[arch-commits] Commit in dnscrypt-proxy/repos/community-x86_64 (8 files)
David Runge
dvzrv at archlinux.org
Fri Mar 27 08:23:09 UTC 2020
Date: Friday, March 27, 2020 @ 08:23:07
Author: dvzrv
Revision: 604957
archrelease: copy trunk to community-x86_64
Added:
dnscrypt-proxy/repos/community-x86_64/PKGBUILD
(from rev 604956, dnscrypt-proxy/trunk/PKGBUILD)
dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.install
(from rev 604956, dnscrypt-proxy/trunk/dnscrypt-proxy.install)
dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.service
(from rev 604956, dnscrypt-proxy/trunk/dnscrypt-proxy.service)
dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.socket
(from rev 604956, dnscrypt-proxy/trunk/dnscrypt-proxy.socket)
Deleted:
dnscrypt-proxy/repos/community-x86_64/PKGBUILD
dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.install
dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.service
dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.socket
------------------------+
PKGBUILD | 156 +++++++++++++++++++++++------------------------
dnscrypt-proxy.install | 14 ++--
dnscrypt-proxy.service | 72 ++++++++++-----------
dnscrypt-proxy.socket | 32 ++++-----
4 files changed, 137 insertions(+), 137 deletions(-)
Deleted: PKGBUILD
===================================================================
--- PKGBUILD 2020-03-27 08:22:56 UTC (rev 604956)
+++ PKGBUILD 2020-03-27 08:23:07 UTC (rev 604957)
@@ -1,78 +0,0 @@
-# Maintainer: David Runge <dvzrv at archlinux.org>
-# Contributor: Felix Yan <felixonmars at archlinux.org>
-# Contributor: Techlive Zheng <techlivezheng at gmail dot com>
-# Contributor: peace4all <markspost at rocketmail dot com>
-
-pkgname=dnscrypt-proxy
-pkgver=2.0.41
-pkgrel=1
-pkgdesc="DNS proxy, supporting encrypted DNS protocols such as DNSCrypt v2 and DNS-over-HTTPS"
-arch=('x86_64')
-url="https://github.com/DNSCrypt/dnscrypt-proxy"
-license=('custom:ISC')
-depends=('glibc')
-makedepends=('git' 'go-pie')
-optdepends=('python-urllib3: for generate-domains-blacklist')
-install="${pkgname}.install"
-backup=("etc/${pkgname}/${pkgname}.toml"
- "etc/${pkgname}/blacklist.txt"
- "etc/${pkgname}/cloaking-rules.txt"
- "etc/${pkgname}/forwarding-rules.txt"
- "etc/${pkgname}/ip-blacklist.txt"
- "etc/${pkgname}/whitelist.txt"
-)
-source=("git+https://github.com/jedisct1/${pkgname}#tag=${pkgver}?signed"
- "${pkgname}.service"
- "${pkgname}.socket"
- "${pkgname}-configuration.patch::https://github.com/dvzrv/dnscrypt-proxy/commit/8d0fb58eaf5b2e315c9a243e34596104d4f2bff4.patch")
-sha512sums=('SKIP'
- '44833084f24f221d4bb8579dd898fbeb2f5c0cb6e570f5fe7a609d6c05edca22f5737db9512e78aa3a846378e98f5c144c36b07e440a79e340c46716cfcecfec'
- '56a56e87032da9316b392b0613124b0743673041596c717005541ae9b3994c7fc16c02497ea773d321f45d8e0f9ea8fda00783062cef4d5c8277b5b6f7cb10d5'
- '3144229a4b60a237f5f576650e6f7a34df90026307bb18b68b72bddc1cbdc14f4740c29ac570e1c337ff24439172b6f6e2f0d67ec5ccd38bea1572c7ad765ebb')
-validpgpkeys=('54A2B8892CC3D6A597B92B6C210627AABA709FE1') # Frank Denis (Jedi/Sector One) <pgp at pureftpd.org
-
-prepare() {
- mv -v "${pkgname}" "${pkgname}-${pkgver}"
- cd "$pkgname-$pkgver"
- patch -Np1 -i "../${pkgname}-configuration.patch"
- # create empty ip-blacklist.txt
- touch "${pkgname}/ip-blacklist.txt"
-}
-
-build() {
- cd "$pkgname-$pkgver/${pkgname}"
- go build -ldflags="-linkmode external -extldflags ${LDFLAGS} -s -w"
-}
-
-package() {
- cd "$pkgname-$pkgver"
- # executable
- install -vDm 755 "${pkgname}/${pkgname}" -t "${pkgdir}/usr/bin/"
- # configuration
- install -vDm 644 "${pkgname}/example-${pkgname}.toml" \
- "${pkgdir}/etc/${pkgname}/${pkgname}.toml"
- install -vDm 644 "${pkgname}/example-blacklist.txt" \
- "${pkgdir}/etc/${pkgname}/blacklist.txt"
- install -vDm 644 "${pkgname}/example-cloaking-rules.txt" \
- "${pkgdir}/etc/${pkgname}/cloaking-rules.txt"
- install -vDm 644 "${pkgname}/example-forwarding-rules.txt" \
- "${pkgdir}/etc/${pkgname}/forwarding-rules.txt"
- install -vDm 644 "${pkgname}/ip-blacklist.txt" \
- "${pkgdir}/etc/${pkgname}/ip-blacklist.txt"
- install -vDm 644 "${pkgname}/example-whitelist.txt" \
- "${pkgdir}/etc/${pkgname}/whitelist.txt"
- # utils
- install -vDm 644 utils/generate-domains-blacklists/*.{conf,txt} \
- -t "${pkgdir}/usr/share/${pkgname}/utils/generate-domains-blacklists"
- install -vDm 755 utils/generate-domains-blacklists/generate-domains-blacklist.py \
- "${pkgdir}/usr/bin/generate-domains-blacklist"
- # systemd service/socket
- install -vDm 644 "../${pkgname}."{service,socket} \
- -t "${pkgdir}/usr/lib/systemd/system/"
- # license
- install -vDm 644 LICENSE -t "${pkgdir}/usr/share/licenses/${pkgname}"
- # docs
- install -vDm 644 {ChangeLog,README.md} \
- -t "${pkgdir}/usr/share/doc/${pkgname}"
-}
-# vim:set ts=2 sw=2 et:
Copied: dnscrypt-proxy/repos/community-x86_64/PKGBUILD (from rev 604956, dnscrypt-proxy/trunk/PKGBUILD)
===================================================================
--- PKGBUILD (rev 0)
+++ PKGBUILD 2020-03-27 08:23:07 UTC (rev 604957)
@@ -0,0 +1,78 @@
+# Maintainer: David Runge <dvzrv at archlinux.org>
+# Contributor: Felix Yan <felixonmars at archlinux.org>
+# Contributor: Techlive Zheng <techlivezheng at gmail dot com>
+# Contributor: peace4all <markspost at rocketmail dot com>
+
+pkgname=dnscrypt-proxy
+pkgver=2.0.42
+pkgrel=1
+pkgdesc="DNS proxy, supporting encrypted DNS protocols such as DNSCrypt v2 and DNS-over-HTTPS"
+arch=('x86_64')
+url="https://github.com/DNSCrypt/dnscrypt-proxy"
+license=('custom:ISC')
+depends=('glibc')
+makedepends=('git' 'go-pie')
+optdepends=('python-urllib3: for generate-domains-blacklist')
+install="${pkgname}.install"
+backup=("etc/${pkgname}/${pkgname}.toml"
+ "etc/${pkgname}/blacklist.txt"
+ "etc/${pkgname}/cloaking-rules.txt"
+ "etc/${pkgname}/forwarding-rules.txt"
+ "etc/${pkgname}/ip-blacklist.txt"
+ "etc/${pkgname}/whitelist.txt"
+)
+source=("git+https://github.com/jedisct1/${pkgname}#tag=${pkgver}?signed"
+ "${pkgname}.service"
+ "${pkgname}.socket"
+ "${pkgname}-configuration.patch::https://github.com/dvzrv/dnscrypt-proxy/commit/8d0fb58eaf5b2e315c9a243e34596104d4f2bff4.patch")
+sha512sums=('SKIP'
+ '44833084f24f221d4bb8579dd898fbeb2f5c0cb6e570f5fe7a609d6c05edca22f5737db9512e78aa3a846378e98f5c144c36b07e440a79e340c46716cfcecfec'
+ '56a56e87032da9316b392b0613124b0743673041596c717005541ae9b3994c7fc16c02497ea773d321f45d8e0f9ea8fda00783062cef4d5c8277b5b6f7cb10d5'
+ '3144229a4b60a237f5f576650e6f7a34df90026307bb18b68b72bddc1cbdc14f4740c29ac570e1c337ff24439172b6f6e2f0d67ec5ccd38bea1572c7ad765ebb')
+validpgpkeys=('54A2B8892CC3D6A597B92B6C210627AABA709FE1') # Frank Denis (Jedi/Sector One) <pgp at pureftpd.org
+
+prepare() {
+ mv -v "${pkgname}" "${pkgname}-${pkgver}"
+ cd "$pkgname-$pkgver"
+ patch -Np1 -i "../${pkgname}-configuration.patch"
+ # create empty ip-blacklist.txt
+ touch "${pkgname}/ip-blacklist.txt"
+}
+
+build() {
+ cd "$pkgname-$pkgver/${pkgname}"
+ go build -ldflags="-linkmode external -extldflags ${LDFLAGS} -s -w"
+}
+
+package() {
+ cd "$pkgname-$pkgver"
+ # executable
+ install -vDm 755 "${pkgname}/${pkgname}" -t "${pkgdir}/usr/bin/"
+ # configuration
+ install -vDm 644 "${pkgname}/example-${pkgname}.toml" \
+ "${pkgdir}/etc/${pkgname}/${pkgname}.toml"
+ install -vDm 644 "${pkgname}/example-blacklist.txt" \
+ "${pkgdir}/etc/${pkgname}/blacklist.txt"
+ install -vDm 644 "${pkgname}/example-cloaking-rules.txt" \
+ "${pkgdir}/etc/${pkgname}/cloaking-rules.txt"
+ install -vDm 644 "${pkgname}/example-forwarding-rules.txt" \
+ "${pkgdir}/etc/${pkgname}/forwarding-rules.txt"
+ install -vDm 644 "${pkgname}/ip-blacklist.txt" \
+ "${pkgdir}/etc/${pkgname}/ip-blacklist.txt"
+ install -vDm 644 "${pkgname}/example-whitelist.txt" \
+ "${pkgdir}/etc/${pkgname}/whitelist.txt"
+ # utils
+ install -vDm 644 utils/generate-domains-blacklists/*.{conf,txt} \
+ -t "${pkgdir}/usr/share/${pkgname}/utils/generate-domains-blacklists"
+ install -vDm 755 utils/generate-domains-blacklists/generate-domains-blacklist.py \
+ "${pkgdir}/usr/bin/generate-domains-blacklist"
+ # systemd service/socket
+ install -vDm 644 "../${pkgname}."{service,socket} \
+ -t "${pkgdir}/usr/lib/systemd/system/"
+ # license
+ install -vDm 644 LICENSE -t "${pkgdir}/usr/share/licenses/${pkgname}"
+ # docs
+ install -vDm 644 {ChangeLog,README.md} \
+ -t "${pkgdir}/usr/share/doc/${pkgname}"
+}
+# vim:set ts=2 sw=2 et:
Deleted: dnscrypt-proxy.install
===================================================================
--- dnscrypt-proxy.install 2020-03-27 08:22:56 UTC (rev 604956)
+++ dnscrypt-proxy.install 2020-03-27 08:23:07 UTC (rev 604957)
@@ -1,7 +0,0 @@
-post_upgrade() {
- if [ "$(vercmp $2 1.9.5-1)" -le 0 ]
- then
- echo 'The configuration file(s) and setup of dnscrypt-proxy has changed considerably since version 1.x.'
- echo 'Please refer to the new upstream information for help!'
- fi
-}
Copied: dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.install (from rev 604956, dnscrypt-proxy/trunk/dnscrypt-proxy.install)
===================================================================
--- dnscrypt-proxy.install (rev 0)
+++ dnscrypt-proxy.install 2020-03-27 08:23:07 UTC (rev 604957)
@@ -0,0 +1,7 @@
+post_upgrade() {
+ if [ "$(vercmp $2 1.9.5-1)" -le 0 ]
+ then
+ echo 'The configuration file(s) and setup of dnscrypt-proxy has changed considerably since version 1.x.'
+ echo 'Please refer to the new upstream information for help!'
+ fi
+}
Deleted: dnscrypt-proxy.service
===================================================================
--- dnscrypt-proxy.service 2020-03-27 08:22:56 UTC (rev 604956)
+++ dnscrypt-proxy.service 2020-03-27 08:23:07 UTC (rev 604957)
@@ -1,36 +0,0 @@
-[Unit]
-Description=DNSCrypt-proxy client
-Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
-Wants=network-online.target nss-lookup.target
-Before=nss-lookup.target
-
-[Service]
-AmbientCapabilities=CAP_NET_BIND_SERVICE
-CacheDirectory=dnscrypt-proxy
-CapabilityBoundingSet=CAP_NET_BIND_SERVICE
-DynamicUser=yes
-ExecStart=/usr/bin/dnscrypt-proxy --config /etc/dnscrypt-proxy/dnscrypt-proxy.toml
-LockPersonality=yes
-LogsDirectory=dnscrypt-proxy
-MemoryDenyWriteExecute=true
-NonBlocking=true
-NoNewPrivileges=true
-PrivateDevices=true
-ProtectControlGroups=yes
-ProtectHome=yes
-ProtectHostname=yes
-ProtectKernelLogs=yes
-ProtectKernelModules=yes
-ProtectKernelTunables=yes
-ProtectSystem=strict
-RestrictAddressFamilies=AF_INET AF_INET6
-RestrictNamespaces=true
-RestrictRealtime=true
-RuntimeDirectory=dnscrypt-proxy
-StateDirectory=dnscrypt-proxy
-SystemCallArchitectures=native
-SystemCallFilter=@system-service
-SystemCallFilter=~@resources @privileged
-
-[Install]
-WantedBy=multi-user.target
Copied: dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.service (from rev 604956, dnscrypt-proxy/trunk/dnscrypt-proxy.service)
===================================================================
--- dnscrypt-proxy.service (rev 0)
+++ dnscrypt-proxy.service 2020-03-27 08:23:07 UTC (rev 604957)
@@ -0,0 +1,36 @@
+[Unit]
+Description=DNSCrypt-proxy client
+Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
+Wants=network-online.target nss-lookup.target
+Before=nss-lookup.target
+
+[Service]
+AmbientCapabilities=CAP_NET_BIND_SERVICE
+CacheDirectory=dnscrypt-proxy
+CapabilityBoundingSet=CAP_NET_BIND_SERVICE
+DynamicUser=yes
+ExecStart=/usr/bin/dnscrypt-proxy --config /etc/dnscrypt-proxy/dnscrypt-proxy.toml
+LockPersonality=yes
+LogsDirectory=dnscrypt-proxy
+MemoryDenyWriteExecute=true
+NonBlocking=true
+NoNewPrivileges=true
+PrivateDevices=true
+ProtectControlGroups=yes
+ProtectHome=yes
+ProtectHostname=yes
+ProtectKernelLogs=yes
+ProtectKernelModules=yes
+ProtectKernelTunables=yes
+ProtectSystem=strict
+RestrictAddressFamilies=AF_INET AF_INET6
+RestrictNamespaces=true
+RestrictRealtime=true
+RuntimeDirectory=dnscrypt-proxy
+StateDirectory=dnscrypt-proxy
+SystemCallArchitectures=native
+SystemCallFilter=@system-service
+SystemCallFilter=~@resources @privileged
+
+[Install]
+WantedBy=multi-user.target
Deleted: dnscrypt-proxy.socket
===================================================================
--- dnscrypt-proxy.socket 2020-03-27 08:22:56 UTC (rev 604956)
+++ dnscrypt-proxy.socket 2020-03-27 08:23:07 UTC (rev 604957)
@@ -1,16 +0,0 @@
-[Unit]
-Description=DNSCrypt-proxy socket
-Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
-Before=nss-lookup.target
-Wants=nss-lookup.target network-online.target
-
-[Socket]
-ListenStream=127.0.0.1:53
-ListenDatagram=127.0.0.1:53
-ListenStream=[::1]:53
-ListenDatagram=[::1]:53
-NoDelay=true
-DeferAcceptSec=1
-
-[Install]
-WantedBy=sockets.target
Copied: dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.socket (from rev 604956, dnscrypt-proxy/trunk/dnscrypt-proxy.socket)
===================================================================
--- dnscrypt-proxy.socket (rev 0)
+++ dnscrypt-proxy.socket 2020-03-27 08:23:07 UTC (rev 604957)
@@ -0,0 +1,16 @@
+[Unit]
+Description=DNSCrypt-proxy socket
+Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
+Before=nss-lookup.target
+Wants=nss-lookup.target network-online.target
+
+[Socket]
+ListenStream=127.0.0.1:53
+ListenDatagram=127.0.0.1:53
+ListenStream=[::1]:53
+ListenDatagram=[::1]:53
+NoDelay=true
+DeferAcceptSec=1
+
+[Install]
+WantedBy=sockets.target
More information about the arch-commits
mailing list