[arch-commits] Commit in vaultwarden/repos/community-x86_64 (10 files)

George Rawlinson grawlinson at gemini.archlinux.org
Mon Jan 31 23:29:48 UTC 2022


    Date: Monday, January 31, 2022 @ 23:29:47
  Author: grawlinson
Revision: 1121512

archrelease: copy trunk to community-x86_64

Added:
  vaultwarden/repos/community-x86_64/PKGBUILD
    (from rev 1121511, vaultwarden/trunk/PKGBUILD)
  vaultwarden/repos/community-x86_64/vaultwarden.install
    (from rev 1121511, vaultwarden/trunk/vaultwarden.install)
  vaultwarden/repos/community-x86_64/vaultwarden.service
    (from rev 1121511, vaultwarden/trunk/vaultwarden.service)
  vaultwarden/repos/community-x86_64/vaultwarden.sysusers.conf
    (from rev 1121511, vaultwarden/trunk/vaultwarden.sysusers.conf)
  vaultwarden/repos/community-x86_64/vaultwarden.tmpfiles
    (from rev 1121511, vaultwarden/trunk/vaultwarden.tmpfiles)
Deleted:
  vaultwarden/repos/community-x86_64/PKGBUILD
  vaultwarden/repos/community-x86_64/vaultwarden.install
  vaultwarden/repos/community-x86_64/vaultwarden.service
  vaultwarden/repos/community-x86_64/vaultwarden.sysusers.conf
  vaultwarden/repos/community-x86_64/vaultwarden.tmpfiles

---------------------------+
 PKGBUILD                  |  140 ++++++++++++++++++++++----------------------
 vaultwarden.install       |   64 ++++++++++----------
 vaultwarden.service       |  108 ++++++++++++++++-----------------
 vaultwarden.sysusers.conf |    2 
 vaultwarden.tmpfiles      |    6 -
 5 files changed, 160 insertions(+), 160 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD	2022-01-31 23:28:36 UTC (rev 1121511)
+++ PKGBUILD	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -1,70 +0,0 @@
-# Maintainer: Daniel M. Capella <polyzen at archlinux.org>
-# Maintainer: George Rawlinson <grawlinson at archlinux.org>
-# Contributor: Markus Richter <mqus at disroot dot org>
-# Contributor: Timothée Ravier <tim at siosm.fr
-
-pkgname=vaultwarden
-pkgver=1.23.1
-pkgrel=2
-pkgdesc='Unofficial Bitwarden compatible server written in Rust'
-arch=('x86_64')
-url=https://github.com/dani-garcia/vaultwarden
-license=('GPL3')
-depends=('mariadb-libs' 'openssl' 'postgresql-libs' 'sqlite')
-makedepends=('rustup')
-optdepends=('vaultwarden-web: for the web app')
-provides=('bitwarden_rs')
-replaces=('bitwarden_rs')
-backup=('etc/vaultwarden.env')
-options=('!lto')
-install=$pkgname.install
-source=("$url/archive/$pkgver/$pkgname-$pkgver.tar.gz"
-        "$pkgname.service"
-        "$pkgname.sysusers.conf"
-        "$pkgname.tmpfiles")
-b2sums=('398abeb7c84380a49c2b6e734a88d23d0fdbb23dcd2cd7c1ff0b86475ff0785baf65dc82a14f21e101c117429aa778c450b65757c6442908f37a03b0e609d984'
-        'ff8e896f820b88f079d3d4f4c2eb394362569c921f53693e25d3badaf9fdca841e4d7665862e09d22421f544802f3a64014696fd92d7f0b923faf41f8d99e472'
-        '6580cf4031f262638abf11e529e8dfc489197afd6cd616c6a7810741e03c004706a5f9358f825aac6644c0ab6b251627ff988ed68f8264120b3575a655972390'
-        '9cdcd6c997c884eb3c1ad0c9b8cd91e68ec6762a27f9b80a7eb6c0cb1ffa4e500a654da6f17e9f985cc67add154efe737761f74e4e5f72892fc0e9d457314973')
-
-prepare() {
-  cd $pkgname-$pkgver
-
-  # change various defaults
-  sed -i "s,# DATA_FOLDER=data,DATA_FOLDER=/var/lib/$pkgname,
-  s,web-vault/,/usr/share/webapps/$pkgname-web,
-  s,# WEB_VAULT_ENABLED=true,WEB_VAULT_ENABLED=false,
-  s,/path/to/log,/var/log/$pkgname.log,
-  /^# ROCKET_TLS/a ROCKET_LIMITS={json=10485760}" .env.template
-
-  # download dependencies
-  cargo fetch --locked --target "$CARCH-unknown-linux-gnu"
-}
-
-build() {
-  cd $pkgname-$pkgver
-  rustup set profile minimal
-  BWRS_VERSION="$pkgver" cargo build --release --frozen --features sqlite,mysql,postgresql
-}
-
-check() {
-  cd $pkgname-$pkgver
-  cargo test --frozen --features sqlite,mysql,postgresql
-}
-
-package() {
-  # systemd integration
-  install -Dm644 -t "$pkgdir"/usr/lib/systemd/system $pkgname.service
-  install -Dm644 $pkgname.sysusers.conf "$pkgdir"/usr/lib/sysusers.d/$pkgname.conf
-  install -Dm644 $pkgname.tmpfiles "$pkgdir"/usr/lib/tmpfiles.d/$pkgname.conf
-
-  cd $pkgname-$pkgver
-
-  # configuration
-  install -Dm644 .env.template "$pkgdir"/etc/$pkgname.env
-
-  # binary
-  install -Dt "$pkgdir"/usr/bin target/release/$pkgname
-}
-
-# vim:set ts=2 sw=2 et:

Copied: vaultwarden/repos/community-x86_64/PKGBUILD (from rev 1121511, vaultwarden/trunk/PKGBUILD)
===================================================================
--- PKGBUILD	                        (rev 0)
+++ PKGBUILD	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -0,0 +1,70 @@
+# Maintainer: Daniel M. Capella <polyzen at archlinux.org>
+# Maintainer: George Rawlinson <grawlinson at archlinux.org>
+# Contributor: Markus Richter <mqus at disroot dot org>
+# Contributor: Timothée Ravier <tim at siosm.fr
+
+pkgname=vaultwarden
+pkgver=1.24.0
+pkgrel=1
+pkgdesc='Unofficial Bitwarden compatible server written in Rust'
+arch=('x86_64')
+url=https://github.com/dani-garcia/vaultwarden
+license=('GPL3')
+depends=('mariadb-libs' 'openssl' 'postgresql-libs' 'sqlite')
+makedepends=('rustup')
+optdepends=('vaultwarden-web: for the web app')
+provides=('bitwarden_rs')
+replaces=('bitwarden_rs')
+backup=('etc/vaultwarden.env')
+options=('!lto')
+install=$pkgname.install
+source=("$url/archive/$pkgver/$pkgname-$pkgver.tar.gz"
+        "$pkgname.service"
+        "$pkgname.sysusers.conf"
+        "$pkgname.tmpfiles")
+b2sums=('0ef04c950167e4fab268a14f694c9bd1e7b76585cbac34e6c8e6e2bcf45264b23d3fe07d594eadb8a240d7af638d4e9ed2dcbcae6ad8360ed122fa59b66ebcf8'
+        'ff8e896f820b88f079d3d4f4c2eb394362569c921f53693e25d3badaf9fdca841e4d7665862e09d22421f544802f3a64014696fd92d7f0b923faf41f8d99e472'
+        '6580cf4031f262638abf11e529e8dfc489197afd6cd616c6a7810741e03c004706a5f9358f825aac6644c0ab6b251627ff988ed68f8264120b3575a655972390'
+        '9cdcd6c997c884eb3c1ad0c9b8cd91e68ec6762a27f9b80a7eb6c0cb1ffa4e500a654da6f17e9f985cc67add154efe737761f74e4e5f72892fc0e9d457314973')
+
+prepare() {
+  cd $pkgname-$pkgver
+
+  # change various defaults
+  sed -i "s,# DATA_FOLDER=data,DATA_FOLDER=/var/lib/$pkgname,
+  s,web-vault/,/usr/share/webapps/$pkgname-web,
+  s,# WEB_VAULT_ENABLED=true,WEB_VAULT_ENABLED=false,
+  s,/path/to/log,/var/log/$pkgname.log,
+  /^# ROCKET_TLS/a ROCKET_LIMITS={json=10485760}" .env.template
+
+  # download dependencies
+  cargo fetch --locked --target "$CARCH-unknown-linux-gnu"
+}
+
+build() {
+  cd $pkgname-$pkgver
+  rustup set profile minimal
+  BWRS_VERSION="$pkgver" cargo build --release --frozen --features sqlite,mysql,postgresql
+}
+
+check() {
+  cd $pkgname-$pkgver
+  cargo test --frozen --features sqlite,mysql,postgresql
+}
+
+package() {
+  # systemd integration
+  install -Dm644 -t "$pkgdir"/usr/lib/systemd/system $pkgname.service
+  install -Dm644 $pkgname.sysusers.conf "$pkgdir"/usr/lib/sysusers.d/$pkgname.conf
+  install -Dm644 $pkgname.tmpfiles "$pkgdir"/usr/lib/tmpfiles.d/$pkgname.conf
+
+  cd $pkgname-$pkgver
+
+  # configuration
+  install -Dm644 .env.template "$pkgdir"/etc/$pkgname.env
+
+  # binary
+  install -Dt "$pkgdir"/usr/bin target/release/$pkgname
+}
+
+# vim:set ts=2 sw=2 et:

Deleted: vaultwarden.install
===================================================================
--- vaultwarden.install	2022-01-31 23:28:36 UTC (rev 1121511)
+++ vaultwarden.install	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -1,32 +0,0 @@
-post_install() {
-  cat << EOF
-!NOTE!
-  bitwarden_rs is now vaultwarden:
-  https://github.com/dani-garcia/vaultwarden/discussions/1642
-
-  If upgrading from bitwarden_rs, do not to leave around files/directories
-  owned by the old bitwarden_rs user/group before removing the old bitwarden_rs
-  user/group.
-
-Configure the server via its environment variables in /etc/vaultwarden.env.
-
-If vaultwarden is run at ports >1024, you should apply these systemd unit
-options via a drop-in file:
-[Service]
-CapabilityBoundingSet=
-AmbientCapabilities=
-PrivateUsers=yes
-
-If the service produces too much noise in your journal, you can redirect stdout
-to /dev/null (vaultwarden will still also write to /var/log/vaultwarden.log if
-configured to do so):
-[Service]
-StandardOutput=null
-
-Create or edit drop-in file:
-# systemctl edit vaultwarden
-
-Start vaultwarden and enable its systemd service:
-# systemctl enable --now vaultwarden
-EOF
-}

Copied: vaultwarden/repos/community-x86_64/vaultwarden.install (from rev 1121511, vaultwarden/trunk/vaultwarden.install)
===================================================================
--- vaultwarden.install	                        (rev 0)
+++ vaultwarden.install	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -0,0 +1,32 @@
+post_install() {
+  cat << EOF
+!NOTE!
+  bitwarden_rs is now vaultwarden:
+  https://github.com/dani-garcia/vaultwarden/discussions/1642
+
+  If upgrading from bitwarden_rs, do not to leave around files/directories
+  owned by the old bitwarden_rs user/group before removing the old bitwarden_rs
+  user/group.
+
+Configure the server via its environment variables in /etc/vaultwarden.env.
+
+If vaultwarden is run at ports >1024, you should apply these systemd unit
+options via a drop-in file:
+[Service]
+CapabilityBoundingSet=
+AmbientCapabilities=
+PrivateUsers=yes
+
+If the service produces too much noise in your journal, you can redirect stdout
+to /dev/null (vaultwarden will still also write to /var/log/vaultwarden.log if
+configured to do so):
+[Service]
+StandardOutput=null
+
+Create or edit drop-in file:
+# systemctl edit vaultwarden
+
+Start vaultwarden and enable its systemd service:
+# systemctl enable --now vaultwarden
+EOF
+}

Deleted: vaultwarden.service
===================================================================
--- vaultwarden.service	2022-01-31 23:28:36 UTC (rev 1121511)
+++ vaultwarden.service	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -1,54 +0,0 @@
-[Unit]
-Description=Vaultwarden Server
-Documentation=https://github.com/dani-garcia/vaultwarden
-After=network.target
-
-[Service]
-ExecStart=/usr/bin/vaultwarden
-WorkingDirectory=/var/lib/vaultwarden
-User=vaultwarden
-Group=vaultwarden
-
-# Allow vaultwarden to bind ports in the range of 0-1024 and restrict it to
-# that capability
-CapabilityBoundingSet=CAP_NET_BIND_SERVICE
-AmbientCapabilities=CAP_NET_BIND_SERVICE
-
-# If vaultwarden is run at ports >1024, you should apply these options via a
-# drop-in file
-#CapabilityBoundingSet=
-#AmbientCapabilities=
-#PrivateUsers=yes
-
-NoNewPrivileges=yes
-
-LimitNOFILE=1048576
-UMask=0077
-
-ProtectSystem=strict
-ProtectHome=yes
-ReadWritePaths=/var/lib/vaultwarden /var/log/vaultwarden.log
-PrivateTmp=yes
-PrivateDevices=yes
-ProtectHostname=yes
-ProtectClock=yes
-ProtectKernelTunables=yes
-ProtectKernelModules=yes
-ProtectKernelLogs=yes
-ProtectControlGroups=yes
-RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
-RestrictNamespaces=yes
-LockPersonality=yes
-MemoryDenyWriteExecute=yes
-RestrictRealtime=yes
-RestrictSUIDSGID=yes
-RemoveIPC=yes
-
-SystemCallFilter=@system-service
-SystemCallFilter=~@privileged @resources
-SystemCallArchitectures=native
-
-EnvironmentFile=/etc/vaultwarden.env
-
-[Install]
-WantedBy=multi-user.target

Copied: vaultwarden/repos/community-x86_64/vaultwarden.service (from rev 1121511, vaultwarden/trunk/vaultwarden.service)
===================================================================
--- vaultwarden.service	                        (rev 0)
+++ vaultwarden.service	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -0,0 +1,54 @@
+[Unit]
+Description=Vaultwarden Server
+Documentation=https://github.com/dani-garcia/vaultwarden
+After=network.target
+
+[Service]
+ExecStart=/usr/bin/vaultwarden
+WorkingDirectory=/var/lib/vaultwarden
+User=vaultwarden
+Group=vaultwarden
+
+# Allow vaultwarden to bind ports in the range of 0-1024 and restrict it to
+# that capability
+CapabilityBoundingSet=CAP_NET_BIND_SERVICE
+AmbientCapabilities=CAP_NET_BIND_SERVICE
+
+# If vaultwarden is run at ports >1024, you should apply these options via a
+# drop-in file
+#CapabilityBoundingSet=
+#AmbientCapabilities=
+#PrivateUsers=yes
+
+NoNewPrivileges=yes
+
+LimitNOFILE=1048576
+UMask=0077
+
+ProtectSystem=strict
+ProtectHome=yes
+ReadWritePaths=/var/lib/vaultwarden /var/log/vaultwarden.log
+PrivateTmp=yes
+PrivateDevices=yes
+ProtectHostname=yes
+ProtectClock=yes
+ProtectKernelTunables=yes
+ProtectKernelModules=yes
+ProtectKernelLogs=yes
+ProtectControlGroups=yes
+RestrictAddressFamilies=AF_UNIX AF_INET AF_INET6
+RestrictNamespaces=yes
+LockPersonality=yes
+MemoryDenyWriteExecute=yes
+RestrictRealtime=yes
+RestrictSUIDSGID=yes
+RemoveIPC=yes
+
+SystemCallFilter=@system-service
+SystemCallFilter=~@privileged @resources
+SystemCallArchitectures=native
+
+EnvironmentFile=/etc/vaultwarden.env
+
+[Install]
+WantedBy=multi-user.target

Deleted: vaultwarden.sysusers.conf
===================================================================
--- vaultwarden.sysusers.conf	2022-01-31 23:28:36 UTC (rev 1121511)
+++ vaultwarden.sysusers.conf	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -1 +0,0 @@
-u vaultwarden - "vaultwarden user"

Copied: vaultwarden/repos/community-x86_64/vaultwarden.sysusers.conf (from rev 1121511, vaultwarden/trunk/vaultwarden.sysusers.conf)
===================================================================
--- vaultwarden.sysusers.conf	                        (rev 0)
+++ vaultwarden.sysusers.conf	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -0,0 +1 @@
+u vaultwarden - "vaultwarden user"

Deleted: vaultwarden.tmpfiles
===================================================================
--- vaultwarden.tmpfiles	2022-01-31 23:28:36 UTC (rev 1121511)
+++ vaultwarden.tmpfiles	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -1,3 +0,0 @@
-d /var/lib/vaultwarden     0750 vaultwarden vaultwarden
-h /var/lib/vaultwarden     -    -            -            - +C
-f /var/log/vaultwarden.log 0640 vaultwarden vaultwarden

Copied: vaultwarden/repos/community-x86_64/vaultwarden.tmpfiles (from rev 1121511, vaultwarden/trunk/vaultwarden.tmpfiles)
===================================================================
--- vaultwarden.tmpfiles	                        (rev 0)
+++ vaultwarden.tmpfiles	2022-01-31 23:29:47 UTC (rev 1121512)
@@ -0,0 +1,3 @@
+d /var/lib/vaultwarden     0750 vaultwarden vaultwarden
+h /var/lib/vaultwarden     -    -            -            - +C
+f /var/log/vaultwarden.log 0640 vaultwarden vaultwarden



More information about the arch-commits mailing list