Date: Monday, November 7, 2022 @ 19:15:14
Author: hashworks
Revision: 1345840
archrelease: copy trunk to community-x86_64
Added:
wireproxy/repos/community-x86_64/PKGBUILD
(from rev 1345839, wireproxy/trunk/PKGBUILD)
wireproxy/repos/community-x86_64/wireproxy-user.service
(from rev 1345839, wireproxy/trunk/wireproxy-user.service)
wireproxy/repos/community-x86_64/[email protected]
(from rev 1345839, wireproxy/trunk/[email protected])
wireproxy/repos/community-x86_64/wireproxy.service
(from rev 1345839, wireproxy/trunk/wireproxy.service)
wireproxy/repos/community-x86_64/wireproxy.sysusers
(from rev 1345839, wireproxy/trunk/wireproxy.sysusers)
wireproxy/repos/community-x86_64/wireproxy.tmpfiles
(from rev 1345839, wireproxy/trunk/wireproxy.tmpfiles)
wireproxy/repos/community-x86_64/[email protected]
(from rev 1345839, wireproxy/trunk/[email protected])
-------------------------+
PKGBUILD | 57 ++++++++++++++++++++++++++++++++++++++++++++++
wireproxy-user.service | 12 +++++++++
[email protected] | 12 +++++++++
wireproxy.service | 23 ++++++++++++++++++
wireproxy.sysusers | 1
wireproxy.tmpfiles | 1
[email protected] | 23 ++++++++++++++++++
7 files changed, 129 insertions(+)
Copied: wireproxy/repos/community-x86_64/PKGBUILD (from rev 1345839,
wireproxy/trunk/PKGBUILD)
===================================================================
--- PKGBUILD (rev 0)
+++ PKGBUILD 2022-11-07 19:15:14 UTC (rev 1345840)
@@ -0,0 +1,57 @@
+# Maintainer: Justin Kromlinger <[email protected]>
+# Contributor: Ivan <[email protected]>
+
+pkgname=wireproxy
+pkgver=1.0.5
+pkgrel=3
+arch=(x86_64)
+license=(ISC)
+url="https://github.com/octeep/wireproxy"
+pkgdesc="Wireguard client that exposes itself as a socks5 proxy"
+depends=('glibc')
+makedepends=('go')
+source=("${pkgname}-${pkgver}.tar.gz::${url}/archive/refs/tags/v${pkgver}.tar.gz"
+ "${pkgname}.sysusers"
+ "${pkgname}.tmpfiles"
+ "${pkgname}.service"
+ "${pkgname}@.service"
+ "${pkgname}-user.service"
+ "${pkgname}[email protected]")
+sha256sums=('3779a157713b462a7b5322f1437f768ab69ae446df0ceca76c6dff7c4030e425'
+ '24a30e40d3fb5d79b81b2028b17533abf1e27cb9684035ba19c639f6c45907d2'
+ 'ab9a59d0f200371aee18abc93653cf8f9504063d14ae08e289b90f711e559735'
+ '2386e40a6b1999341907262abc0f6e62d9a2d02706a497d619664b4c43cf852f'
+ 'b72ca8f8716d2eea9eb782ffa11942e6a44b2e8e9ec7b60e96565b8f29731276'
+ '9c136bca0f65070f450ce942be7cd48254a385ed2a286f792d22ab74bb9a29a2'
+ 'fae5f0e1669d05d10b13a00031132c9bde8cc9b3e22fc91154edd5c01d750ef3')
+
+build() {
+ cd "${pkgname}-${pkgver}"
+
+ export CGO_CFLAGS="${CFLAGS}"
+ export CGO_CPPFLAGS="${CPPFLAGS}"
+ export CGO_CXXFLAGS="${CXXFLAGS}"
+ export CGO_LDFLAGS="${LDFLAGS}"
+
+ go build -v \
+ -buildmode=pie \
+ -trimpath \
+ -mod=readonly \
+ -modcacherw \
+ -ldflags "-linkmode=external \
+ -X main.version=${pkgver}" \
+ -o "${pkgname}" \
+ "./cmd/${pkgname}"
+}
+
+package() {
+ install -Dm0644 "${pkgname}.sysusers"
"${pkgdir}/usr/lib/sysusers.d/${pkgname}.conf"
+ install -Dm0644 "${pkgname}.tmpfiles"
"${pkgdir}/usr/lib/tmpfiles.d/${pkgname}.conf"
+ install -Dm0644 "${pkgname}.service" "${pkgname}@.service" -t
"${pkgdir}/usr/lib/systemd/system/"
+ install -Dm0644 "${pkgname}-user.service"
"${pkgdir}/usr/lib/systemd/user/${pkgname}.service"
+ install -Dm0644 "${pkgname}[email protected]"
"${pkgdir}/usr/lib/systemd/user/${pkgname}@.service"
+
+ cd "${pkgname}-${pkgver}"
+ install -Dm0755 "${pkgname}" "${pkgdir}/usr/bin/${pkgname}"
+ install -Dm0644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+}
Copied: wireproxy/repos/community-x86_64/wireproxy-user.service (from rev
1345839, wireproxy/trunk/wireproxy-user.service)
===================================================================
--- wireproxy-user.service (rev 0)
+++ wireproxy-user.service 2022-11-07 19:15:14 UTC (rev 1345840)
@@ -0,0 +1,12 @@
+[Unit]
+Description=wireproxy Service
+Documentation=https://github.com/octeep/wireproxy
+After=network.target nss-lookup.target
+
+[Service]
+ExecStartPre=/usr/bin/wireproxy --configtest --config
%h/.config/wireproxy/proxy.conf
+ExecStart=/usr/bin/wireproxy --config %h/.config/wireproxy/proxy.conf
+Restart=on-failure
+
+[Install]
+WantedBy=default.target
Copied: wireproxy/repos/community-x86_64/[email protected] (from rev
1345839, wireproxy/trunk/[email protected])
===================================================================
--- [email protected] (rev 0)
+++ [email protected] 2022-11-07 19:15:14 UTC (rev 1345840)
@@ -0,0 +1,12 @@
+[Unit]
+Description=wireproxy Service
+Documentation=https://github.com/octeep/wireproxy
+After=network.target nss-lookup.target
+
+[Service]
+ExecStartPre=/usr/bin/wireproxy --configtest --config
%h/.config/wireproxy/%i.conf
+ExecStart=/usr/bin/wireproxy --config %h/.config/wireproxy/%i.conf
+Restart=on-failure
+
+[Install]
+WantedBy=default.target
Copied: wireproxy/repos/community-x86_64/wireproxy.service (from rev 1345839,
wireproxy/trunk/wireproxy.service)
===================================================================
--- wireproxy.service (rev 0)
+++ wireproxy.service 2022-11-07 19:15:14 UTC (rev 1345840)
@@ -0,0 +1,23 @@
+[Unit]
+Description=wireproxy Service
+Documentation=https://github.com/octeep/wireproxy
+After=network.target nss-lookup.target
+
+[Service]
+User=wireproxy
+Group=wireproxy
+ProtectSystem=strict
+RemoveIPC=true
+PrivateTmp=true
+ProtectHome=true
+ProtectProc=true
+PrivateUsers=true
+NoNewPrivileges=true
+AmbientCapabilities=CAP_NET_BIND_SERVICE
+CapabilityBoundingSet=CAP_NET_BIND_SERVICE
+ExecStartPre=/usr/bin/wireproxy --configtest --config /etc/wireproxy/proxy.conf
+ExecStart=/usr/bin/wireproxy --config /etc/wireproxy/proxy.conf
+Restart=on-failure
+
+[Install]
+WantedBy=multi-user.target
Copied: wireproxy/repos/community-x86_64/wireproxy.sysusers (from rev 1345839,
wireproxy/trunk/wireproxy.sysusers)
===================================================================
--- wireproxy.sysusers (rev 0)
+++ wireproxy.sysusers 2022-11-07 19:15:14 UTC (rev 1345840)
@@ -0,0 +1 @@
+u wireproxy - "Wireproxy daemon" /
Copied: wireproxy/repos/community-x86_64/wireproxy.tmpfiles (from rev 1345839,
wireproxy/trunk/wireproxy.tmpfiles)
===================================================================
--- wireproxy.tmpfiles (rev 0)
+++ wireproxy.tmpfiles 2022-11-07 19:15:14 UTC (rev 1345840)
@@ -0,0 +1 @@
+d /etc/wireproxy 0750 wireproxy wireproxy - -
Copied: wireproxy/repos/community-x86_64/[email protected] (from rev 1345839,
wireproxy/trunk/[email protected])
===================================================================
--- [email protected] (rev 0)
+++ [email protected] 2022-11-07 19:15:14 UTC (rev 1345840)
@@ -0,0 +1,23 @@
+[Unit]
+Description=wireproxy Service
+Documentation=https://github.com/octeep/wireproxy
+After=network.target nss-lookup.target
+
+[Service]
+User=wireproxy
+Group=wireproxy
+ProtectSystem=strict
+RemoveIPC=true
+PrivateTmp=true
+ProtectHome=true
+ProtectProc=true
+PrivateUsers=true
+NoNewPrivileges=true
+AmbientCapabilities=CAP_NET_BIND_SERVICE
+CapabilityBoundingSet=CAP_NET_BIND_SERVICE
+ExecStartPre=/usr/bin/wireproxy --configtest --config /etc/wireproxy/%i.conf
+ExecStart=/usr/bin/wireproxy --config /etc/wireproxy/%i.conf
+Restart=on-failure
+
+[Install]
+WantedBy=multi-user.target