90f8bf87880e'
- '46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe')
-
-prepare () {
- export GOPATH="${srcdir}"
- export PATH="$PATH:$GOPATH/bin"
- mkdir -p src/github.com/hashicorp/
- mv "${pkgname}" "src/github.com/hashicorp/${pkgname}"
- # this is temporary
- go get github.com/kardianos/govendor
- export PACKAGE_ROOT="${GOPATH}/src/github.com/hashicorp/${pkgname}"
-}
-
-build () {
- cd $PACKAGE_ROOT
-
- # We will provide these packages in the future ourself
- govendor fetch github.com/mitchellh/gox
- govendor fetch github.com/elazarl/go-bindata-assetfs/go-bindata-assetfs
- govendor fetch github.com/hashicorp/go-bindata/go-bindata
-
- cd $PACKAGE_ROOT/vendor/github.com/hashicorp/go-bindata/go-bindata
- go build
- go install
-
- cd $PACKAGE_ROOT/vendor/github.com/elazarl/go-bindata-assetfs/go-bindata-assetfs
- go build
- go install
-
- cd $PACKAGE_ROOT/vendor/github.com/mitchellh/gox
- go build
- go install
-
- cd $PACKAGE_ROOT
- XC_OSARCH='linux/amd64' make static-dist bin
-}
-
-package () {
- cd ${PACKAGE_ROOT}
- install -Dm755 bin/vault "${pkgdir}/usr/bin/vault"
- install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
- install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl"
- install -Dm644 "${srcdir}/vault.service" "${pkgdir}/usr/lib/systemd/system/vault.service"
- install -Dm644 "${srcdir}/vault.sysusers" "${pkgdir}/usr/lib/sysusers.d/vault.conf"
- install -Dm644 "${srcdir}/vault.tmpfiles" "${pkgdir}/usr/lib/tmpfiles.d/vault.conf"
- for file in README.md CHANGELOG.md ; do
- install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}"
- done
-}
Copied: vault/repos/community-x86_64/PKGBUILD (from rev 463313, vault/trunk/PKGBUILD)
===================================================================
--- PKGBUILD (rev 0)
+++ PKGBUILD 2019-05-08 21:14:55 UTC (rev 463314)
@@ -0,0 +1,73 @@
+# Maintainer : Christian Rebischke <Chris.Rebischke at archlinux.org>
+# Contributor: Tim Meusel <tim at bastelfreak.de>
+# Contributor: Sebastian Rakel sebastian at devunit.eu
+
+pkgname='vault'
+pkgdesc='A tool for managing secrets'
+pkgver='1.1.2'
+pkgrel='1'
+url="https://vaultproject.io/"
+license=('MPL')
+arch=('x86_64')
+makedepends=('go-pie' 'git' 'yarn' 'python2' 'bower' 'npm' 'zip')
+depends=('glibc')
+install='vault.install'
+backup=('etc/vault.hcl')
+_vault_commit='0082501623c0b704b87b1fbc84c2d725994bac54'
+source=("git+https://github.com/hashicorp/vault#commit=${_vault_commit}"
+ 'vault.service'
+ 'vault.sysusers'
+ 'vault.tmpfiles'
+ 'vault.hcl')
+sha512sums=('SKIP'
+ '6619cf57668e995cddb29fb6c388c18c21b251052a53832415e415bb4fe538361ef77b74536f5b082b9cda6cd71b598fc50d8b7f51092c4d60262052c5725af2'
+ '92616ccf83fa5ca9f8b0d022cf8ceb1f3549e12b66bf21d9f77f3eb26bd75ec1dc36c155948ec987c642067b85fbfc30a9217d6c503d952a402aa5ef63e50928'
+ '073f0f400cba78521cd2709ce86d88fbb14125117f9f3beca657f625d04eab8e00f7a01b5d9a1cfc03e9038844f5732bdbb1a85dd65a803d3f0b90f8bf87880e'
+ '46106cc76151eef2dd5e4b2caa6a96aae4d6ce1ecbf977dcc8667a3f6c829cbea95133622adafcb15cdfaa066ecc94c73c983e7613ee2f6573694981569729fe')
+
+prepare () {
+ export GOPATH="${srcdir}"
+ export PATH="$PATH:$GOPATH/bin"
+ mkdir -p src/github.com/hashicorp/
+ mv "${pkgname}" "src/github.com/hashicorp/${pkgname}"
+ # this is temporary
+ go get github.com/kardianos/govendor
+ export PACKAGE_ROOT="${GOPATH}/src/github.com/hashicorp/${pkgname}"
+}
+
+build () {
+ cd $PACKAGE_ROOT
+
+ # We will provide these packages in the future ourself
+ govendor fetch github.com/mitchellh/gox
+ govendor fetch github.com/elazarl/go-bindata-assetfs/go-bindata-assetfs
+ govendor fetch github.com/hashicorp/go-bindata/go-bindata
+
+ cd $PACKAGE_ROOT/vendor/github.com/hashicorp/go-bindata/go-bindata
+ go build
+ go install
+
+ cd $PACKAGE_ROOT/vendor/github.com/elazarl/go-bindata-assetfs/go-bindata-assetfs
+ go build
+ go install
+
+ cd $PACKAGE_ROOT/vendor/github.com/mitchellh/gox
+ go build
+ go install
+
+ cd $PACKAGE_ROOT
+ XC_OSARCH='linux/amd64' make static-dist bin
+}
+
+package () {
+ cd ${PACKAGE_ROOT}
+ install -Dm755 bin/vault "${pkgdir}/usr/bin/vault"
+ install -Dm644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+ install -Dm644 "${srcdir}/vault.hcl" "${pkgdir}/etc/vault.hcl"
+ install -Dm644 "${srcdir}/vault.service" "${pkgdir}/usr/lib/systemd/system/vault.service"
+ install -Dm644 "${srcdir}/vault.sysusers" "${pkgdir}/usr/lib/sysusers.d/vault.conf"
+ install -Dm644 "${srcdir}/vault.tmpfiles" "${pkgdir}/usr/lib/tmpfiles.d/vault.conf"
+ for file in README.md CHANGELOG.md ; do
+ install -Dm644 "${file}" "${pkgdir}/usr/share/doc/${pkgname}/${file}"
+ done
+}
Deleted: vault.hcl
===================================================================
--- vault.hcl 2019-05-08 21:14:46 UTC (rev 463313)
+++ vault.hcl 2019-05-08 21:14:55 UTC (rev 463314)
@@ -1,19 +0,0 @@
-/*
- * Vault configuration. See: https://vaultproject.io/docs/config/
- */
-
-backend "file" {
- path = "/var/lib/vault"
-}
-
-listener "tcp" {
- /*
- * By default Vault listens on localhost only.
- * Make sure to enable TLS support otherwise.
- *
- * Note that VAULT_ADDR=http://127.0.0.1:8200 must
- * be set in the environment in order for the client
- * to work because it uses HTTPS by default.
- */
- tls_disable = 1
-}
Copied: vault/repos/community-x86_64/vault.hcl (from rev 463313, vault/trunk/vault.hcl)
===================================================================
--- vault.hcl (rev 0)
+++ vault.hcl 2019-05-08 21:14:55 UTC (rev 463314)
@@ -0,0 +1,19 @@
+/*
+ * Vault configuration. See: https://vaultproject.io/docs/config/
+ */
+
+backend "file" {
+ path = "/var/lib/vault"
+}
+
+listener "tcp" {
+ /*
+ * By default Vault listens on localhost only.
+ * Make sure to enable TLS support otherwise.
+ *
+ * Note that VAULT_ADDR=http://127.0.0.1:8200 must
+ * be set in the environment in order for the client
+ * to work because it uses HTTPS by default.
+ */
+ tls_disable = 1
+}
Deleted: vault.install
===================================================================
--- vault.install 2019-05-08 21:14:46 UTC (rev 463313)
+++ vault.install 2019-05-08 21:14:55 UTC (rev 463314)
@@ -1,9 +0,0 @@
-# vim: ft=sh ts=4 sw=4 et
-
-post_install () {
- setcap cap_ipc_lock=+ep /usr/bin/vault
-}
-
-post_upgrade () {
- setcap cap_ipc_lock=+ep /usr/bin/vault
-}
Copied: vault/repos/community-x86_64/vault.install (from rev 463313, vault/trunk/vault.install)
===================================================================
--- vault.install (rev 0)
+++ vault.install 2019-05-08 21:14:55 UTC (rev 463314)
@@ -0,0 +1,9 @@
+# vim: ft=sh ts=4 sw=4 et
+
+post_install () {
+ setcap cap_ipc_lock=+ep /usr/bin/vault
+}
+
+post_upgrade () {
+ setcap cap_ipc_lock=+ep /usr/bin/vault
+}
Deleted: vault.service
===================================================================
--- vault.service 2019-05-08 21:14:46 UTC (rev 463313)
+++ vault.service 2019-05-08 21:14:55 UTC (rev 463314)
@@ -1,22 +0,0 @@
-[Unit]
-Description=Vault server
-Requires=basic.target network.target
-After=basic.target network.target
-
-[Service]
-User=vault
-Group=vault
-PrivateTmp=yes
-ProtectSystem=full
-ProtectHome=read-only
-CapabilityBoundingSet=CAP_IPC_LOCK
-Environment=GOMAXPROCS=2
-ExecStart=/bin/vault server -config=/etc/vault.hcl
-KillSignal=SIGINT
-TimeoutStopSec=30s
-Restart=on-failure
-StartLimitInterval=60s
-StartLimitBurst=3
-
-[Install]
-WantedBy=multi-user.target
Copied: vault/repos/community-x86_64/vault.service (from rev 463313, vault/trunk/vault.service)
===================================================================
--- vault.service (rev 0)
+++ vault.service 2019-05-08 21:14:55 UTC (rev 463314)
@@ -0,0 +1,22 @@
+[Unit]
+Description=Vault server
+Requires=basic.target network.target
+After=basic.target network.target
+
+[Service]
+User=vault
+Group=vault
+PrivateTmp=yes
+ProtectSystem=full
+ProtectHome=read-only
+CapabilityBoundingSet=CAP_IPC_LOCK
+Environment=GOMAXPROCS=2
+ExecStart=/bin/vault server -config=/etc/vault.hcl
+KillSignal=SIGINT
+TimeoutStopSec=30s
+Restart=on-failure
+StartLimitInterval=60s
+StartLimitBurst=3
+
+[Install]
+WantedBy=multi-user.target
Deleted: vault.sysusers
===================================================================
--- vault.sysusers 2019-05-08 21:14:46 UTC (rev 463313)
+++ vault.sysusers 2019-05-08 21:14:55 UTC (rev 463314)
@@ -1 +0,0 @@
-u vault - "Vault daemon" /var/lib/vault
Copied: vault/repos/community-x86_64/vault.sysusers (from rev 463313, vault/trunk/vault.sysusers)
===================================================================
--- vault.sysusers (rev 0)
+++ vault.sysusers 2019-05-08 21:14:55 UTC (rev 463314)
@@ -0,0 +1 @@
+u vault - "Vault daemon" /var/lib/vault
Deleted: vault.tmpfiles
===================================================================
--- vault.tmpfiles 2019-05-08 21:14:46 UTC (rev 463313)
+++ vault.tmpfiles 2019-05-08 21:14:55 UTC (rev 463314)
@@ -1 +0,0 @@
-d /var/lib/vault 0755 vault vault - -
Copied: vault/repos/community-x86_64/vault.tmpfiles (from rev 463313, vault/trunk/vault.tmpfiles)
===================================================================
--- vault.tmpfiles (rev 0)
+++ vault.tmpfiles 2019-05-08 21:14:55 UTC (rev 463314)
@@ -0,0 +1 @@
+d /var/lib/vault 0755 vault vault - -
More information about the arch-commits
mailing list