Date: Thursday, October 13, 2022 @ 14:00:26
  Author: dvzrv
Revision: 1327974

archrelease: copy trunk to community-testing-x86_64

Added:
  unbound/repos/community-testing-x86_64/
  unbound/repos/community-testing-x86_64/PKGBUILD
    (from rev 1327973, unbound/trunk/PKGBUILD)
  unbound/repos/community-testing-x86_64/keys/
  unbound/repos/community-testing-x86_64/unbound-1.14.0-trust_anchor_file.patch
    (from rev 1327973, unbound/trunk/unbound-1.14.0-trust_anchor_file.patch)
  unbound/repos/community-testing-x86_64/unbound-sysusers.conf
    (from rev 1327973, unbound/trunk/unbound-sysusers.conf)
  unbound/repos/community-testing-x86_64/unbound-tmpfiles.conf
    (from rev 1327973, unbound/trunk/unbound-tmpfiles.conf)
  unbound/repos/community-testing-x86_64/unbound-trusted-key.hook
    (from rev 1327973, unbound/trunk/unbound-trusted-key.hook)

----------------------------------------+
 PKGBUILD                               |   95 +++++++++++++++++++++++++++++++
 unbound-1.14.0-trust_anchor_file.patch |   12 +++
 unbound-sysusers.conf                  |    1 
 unbound-tmpfiles.conf                  |    1 
 unbound-trusted-key.hook               |   10 +++
 5 files changed, 119 insertions(+)

Copied: unbound/repos/community-testing-x86_64/PKGBUILD (from rev 1327973, 
unbound/trunk/PKGBUILD)
===================================================================
--- community-testing-x86_64/PKGBUILD                           (rev 0)
+++ community-testing-x86_64/PKGBUILD   2022-10-13 14:00:26 UTC (rev 1327974)
@@ -0,0 +1,95 @@
+# Maintainer: David Runge <[email protected]>
+# Maintainer: Bruno Pagani <[email protected]>
+# Maintainer: T.J. Townsend <[email protected]>
+# Contributor: Gaetan Bisson <[email protected]>
+# Contributor: Hisato Tatekura <[email protected]>
+# Contributor: Massimiliano Torromeo <massimiliano DOT torromeo AT google mail 
service>
+
+pkgname=unbound
+pkgver=1.17.0
+pkgrel=1
+pkgdesc="Validating, recursive, and caching DNS resolver"
+arch=(x86_64)
+url="https://unbound.net/";
+license=(BSD)
+depends=(dnssec-anchors fstrm hiredis ldns libevent libnghttp2 libsodium 
openssl)
+makedepends=(expat protobuf-c python swig systemd)
+optdepends=(
+  'expat: for unbound-anchor'
+  'sh: for unbound-control-setup'
+  'python: for python-bindings'
+)
+provides=(libunbound.so)
+backup=(etc/$pkgname/$pkgname.conf)
+source=(
+  https://unbound.net/downloads/$pkgname-$pkgver.tar.gz{,.asc}
+  $pkgname-1.14.0-trust_anchor_file.patch
+  $pkgname-sysusers.conf
+  $pkgname-tmpfiles.conf
+  $pkgname-trusted-key.hook
+)
+sha512sums=('f6b9f279330fb19b5feca09524959940aad8c4e064528aa82b369c726d77e9e8e5ca23f366f6e9edcf2c061b96f482ed7a2c26ac70fc15ae5762b3d7e36a5284'
+            'SKIP'
+            
'9590d3d459d96f99cbc7482fae0f5318dd22a034e45cff18079e4f3c9f9c3c1d7af90cdd5353fb469eac08c535555fd164097b496286b807b2117e8a3a6cd304'
+            
'ef71d4e9b0eb0cc602d66bd0573d9424578fe33ef28a852c582d56f0fd34fdd63046c365ef7aed8b84a461b81254240af7ad3fd539da72f9587817d21bd6c585'
+            
'6b1849ae9d7cf427f6fa6cd0590e8f8c3f06210d2d6795e543b0f325a9e866db0f5db2275a29fa90f688783c0dd16f19c8a49a9817d5f5444e13f8f2df3ff712'
+            
'613826cdf5ab6e77f2805fa2aa65272508dcd11090add1961b3df6dfac3b67db016bc9f45fbcf0ef0de82b2d602c153d5263a488027a6cf13a72680b581b266d')
+b2sums=('611c1b96ff84e6dd8f7a592135cc17f416cd810d0f35d27c8cedd56af069badd8dca112cc5927a1fe50ec3335c377b6bd6fc4e1a6d63a332a90d676e3c23dcef'
+        'SKIP'
+        
'0978ab5c0474ed29de9c0904a46d114413e094dafeadaac4f10cdbc19e4152fcc064d7cdb8c331da7c2531075aa699326b84e21da1a8218a6f00a10f0e107b3d'
+        
'292a3c2e5fde292a03b6c9b2ddabd5089f52e73b50a404c3d9f54c1a43184924b661a21eea61cc521c594c1005a3b40b630fa585a38195c61298f9b24b248b92'
+        
'd3951006b43068be904c6b91a9e0563d56228225854e12b40abbdd4ba9b47338e97265837297a6de879acbc8051bb749163f9457683f5e12fc29ac2e7b687fd3'
+        
'd28785390eb6c125bd26ca11f097fe8864b080482157deeb7c70e9bee47ff2844abaed574db59a7c152ed3ec0acba05cfee4c3751f7a9f553320b064578f86c7')
+validpgpkeys=(EDFAA3F2CA4E6EB05681AF8E9F6F1C2D7E045F8D) # W.C.A. Wijngaards 
<[email protected]>
+
+prepare() {
+  # enable trusted-anchor-file and set it to an unbound specific location
+  patch -p1 -d $pkgname-$pkgver -i ../$pkgname-1.14.0-trust_anchor_file.patch
+  cd $pkgname-$pkgver
+  autoreconf -fiv
+}
+
+build() {
+  cd $pkgname-$pkgver
+  ./configure \
+    --prefix=/usr \
+    --sysconfdir=/etc \
+    --localstatedir=/var \
+    --sbindir=/usr/bin \
+    --disable-rpath \
+    --enable-dnscrypt \
+    --enable-dnstap \
+    --enable-pie \
+    --enable-relro-now \
+    --enable-subnet \
+    --enable-systemd \
+    --enable-tfo-client \
+    --enable-tfo-server \
+    --enable-cachedb \
+    --with-libhiredis \
+    --with-conf-file=/etc/unbound/unbound.conf \
+    --with-pidfile=/run/unbound.pid \
+    --with-rootkey-file=/etc/trusted-key.key \
+    --with-libevent \
+    --with-libnghttp2 \
+    --with-pyunbound
+  # prevent excessive overlinking due to libtool
+  sed -i -e 's/ -shared / -Wl,-O1,--as-needed\0/g' libtool
+  make
+}
+
+check() {
+  make -k check -C $pkgname-$pkgver
+}
+
+package() {
+  depends+=(libprotobuf-c.so libsystemd.so)
+
+  make DESTDIR="$pkgdir" install -C $pkgname-$pkgver
+  install -vDm 644 $pkgname-$pkgver/contrib/$pkgname.service -t 
"$pkgdir/usr/lib/systemd/system/"
+  install -vDm 644 $pkgname-$pkgver/LICENSE -t 
"$pkgdir/usr/share/licenses/$pkgname/"
+  install -vDm 644 $pkgname-sysusers.conf 
"$pkgdir/usr/lib/sysusers.d/$pkgname.conf"
+  install -vDm 644 $pkgname-tmpfiles.conf 
"$pkgdir/usr/lib/tmpfiles.d/$pkgname.conf"
+  # libalpm hook to copy the dnssec-anchors provided key to /etc/unbound
+  install -vDm 644 unbound-trusted-key.hook -t 
"$pkgdir/usr/share/libalpm/hooks/"
+}

Copied: 
unbound/repos/community-testing-x86_64/unbound-1.14.0-trust_anchor_file.patch 
(from rev 1327973, unbound/trunk/unbound-1.14.0-trust_anchor_file.patch)
===================================================================
--- community-testing-x86_64/unbound-1.14.0-trust_anchor_file.patch             
                (rev 0)
+++ community-testing-x86_64/unbound-1.14.0-trust_anchor_file.patch     
2022-10-13 14:00:26 UTC (rev 1327974)
@@ -0,0 +1,12 @@
+diff -ruN a/doc/example.conf.in b/doc/example.conf.in
+--- a/doc/example.conf.in      2021-12-09 08:55:44.000000000 +0100
++++ b/doc/example.conf.in      2021-12-11 23:42:13.542310886 +0100
+@@ -533,7 +533,7 @@
+       # with several entries, one file per entry.
+       # Zone file format, with DS and DNSKEY entries.
+       # Note this gets out of date, use auto-trust-anchor-file please.
+-      # trust-anchor-file: ""
++      trust-anchor-file: "/etc/unbound/trusted-key.key"
+ 
+       # Trusted key for validation. DS or DNSKEY. specify the RR on a
+       # single line, surrounded by "". TTL is ignored. class is IN default.

Copied: unbound/repos/community-testing-x86_64/unbound-sysusers.conf (from rev 
1327973, unbound/trunk/unbound-sysusers.conf)
===================================================================
--- community-testing-x86_64/unbound-sysusers.conf                              
(rev 0)
+++ community-testing-x86_64/unbound-sysusers.conf      2022-10-13 14:00:26 UTC 
(rev 1327974)
@@ -0,0 +1 @@
+u unbound - "unbound" /etc/unbound

Copied: unbound/repos/community-testing-x86_64/unbound-tmpfiles.conf (from rev 
1327973, unbound/trunk/unbound-tmpfiles.conf)
===================================================================
--- community-testing-x86_64/unbound-tmpfiles.conf                              
(rev 0)
+++ community-testing-x86_64/unbound-tmpfiles.conf      2022-10-13 14:00:26 UTC 
(rev 1327974)
@@ -0,0 +1 @@
+C /etc/unbound/trusted-key.key - - - - /etc/trusted-key.key

Copied: unbound/repos/community-testing-x86_64/unbound-trusted-key.hook (from 
rev 1327973, unbound/trunk/unbound-trusted-key.hook)
===================================================================
--- community-testing-x86_64/unbound-trusted-key.hook                           
(rev 0)
+++ community-testing-x86_64/unbound-trusted-key.hook   2022-10-13 14:00:26 UTC 
(rev 1327974)
@@ -0,0 +1,10 @@
+[Trigger]
+Type = Path
+Target = etc/trusted-key.key
+Operation = Install
+Operation = Upgrade
+
+[Action]
+Description = Updating trusted-key.key for unbound...
+When = PostTransaction
+Exec = /bin/cp -f /etc/trusted-key.key /etc/unbound/

Reply via email to