Date: Wednesday, February 8, 2023 @ 12:14:29
  Author: dvzrv
Revision: 1396058

archrelease: copy trunk to community-testing-x86_64

Added:
  dnscrypt-proxy/repos/community-testing-x86_64/PKGBUILD
    (from rev 1396057, dnscrypt-proxy/trunk/PKGBUILD)
  dnscrypt-proxy/repos/community-testing-x86_64/dnscrypt-proxy.service
    (from rev 1396057, dnscrypt-proxy/trunk/dnscrypt-proxy.service)
  dnscrypt-proxy/repos/community-testing-x86_64/dnscrypt-proxy.socket
    (from rev 1396057, dnscrypt-proxy/trunk/dnscrypt-proxy.socket)
  dnscrypt-proxy/repos/community-testing-x86_64/keys/
Deleted:
  dnscrypt-proxy/repos/community-testing-x86_64/PKGBUILD
  dnscrypt-proxy/repos/community-testing-x86_64/dnscrypt-proxy.service
  dnscrypt-proxy/repos/community-testing-x86_64/dnscrypt-proxy.socket
  dnscrypt-proxy/repos/community-testing-x86_64/keys/

------------------------+
 PKGBUILD               |  148 +++++++++++++++++++++++------------------------
 dnscrypt-proxy.service |   70 +++++++++++-----------
 dnscrypt-proxy.socket  |   32 +++++-----
 3 files changed, 125 insertions(+), 125 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD    2023-02-08 12:14:12 UTC (rev 1396057)
+++ PKGBUILD    2023-02-08 12:14:29 UTC (rev 1396058)
@@ -1,74 +0,0 @@
-# Maintainer: David Runge <[email protected]>
-# Contributor: Felix Yan <[email protected]>
-# Contributor: Techlive Zheng <techlivezheng at gmail dot com>
-# Contributor: peace4all <markspost at rocketmail dot com>
-
-pkgname=dnscrypt-proxy
-pkgver=2.1.3
-_commit=edc73a4083587c311699b81e37fc796dc066eb10  # refs/tags/2.1.3
-pkgrel=2
-pkgdesc="A flexible DNS proxy, with support for encrypted DNS protocols"
-arch=(x86_64)
-url="https://github.com/DNSCrypt/dnscrypt-proxy";
-license=(ISC)
-depends=(glibc)
-makedepends=(git go)
-optdepends=('python-urllib3: for generate-domains-blocklist')
-backup=(
-  etc/$pkgname/$pkgname.toml
-  etc/$pkgname/allowed-ips.txt
-  etc/$pkgname/allowed-names.txt
-  etc/$pkgname/blocked-ips.txt
-  etc/$pkgname/blocked-names.txt
-  etc/$pkgname/cloaking-rules.txt
-  etc/$pkgname/forwarding-rules.txt
-)
-source=(
-  git+https://github.com/dnscrypt/$pkgname#tag=$_commit?signed
-  $pkgname.service
-  $pkgname.socket
-  
$pkgname-$pkgver-configuration.patch::https://github.com/dvzrv/dnscrypt-proxy/commit/4589ad77802b17bf781d6a625afb2e2775e1fb9a.patch
-)
-sha512sums=('SKIP'
-            
'6dd1ad7946c8903e0b91658a3680d5cd8d89e8c2177d23ad97b166312fbab649a22599542c94612dec46329e3bba3a55d1488b5228705a85c38565b7dfea54a5'
-            
'56a56e87032da9316b392b0613124b0743673041596c717005541ae9b3994c7fc16c02497ea773d321f45d8e0f9ea8fda00783062cef4d5c8277b5b6f7cb10d5'
-            
'f029f2b30db3d44c17350b736e558cdaaa2e8c7b5a36bf738f613a9a506047cd3f720881e2e957902d41cb4d20e6a252c97976f542bf552213039c54c9f731bb')
-validpgpkeys=('54A2B8892CC3D6A597B92B6C210627AABA709FE1') # Frank Denis 
(Jedi/Sector One) <[email protected]
-
-prepare() {
-  cd $pkgname
-  patch -Np1 -i ../$pkgname-$pkgver-configuration.patch
-}
-
-build() {
-  cd $pkgname/$pkgname
-  export CGO_CPPFLAGS="$CPPFLAGS"
-  export CGO_CFLAGS="$CFLAGS"
-  export CGO_CXXFLAGS="$CXXFLAGS"
-  export CGO_LDFLAGS="$LDFLAGS"
-  export GOFLAGS="-buildmode=pie -trimpath -ldflags=-linkmode=external 
-mod=readonly -modcacherw"
-  go build
-}
-
-package() {
-  local _config
-
-  cd $pkgname
-  # executable
-  install -vDm 755 $pkgname/$pkgname -t "$pkgdir/usr/bin/"
-  # config files
-  install -vDm 644 $pkgname/example-$pkgname.toml 
"$pkgdir/etc/$pkgname/$pkgname.toml"
-  for _config in 
{{allowed,blocked}-{ips,names},{cloaking,forwarding}-rules,captive-portals}.txt;
 do
-    install -vDm 644 $pkgname/example-$_config "$pkgdir/etc/$pkgname/$_config"
-  done
-  # utils
-  install -vDm 644 utils/generate-domains-blocklist/*.{conf,txt} -t 
"$pkgdir/usr/share/$pkgname/utils/generate-domains-blocklist"
-  install -vDm 755 
utils/generate-domains-blocklist/generate-domains-blocklist.py 
"$pkgdir/usr/bin/generate-domains-blocklist"
-  # systemd service/socket
-  install -vDm 644 ../$pkgname.{service,socket} -t 
"$pkgdir/usr/lib/systemd/system/"
-  # license
-  install -vDm 644 LICENSE -t "$pkgdir/usr/share/licenses/$pkgname"
-  # docs
-  install -vDm 644 {ChangeLog,README.md} -t "$pkgdir/usr/share/doc/$pkgname"
-}
-# vim:set ts=2 sw=2 et:

Copied: dnscrypt-proxy/repos/community-testing-x86_64/PKGBUILD (from rev 
1396057, dnscrypt-proxy/trunk/PKGBUILD)
===================================================================
--- PKGBUILD                            (rev 0)
+++ PKGBUILD    2023-02-08 12:14:29 UTC (rev 1396058)
@@ -0,0 +1,74 @@
+# Maintainer: David Runge <[email protected]>
+# Contributor: Felix Yan <[email protected]>
+# Contributor: Techlive Zheng <techlivezheng at gmail dot com>
+# Contributor: peace4all <markspost at rocketmail dot com>
+
+pkgname=dnscrypt-proxy
+pkgver=2.1.4
+_commit=8e043f435d919912e46ac9b7d2beddcfdc8aab70  # refs/tags/2.1.4
+pkgrel=1
+pkgdesc="A flexible DNS proxy, with support for encrypted DNS protocols"
+arch=(x86_64)
+url="https://github.com/DNSCrypt/dnscrypt-proxy";
+license=(ISC)
+depends=(glibc)
+makedepends=(git go)
+optdepends=('python-urllib3: for generate-domains-blocklist')
+backup=(
+  etc/$pkgname/$pkgname.toml
+  etc/$pkgname/allowed-ips.txt
+  etc/$pkgname/allowed-names.txt
+  etc/$pkgname/blocked-ips.txt
+  etc/$pkgname/blocked-names.txt
+  etc/$pkgname/cloaking-rules.txt
+  etc/$pkgname/forwarding-rules.txt
+)
+source=(
+  git+https://github.com/dnscrypt/$pkgname#tag=$_commit?signed
+  $pkgname.service
+  $pkgname.socket
+  
$pkgname-$pkgver-configuration.patch::https://github.com/dvzrv/dnscrypt-proxy/commit/4589ad77802b17bf781d6a625afb2e2775e1fb9a.patch
+)
+sha512sums=('SKIP'
+            
'6dd1ad7946c8903e0b91658a3680d5cd8d89e8c2177d23ad97b166312fbab649a22599542c94612dec46329e3bba3a55d1488b5228705a85c38565b7dfea54a5'
+            
'56a56e87032da9316b392b0613124b0743673041596c717005541ae9b3994c7fc16c02497ea773d321f45d8e0f9ea8fda00783062cef4d5c8277b5b6f7cb10d5'
+            
'ea01583a68411b2f2147ff51f1ba96999ff047ecbc8ed15495804a924a4fb0aa2700d9256c6f80ceeafc0083d957e412195a6a6b4f9e35d75d7343c53974ee08')
+validpgpkeys=('54A2B8892CC3D6A597B92B6C210627AABA709FE1') # Frank Denis 
(Jedi/Sector One) <[email protected]
+
+prepare() {
+  cd $pkgname
+  patch -Np1 -i ../$pkgname-$pkgver-configuration.patch
+}
+
+build() {
+  cd $pkgname/$pkgname
+  export CGO_CPPFLAGS="$CPPFLAGS"
+  export CGO_CFLAGS="$CFLAGS"
+  export CGO_CXXFLAGS="$CXXFLAGS"
+  export CGO_LDFLAGS="$LDFLAGS"
+  export GOFLAGS="-buildmode=pie -trimpath -ldflags=-linkmode=external 
-mod=readonly -modcacherw"
+  go build
+}
+
+package() {
+  local _config
+
+  cd $pkgname
+  # executable
+  install -vDm 755 $pkgname/$pkgname -t "$pkgdir/usr/bin/"
+  # config files
+  install -vDm 644 $pkgname/example-$pkgname.toml 
"$pkgdir/etc/$pkgname/$pkgname.toml"
+  for _config in 
{{allowed,blocked}-{ips,names},{cloaking,forwarding}-rules,captive-portals}.txt;
 do
+    install -vDm 644 $pkgname/example-$_config "$pkgdir/etc/$pkgname/$_config"
+  done
+  # utils
+  install -vDm 644 utils/generate-domains-blocklist/*.{conf,txt} -t 
"$pkgdir/usr/share/$pkgname/utils/generate-domains-blocklist"
+  install -vDm 755 
utils/generate-domains-blocklist/generate-domains-blocklist.py 
"$pkgdir/usr/bin/generate-domains-blocklist"
+  # systemd service/socket
+  install -vDm 644 ../$pkgname.{service,socket} -t 
"$pkgdir/usr/lib/systemd/system/"
+  # license
+  install -vDm 644 LICENSE -t "$pkgdir/usr/share/licenses/$pkgname"
+  # docs
+  install -vDm 644 {ChangeLog,README.md} -t "$pkgdir/usr/share/doc/$pkgname"
+}
+# vim:set ts=2 sw=2 et:

Deleted: dnscrypt-proxy.service
===================================================================
--- dnscrypt-proxy.service      2023-02-08 12:14:12 UTC (rev 1396057)
+++ dnscrypt-proxy.service      2023-02-08 12:14:29 UTC (rev 1396058)
@@ -1,35 +0,0 @@
-[Unit]
-Description=DNSCrypt-proxy client
-Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
-Wants=network-online.target nss-lookup.target
-Before=nss-lookup.target
-
-[Service]
-AmbientCapabilities=CAP_NET_BIND_SERVICE
-CacheDirectory=dnscrypt-proxy
-CapabilityBoundingSet=CAP_NET_BIND_SERVICE
-DynamicUser=yes
-ExecStart=/usr/bin/dnscrypt-proxy --config 
/etc/dnscrypt-proxy/dnscrypt-proxy.toml
-LockPersonality=yes
-LogsDirectory=dnscrypt-proxy
-MemoryDenyWriteExecute=true
-NonBlocking=true
-NoNewPrivileges=true
-PrivateDevices=true
-ProtectControlGroups=yes
-ProtectHome=yes
-ProtectHostname=yes
-ProtectKernelLogs=yes
-ProtectKernelModules=yes
-ProtectKernelTunables=yes
-ProtectSystem=strict
-RestrictAddressFamilies=AF_INET AF_INET6
-RestrictNamespaces=true
-RestrictRealtime=true
-RuntimeDirectory=dnscrypt-proxy
-StateDirectory=dnscrypt-proxy
-SystemCallArchitectures=native
-SystemCallFilter=@system-service
-
-[Install]
-WantedBy=multi-user.target

Copied: dnscrypt-proxy/repos/community-testing-x86_64/dnscrypt-proxy.service 
(from rev 1396057, dnscrypt-proxy/trunk/dnscrypt-proxy.service)
===================================================================
--- dnscrypt-proxy.service                              (rev 0)
+++ dnscrypt-proxy.service      2023-02-08 12:14:29 UTC (rev 1396058)
@@ -0,0 +1,35 @@
+[Unit]
+Description=DNSCrypt-proxy client
+Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
+Wants=network-online.target nss-lookup.target
+Before=nss-lookup.target
+
+[Service]
+AmbientCapabilities=CAP_NET_BIND_SERVICE
+CacheDirectory=dnscrypt-proxy
+CapabilityBoundingSet=CAP_NET_BIND_SERVICE
+DynamicUser=yes
+ExecStart=/usr/bin/dnscrypt-proxy --config 
/etc/dnscrypt-proxy/dnscrypt-proxy.toml
+LockPersonality=yes
+LogsDirectory=dnscrypt-proxy
+MemoryDenyWriteExecute=true
+NonBlocking=true
+NoNewPrivileges=true
+PrivateDevices=true
+ProtectControlGroups=yes
+ProtectHome=yes
+ProtectHostname=yes
+ProtectKernelLogs=yes
+ProtectKernelModules=yes
+ProtectKernelTunables=yes
+ProtectSystem=strict
+RestrictAddressFamilies=AF_INET AF_INET6
+RestrictNamespaces=true
+RestrictRealtime=true
+RuntimeDirectory=dnscrypt-proxy
+StateDirectory=dnscrypt-proxy
+SystemCallArchitectures=native
+SystemCallFilter=@system-service
+
+[Install]
+WantedBy=multi-user.target

Deleted: dnscrypt-proxy.socket
===================================================================
--- dnscrypt-proxy.socket       2023-02-08 12:14:12 UTC (rev 1396057)
+++ dnscrypt-proxy.socket       2023-02-08 12:14:29 UTC (rev 1396058)
@@ -1,16 +0,0 @@
-[Unit]
-Description=DNSCrypt-proxy socket
-Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
-Before=nss-lookup.target
-Wants=nss-lookup.target network-online.target
-
-[Socket]
-ListenStream=127.0.0.1:53
-ListenDatagram=127.0.0.1:53
-ListenStream=[::1]:53
-ListenDatagram=[::1]:53
-NoDelay=true
-DeferAcceptSec=1
-
-[Install]
-WantedBy=sockets.target

Copied: dnscrypt-proxy/repos/community-testing-x86_64/dnscrypt-proxy.socket 
(from rev 1396057, dnscrypt-proxy/trunk/dnscrypt-proxy.socket)
===================================================================
--- dnscrypt-proxy.socket                               (rev 0)
+++ dnscrypt-proxy.socket       2023-02-08 12:14:29 UTC (rev 1396058)
@@ -0,0 +1,16 @@
+[Unit]
+Description=DNSCrypt-proxy socket
+Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
+Before=nss-lookup.target
+Wants=nss-lookup.target network-online.target
+
+[Socket]
+ListenStream=127.0.0.1:53
+ListenDatagram=127.0.0.1:53
+ListenStream=[::1]:53
+ListenDatagram=[::1]:53
+NoDelay=true
+DeferAcceptSec=1
+
+[Install]
+WantedBy=sockets.target

Reply via email to