[arch-commits] Commit in nsd/repos/community-x86_64 (10 files)
Bruno Pagani
archange at gemini.archlinux.org
Sat Jan 22 23:29:52 UTC 2022
Date: Saturday, January 22, 2022 @ 23:29:51
Author: archange
Revision: 1113505
archrelease: copy trunk to community-x86_64
Added:
nsd/repos/community-x86_64/PKGBUILD
(from rev 1113504, nsd/trunk/PKGBUILD)
nsd/repos/community-x86_64/nsd.install
(from rev 1113504, nsd/trunk/nsd.install)
nsd/repos/community-x86_64/nsd.service
(from rev 1113504, nsd/trunk/nsd.service)
nsd/repos/community-x86_64/nsd.sysusers
(from rev 1113504, nsd/trunk/nsd.sysusers)
nsd/repos/community-x86_64/nsd.tmpfiles
(from rev 1113504, nsd/trunk/nsd.tmpfiles)
Deleted:
nsd/repos/community-x86_64/PKGBUILD
nsd/repos/community-x86_64/nsd.install
nsd/repos/community-x86_64/nsd.service
nsd/repos/community-x86_64/nsd.sysusers
nsd/repos/community-x86_64/nsd.tmpfiles
--------------+
PKGBUILD | 124 ++++++++++++++++++++++++++++-----------------------------
nsd.install | 10 ++--
nsd.service | 84 +++++++++++++++++++-------------------
nsd.sysusers | 2
nsd.tmpfiles | 2
5 files changed, 111 insertions(+), 111 deletions(-)
Deleted: PKGBUILD
===================================================================
--- PKGBUILD 2022-01-22 23:29:06 UTC (rev 1113504)
+++ PKGBUILD 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -1,62 +0,0 @@
-# Maintainer: Bruno Pagani <archange at archlinux.org>
-# Contributor: Gaetan Bisson <bisson at archlinux.org>
-# Contributor: Kaiting Chen <kaitocracy at gmail.com>
-# Contributor: Roberto Alsina <ralsina at kde.org>
-
-pkgname=nsd
-pkgver=4.3.8
-pkgrel=1
-pkgdesc="Authoritative only, high performance and simple DNS server"
-arch=(x86_64)
-url="https://www.nlnetlabs.nl/nsd/"
-license=(BSD)
-depends=(openssl libevent fstrm protobuf-c systemd-libs)
-makedepends=(systemd)
-validpgpkeys=(EDFAA3F2CA4E6EB05681AF8E9F6F1C2D7E045F8D # W.C.A. Wijngaards <wouter at nlnetlabs.nl>
- C3E356788FAD0179D872D092BA811E62E7194568)
-source=("https://www.nlnetlabs.nl/downloads/${pkgname}/${pkgname}-${pkgver}.tar.gz"{,.asc}
- nsd.service
- nsd.sysusers
- nsd.tmpfiles)
-sha256sums=('11897e25f72f5a98f9202bd5378c936886d54376051a614d3688e451e9cb99e1'
- 'SKIP'
- '51dcf15195be0f6a4154a29ad882eabe180b2413e6b3cadbb1535885ff0d4dfa'
- '12ce2a05fbb23bb38c31933530a7773f796e250691843b9da76f178f5e7c94f5'
- '07a31cecdc787c7ef44018dfc696115bd7b5d44b6e93f56c6c08ed0887d51579')
-install=nsd.install
-
-prepare() {
- cd ${pkgname}-${pkgver}
- autoreconf -vfi
-}
-
-build() {
- cd ${pkgname}-${pkgver}
- ./configure \
- --prefix=/ \
- --sbindir=/usr/bin \
- --datarootdir=/usr/share \
- --with-pidfile=/run/nsd/nsd.pid \
- --with-user="" \
- --enable-ratelimit \
- --enable-relro-now \
- --enable-pie \
- --enable-dnstap \
- --enable-systemd \
- --enable-tcp-fastopen
- make
-}
-
-package() {
- cd ${pkgname}-${pkgver}
- make DESTDIR="${pkgdir}" install
- rmdir "${pkgdir}"/{tmp,run{/nsd,},var{/db{/nsd,},}}
-
- rm doc/differences.pdf
- install -d "${pkgdir}"/usr/share/{doc,licenses}/"${pkgname}"
- install -m644 doc/* "${pkgdir}"/usr/share/doc/"${pkgname}"
- ln -s ../../doc/"${pkgname}"/LICENSE "${pkgdir}"/usr/share/licenses/"${pkgname}"/LICENSE
- install -Dm644 ../nsd.service -t "${pkgdir}"/usr/lib/systemd/system/
- install -Dm644 ../nsd.sysusers "${pkgdir}"/usr/lib/sysusers.d/nsd.conf
- install -Dm644 ../nsd.tmpfiles "${pkgdir}"/usr/lib/tmpfiles.d/nsd.conf
-}
Copied: nsd/repos/community-x86_64/PKGBUILD (from rev 1113504, nsd/trunk/PKGBUILD)
===================================================================
--- PKGBUILD (rev 0)
+++ PKGBUILD 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -0,0 +1,62 @@
+# Maintainer: Bruno Pagani <archange at archlinux.org>
+# Contributor: Gaetan Bisson <bisson at archlinux.org>
+# Contributor: Kaiting Chen <kaitocracy at gmail.com>
+# Contributor: Roberto Alsina <ralsina at kde.org>
+
+pkgname=nsd
+pkgver=4.3.9
+pkgrel=1
+pkgdesc="Authoritative only, high performance and simple DNS server"
+arch=(x86_64)
+url="https://www.nlnetlabs.nl/nsd/"
+license=(BSD)
+depends=(openssl libevent fstrm protobuf-c systemd-libs)
+makedepends=(systemd)
+validpgpkeys=(EDFAA3F2CA4E6EB05681AF8E9F6F1C2D7E045F8D # W.C.A. Wijngaards <wouter at nlnetlabs.nl>
+ C3E356788FAD0179D872D092BA811E62E7194568)
+source=("https://www.nlnetlabs.nl/downloads/${pkgname}/${pkgname}-${pkgver}.tar.gz"{,.asc}
+ nsd.service
+ nsd.sysusers
+ nsd.tmpfiles)
+sha256sums=('531549f09289ecbd05829e14bb34563294d85b9edde2c613a00f597af2135e8d'
+ 'SKIP'
+ '51dcf15195be0f6a4154a29ad882eabe180b2413e6b3cadbb1535885ff0d4dfa'
+ '12ce2a05fbb23bb38c31933530a7773f796e250691843b9da76f178f5e7c94f5'
+ '07a31cecdc787c7ef44018dfc696115bd7b5d44b6e93f56c6c08ed0887d51579')
+install=nsd.install
+
+prepare() {
+ cd ${pkgname}-${pkgver}
+ autoreconf -vfi
+}
+
+build() {
+ cd ${pkgname}-${pkgver}
+ ./configure \
+ --prefix=/ \
+ --sbindir=/usr/bin \
+ --datarootdir=/usr/share \
+ --with-pidfile=/run/nsd/nsd.pid \
+ --with-user="" \
+ --enable-ratelimit \
+ --enable-relro-now \
+ --enable-pie \
+ --enable-dnstap \
+ --enable-systemd \
+ --enable-tcp-fastopen
+ make
+}
+
+package() {
+ cd ${pkgname}-${pkgver}
+ make DESTDIR="${pkgdir}" install
+ rmdir "${pkgdir}"/{tmp,run{/nsd,},var{/db{/nsd,},}}
+
+ rm doc/differences.pdf
+ install -d "${pkgdir}"/usr/share/{doc,licenses}/"${pkgname}"
+ install -m644 doc/* "${pkgdir}"/usr/share/doc/"${pkgname}"
+ ln -s ../../doc/"${pkgname}"/LICENSE "${pkgdir}"/usr/share/licenses/"${pkgname}"/LICENSE
+ install -Dm644 ../nsd.service -t "${pkgdir}"/usr/lib/systemd/system/
+ install -Dm644 ../nsd.sysusers "${pkgdir}"/usr/lib/sysusers.d/nsd.conf
+ install -Dm644 ../nsd.tmpfiles "${pkgdir}"/usr/lib/tmpfiles.d/nsd.conf
+}
Deleted: nsd.install
===================================================================
--- nsd.install 2022-01-22 23:29:06 UTC (rev 1113504)
+++ nsd.install 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -1,5 +0,0 @@
-post_upgrade() {
- if [ "$(vercmp "$2" "4.3.5")" -le 0 ]; then
- echo "nsd now runs as a dedicated nsd user and group. If you use certs and keys, make sure they are readable by the nsd user or group."
- fi
-}
Copied: nsd/repos/community-x86_64/nsd.install (from rev 1113504, nsd/trunk/nsd.install)
===================================================================
--- nsd.install (rev 0)
+++ nsd.install 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -0,0 +1,5 @@
+post_upgrade() {
+ if [ "$(vercmp "$2" "4.3.5")" -le 0 ]; then
+ echo "nsd now runs as a dedicated nsd user and group. If you use certs and keys, make sure they are readable by the nsd user or group."
+ fi
+}
Deleted: nsd.service
===================================================================
--- nsd.service 2022-01-22 23:29:06 UTC (rev 1113504)
+++ nsd.service 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -1,42 +0,0 @@
-[Unit]
-Description=Name Server Daemon
-After=network.target
-
-[Service]
-Type=notify
-User=nsd
-Group=nsd
-RuntimeDirectory=nsd
-ReadWritePaths=/var/db/nsd
-PIDFile=/run/nsd/nsd.pid
-ExecStart=/usr/bin/nsd -d -c /etc/nsd/nsd.conf
-ExecReload=+/bin/kill -HUP $MAINPID
-ExecStop=+/bin/kill -TERM $MAINPID
-Restart=always
-CapabilityBoundingSet=CAP_NET_BIND_SERVICE CAP_NET_RAW
-AmbientCapabilities=CAP_NET_BIND_SERVICE CAP_NET_RAW
-NoNewPrivileges=true
-SecureBits=noroot-locked
-ProtectSystem=strict
-ProtectHome=true
-PrivateTmp=true
-PrivateDevices=true
-#Not compatible with Capabilities
-#PrivateUsers=true
-ProtectHostname=true
-ProtectClock=true
-ProtectKernelTunables=true
-ProtectKernelModules=true
-ProtectKernelLogs=true
-ProtectControlGroups=true
-LockPersonality=true
-MemoryDenyWriteExecute=true
-RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
-RestrictRealtime=true
-RestrictSUIDSGID=true
-SystemCallArchitectures=native
-SystemCallFilter=@system-service
-SystemCallErrorNumber=EPERM
-
-[Install]
-WantedBy=multi-user.target
Copied: nsd/repos/community-x86_64/nsd.service (from rev 1113504, nsd/trunk/nsd.service)
===================================================================
--- nsd.service (rev 0)
+++ nsd.service 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -0,0 +1,42 @@
+[Unit]
+Description=Name Server Daemon
+After=network.target
+
+[Service]
+Type=notify
+User=nsd
+Group=nsd
+RuntimeDirectory=nsd
+ReadWritePaths=/var/db/nsd
+PIDFile=/run/nsd/nsd.pid
+ExecStart=/usr/bin/nsd -d -c /etc/nsd/nsd.conf
+ExecReload=+/bin/kill -HUP $MAINPID
+ExecStop=+/bin/kill -TERM $MAINPID
+Restart=always
+CapabilityBoundingSet=CAP_NET_BIND_SERVICE CAP_NET_RAW
+AmbientCapabilities=CAP_NET_BIND_SERVICE CAP_NET_RAW
+NoNewPrivileges=true
+SecureBits=noroot-locked
+ProtectSystem=strict
+ProtectHome=true
+PrivateTmp=true
+PrivateDevices=true
+#Not compatible with Capabilities
+#PrivateUsers=true
+ProtectHostname=true
+ProtectClock=true
+ProtectKernelTunables=true
+ProtectKernelModules=true
+ProtectKernelLogs=true
+ProtectControlGroups=true
+LockPersonality=true
+MemoryDenyWriteExecute=true
+RestrictAddressFamilies=AF_INET AF_INET6 AF_NETLINK AF_UNIX
+RestrictRealtime=true
+RestrictSUIDSGID=true
+SystemCallArchitectures=native
+SystemCallFilter=@system-service
+SystemCallErrorNumber=EPERM
+
+[Install]
+WantedBy=multi-user.target
Deleted: nsd.sysusers
===================================================================
--- nsd.sysusers 2022-01-22 23:29:06 UTC (rev 1113504)
+++ nsd.sysusers 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -1 +0,0 @@
-u nsd - "Name Server Daemon"
Copied: nsd/repos/community-x86_64/nsd.sysusers (from rev 1113504, nsd/trunk/nsd.sysusers)
===================================================================
--- nsd.sysusers (rev 0)
+++ nsd.sysusers 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -0,0 +1 @@
+u nsd - "Name Server Daemon"
Deleted: nsd.tmpfiles
===================================================================
--- nsd.tmpfiles 2022-01-22 23:29:06 UTC (rev 1113504)
+++ nsd.tmpfiles 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -1 +0,0 @@
-d /var/db/nsd 0700 nsd nsd
Copied: nsd/repos/community-x86_64/nsd.tmpfiles (from rev 1113504, nsd/trunk/nsd.tmpfiles)
===================================================================
--- nsd.tmpfiles (rev 0)
+++ nsd.tmpfiles 2022-01-22 23:29:51 UTC (rev 1113505)
@@ -0,0 +1 @@
+d /var/db/nsd 0700 nsd nsd
More information about the arch-commits
mailing list