Date: Tuesday, February 14, 2023 @ 19:23:33
  Author: dvzrv
Revision: 1400488

archrelease: copy trunk to community-x86_64

Added:
  dnscrypt-proxy/repos/community-x86_64/PKGBUILD
    (from rev 1400487, dnscrypt-proxy/trunk/PKGBUILD)
  dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.service
    (from rev 1400487, dnscrypt-proxy/trunk/dnscrypt-proxy.service)
  dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.socket
    (from rev 1400487, dnscrypt-proxy/trunk/dnscrypt-proxy.socket)
  dnscrypt-proxy/repos/community-x86_64/keys/
Deleted:
  dnscrypt-proxy/repos/community-x86_64/PKGBUILD
  dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.install
  dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.service
  dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.socket
  dnscrypt-proxy/repos/community-x86_64/keys/

------------------------+
 PKGBUILD               |  152 +++++++++++++++++++++++------------------------
 dnscrypt-proxy.install |    9 --
 dnscrypt-proxy.service |   72 ++++++++++------------
 dnscrypt-proxy.socket  |   32 ++++-----
 4 files changed, 127 insertions(+), 138 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD    2023-02-14 19:22:54 UTC (rev 1400487)
+++ PKGBUILD    2023-02-14 19:23:33 UTC (rev 1400488)
@@ -1,76 +0,0 @@
-# Maintainer: David Runge <[email protected]>
-# Contributor: Felix Yan <[email protected]>
-# Contributor: Techlive Zheng <techlivezheng at gmail dot com>
-# Contributor: peace4all <markspost at rocketmail dot com>
-
-pkgname=dnscrypt-proxy
-pkgver=2.1.2
-_commit=a769cdadf11753914b0448ba289f7fafa27ec7c9  # refs/tags/2.1.2
-pkgrel=1
-pkgdesc="A flexible DNS proxy, with support for encrypted DNS protocols"
-arch=(x86_64)
-url="https://github.com/DNSCrypt/dnscrypt-proxy";
-license=(ISC)
-depends=(glibc)
-makedepends=(git go)
-optdepends=('python-urllib3: for generate-domains-blocklist')
-install=$pkgname.install
-backup=(
-  etc/$pkgname/$pkgname.toml
-  etc/$pkgname/allowed-ips.txt
-  etc/$pkgname/allowed-names.txt
-  etc/$pkgname/blocked-ips.txt
-  etc/$pkgname/blocked-names.txt
-  etc/$pkgname/cloaking-rules.txt
-  etc/$pkgname/forwarding-rules.txt
-)
-options=(debug)
-source=(
-  git+https://github.com/dnscrypt/$pkgname#tag=$_commit?signed
-  $pkgname.service
-  $pkgname.socket
-  
$pkgname-$pkgver-configuration.patch::https://github.com/dvzrv/dnscrypt-proxy/commit/4589ad77802b17bf781d6a625afb2e2775e1fb9a.patch
-)
-sha512sums=('SKIP'
-            
'5589eddf9d5fda86778ebc91c9e20d8acfdcf86bc1f1a5d34279f33c402f32dc73539c0c0ba6bd74b80617e9abcc49c8c68cc06f171f74c66f2ffc92dfeecd75'
-            
'56a56e87032da9316b392b0613124b0743673041596c717005541ae9b3994c7fc16c02497ea773d321f45d8e0f9ea8fda00783062cef4d5c8277b5b6f7cb10d5'
-            
'f029f2b30db3d44c17350b736e558cdaaa2e8c7b5a36bf738f613a9a506047cd3f720881e2e957902d41cb4d20e6a252c97976f542bf552213039c54c9f731bb')
-validpgpkeys=('54A2B8892CC3D6A597B92B6C210627AABA709FE1') # Frank Denis 
(Jedi/Sector One) <[email protected]
-
-prepare() {
-  cd $pkgname
-  patch -Np1 -i ../$pkgname-$pkgver-configuration.patch
-}
-
-build() {
-  cd $pkgname/$pkgname
-  export CGO_CPPFLAGS="$CPPFLAGS"
-  export CGO_CFLAGS="$CFLAGS"
-  export CGO_CXXFLAGS="$CXXFLAGS"
-  export CGO_LDFLAGS="$LDFLAGS"
-  export GOFLAGS="-buildmode=pie -trimpath -ldflags=-linkmode=external 
-mod=readonly -modcacherw"
-  go build
-}
-
-package() {
-  local _config
-
-  cd $pkgname
-  # executable
-  install -vDm 755 $pkgname/$pkgname -t "$pkgdir/usr/bin/"
-  # config files
-  install -vDm 644 $pkgname/example-$pkgname.toml 
"$pkgdir/etc/$pkgname/$pkgname.toml"
-  for _config in 
{{allowed,blocked}-{ips,names},{cloaking,forwarding}-rules,captive-portals}.txt;
 do
-    install -vDm 644 $pkgname/example-$_config "$pkgdir/etc/$pkgname/$_config"
-  done
-  # utils
-  install -vDm 644 utils/generate-domains-blocklist/*.{conf,txt} -t 
"$pkgdir/usr/share/$pkgname/utils/generate-domains-blocklist"
-  install -vDm 755 
utils/generate-domains-blocklist/generate-domains-blocklist.py 
"$pkgdir/usr/bin/generate-domains-blocklist"
-  # systemd service/socket
-  install -vDm 644 ../$pkgname.{service,socket} -t 
"$pkgdir/usr/lib/systemd/system/"
-  # license
-  install -vDm 644 LICENSE -t "$pkgdir/usr/share/licenses/$pkgname"
-  # docs
-  install -vDm 644 {ChangeLog,README.md} -t "$pkgdir/usr/share/doc/$pkgname"
-}
-# vim:set ts=2 sw=2 et:

Copied: dnscrypt-proxy/repos/community-x86_64/PKGBUILD (from rev 1400487, 
dnscrypt-proxy/trunk/PKGBUILD)
===================================================================
--- PKGBUILD                            (rev 0)
+++ PKGBUILD    2023-02-14 19:23:33 UTC (rev 1400488)
@@ -0,0 +1,76 @@
+# Maintainer: David Runge <[email protected]>
+# Contributor: Felix Yan <[email protected]>
+# Contributor: Techlive Zheng <techlivezheng at gmail dot com>
+# Contributor: peace4all <markspost at rocketmail dot com>
+
+pkgname=dnscrypt-proxy
+pkgver=2.1.4
+_commit=8e043f435d919912e46ac9b7d2beddcfdc8aab70  # refs/tags/2.1.4
+pkgrel=2
+pkgdesc="A flexible DNS proxy, with support for encrypted DNS protocols"
+arch=(x86_64)
+url="https://github.com/DNSCrypt/dnscrypt-proxy";
+license=(ISC)
+depends=(glibc)
+makedepends=(git go)
+optdepends=('python-urllib3: for generate-domains-blocklist')
+backup=(
+  etc/$pkgname/$pkgname.toml
+  etc/$pkgname/allowed-ips.txt
+  etc/$pkgname/allowed-names.txt
+  etc/$pkgname/blocked-ips.txt
+  etc/$pkgname/blocked-names.txt
+  etc/$pkgname/cloaking-rules.txt
+  etc/$pkgname/forwarding-rules.txt
+)
+# NOTE: disabled until gcc is fixed to produce reproducible bytecode for go
+options=(!lto)
+source=(
+  git+https://github.com/dnscrypt/$pkgname#tag=$_commit?signed
+  $pkgname.service
+  $pkgname.socket
+  
$pkgname-$pkgver-configuration.patch::https://github.com/dvzrv/dnscrypt-proxy/commit/0dfd620f36c6d5e411933299d8a1481c67da827b.patch
+)
+sha512sums=('SKIP'
+            
'6dd1ad7946c8903e0b91658a3680d5cd8d89e8c2177d23ad97b166312fbab649a22599542c94612dec46329e3bba3a55d1488b5228705a85c38565b7dfea54a5'
+            
'56a56e87032da9316b392b0613124b0743673041596c717005541ae9b3994c7fc16c02497ea773d321f45d8e0f9ea8fda00783062cef4d5c8277b5b6f7cb10d5'
+            
'6a28226fae15490115a88e93032f8eb09203f7b2d5b89104e1cc8066eaf72b1bc759d6f8a780a0eca2dc1e0db7deae4798c913d500a86105aff2d48759c154bc')
+validpgpkeys=('54A2B8892CC3D6A597B92B6C210627AABA709FE1') # Frank Denis 
(Jedi/Sector One) <[email protected]
+
+prepare() {
+  cd $pkgname
+  patch -Np1 -i ../$pkgname-$pkgver-configuration.patch
+}
+
+build() {
+  cd $pkgname/$pkgname
+  export CGO_CPPFLAGS="$CPPFLAGS"
+  export CGO_CFLAGS="$CFLAGS"
+  export CGO_CXXFLAGS="$CXXFLAGS"
+  export CGO_LDFLAGS="$LDFLAGS"
+  export GOFLAGS="-buildmode=pie -trimpath -ldflags=-linkmode=external 
-mod=readonly -modcacherw"
+  go build
+}
+
+package() {
+  local _config
+
+  cd $pkgname
+  # executable
+  install -vDm 755 $pkgname/$pkgname -t "$pkgdir/usr/bin/"
+  # config files
+  install -vDm 644 $pkgname/example-$pkgname.toml 
"$pkgdir/etc/$pkgname/$pkgname.toml"
+  for _config in 
{{allowed,blocked}-{ips,names},{cloaking,forwarding}-rules,captive-portals}.txt;
 do
+    install -vDm 644 $pkgname/example-$_config "$pkgdir/etc/$pkgname/$_config"
+  done
+  # utils
+  install -vDm 644 utils/generate-domains-blocklist/*.{conf,txt} -t 
"$pkgdir/usr/share/$pkgname/utils/generate-domains-blocklist"
+  install -vDm 755 
utils/generate-domains-blocklist/generate-domains-blocklist.py 
"$pkgdir/usr/bin/generate-domains-blocklist"
+  # systemd service/socket
+  install -vDm 644 ../$pkgname.{service,socket} -t 
"$pkgdir/usr/lib/systemd/system/"
+  # license
+  install -vDm 644 LICENSE -t "$pkgdir/usr/share/licenses/$pkgname"
+  # docs
+  install -vDm 644 {ChangeLog,README.md} -t "$pkgdir/usr/share/doc/$pkgname"
+}
+# vim:set ts=2 sw=2 et:

Deleted: dnscrypt-proxy.install
===================================================================
--- dnscrypt-proxy.install      2023-02-14 19:22:54 UTC (rev 1400487)
+++ dnscrypt-proxy.install      2023-02-14 19:23:33 UTC (rev 1400488)
@@ -1,9 +0,0 @@
-post_upgrade() {
-  if [ "$(vercmp "$2" '1.9.5-1')" -le 0 ]; then
-    echo 'The configuration file(s) and setup of dnscrypt-proxy has changed 
considerably since version 1.x.'
-    echo 'Please refer to the new upstream information for help!'
-  fi
-  if [ "$(vercmp "$2" '2.0.45-1')" -le 0 ]; then
-    echo 'Some of the configuration files have been renamed. Read 
/usr/share/doc/dnscrypt-proxy/ChangeLog to merge files accordingly.'
-  fi
-}

Deleted: dnscrypt-proxy.service
===================================================================
--- dnscrypt-proxy.service      2023-02-14 19:22:54 UTC (rev 1400487)
+++ dnscrypt-proxy.service      2023-02-14 19:23:33 UTC (rev 1400488)
@@ -1,37 +0,0 @@
-[Unit]
-Description=DNSCrypt-proxy client
-Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
-Wants=network-online.target nss-lookup.target
-Before=nss-lookup.target
-
-[Service]
-AmbientCapabilities=CAP_NET_BIND_SERVICE
-CacheDirectory=dnscrypt-proxy
-CapabilityBoundingSet=CAP_NET_BIND_SERVICE
-DynamicUser=yes
-ExecStart=/usr/bin/dnscrypt-proxy --config 
/etc/dnscrypt-proxy/dnscrypt-proxy.toml
-LockPersonality=yes
-LogsDirectory=dnscrypt-proxy
-MemoryDenyWriteExecute=true
-NonBlocking=true
-NoNewPrivileges=true
-PrivateDevices=true
-ProtectControlGroups=yes
-ProtectHome=yes
-ProtectHostname=yes
-ProtectKernelLogs=yes
-ProtectKernelModules=yes
-ProtectKernelTunables=yes
-ProtectSystem=strict
-RestrictAddressFamilies=AF_INET AF_INET6
-RestrictNamespaces=true
-RestrictRealtime=true
-RuntimeDirectory=dnscrypt-proxy
-StateDirectory=dnscrypt-proxy
-SystemCallArchitectures=native
-SystemCallFilter=@system-service
-SystemCallFilter=~@resources @privileged
-SystemCallFilter=@chown
-
-[Install]
-WantedBy=multi-user.target

Copied: dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.service (from rev 
1400487, dnscrypt-proxy/trunk/dnscrypt-proxy.service)
===================================================================
--- dnscrypt-proxy.service                              (rev 0)
+++ dnscrypt-proxy.service      2023-02-14 19:23:33 UTC (rev 1400488)
@@ -0,0 +1,35 @@
+[Unit]
+Description=DNSCrypt-proxy client
+Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
+Wants=network-online.target nss-lookup.target
+Before=nss-lookup.target
+
+[Service]
+AmbientCapabilities=CAP_NET_BIND_SERVICE
+CacheDirectory=dnscrypt-proxy
+CapabilityBoundingSet=CAP_NET_BIND_SERVICE
+DynamicUser=yes
+ExecStart=/usr/bin/dnscrypt-proxy --config 
/etc/dnscrypt-proxy/dnscrypt-proxy.toml
+LockPersonality=yes
+LogsDirectory=dnscrypt-proxy
+MemoryDenyWriteExecute=true
+NonBlocking=true
+NoNewPrivileges=true
+PrivateDevices=true
+ProtectControlGroups=yes
+ProtectHome=yes
+ProtectHostname=yes
+ProtectKernelLogs=yes
+ProtectKernelModules=yes
+ProtectKernelTunables=yes
+ProtectSystem=strict
+RestrictAddressFamilies=AF_INET AF_INET6
+RestrictNamespaces=true
+RestrictRealtime=true
+RuntimeDirectory=dnscrypt-proxy
+StateDirectory=dnscrypt-proxy
+SystemCallArchitectures=native
+SystemCallFilter=@system-service
+
+[Install]
+WantedBy=multi-user.target

Deleted: dnscrypt-proxy.socket
===================================================================
--- dnscrypt-proxy.socket       2023-02-14 19:22:54 UTC (rev 1400487)
+++ dnscrypt-proxy.socket       2023-02-14 19:23:33 UTC (rev 1400488)
@@ -1,16 +0,0 @@
-[Unit]
-Description=DNSCrypt-proxy socket
-Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
-Before=nss-lookup.target
-Wants=nss-lookup.target network-online.target
-
-[Socket]
-ListenStream=127.0.0.1:53
-ListenDatagram=127.0.0.1:53
-ListenStream=[::1]:53
-ListenDatagram=[::1]:53
-NoDelay=true
-DeferAcceptSec=1
-
-[Install]
-WantedBy=sockets.target

Copied: dnscrypt-proxy/repos/community-x86_64/dnscrypt-proxy.socket (from rev 
1400487, dnscrypt-proxy/trunk/dnscrypt-proxy.socket)
===================================================================
--- dnscrypt-proxy.socket                               (rev 0)
+++ dnscrypt-proxy.socket       2023-02-14 19:23:33 UTC (rev 1400488)
@@ -0,0 +1,16 @@
+[Unit]
+Description=DNSCrypt-proxy socket
+Documentation=https://github.com/jedisct1/dnscrypt-proxy/wiki
+Before=nss-lookup.target
+Wants=nss-lookup.target network-online.target
+
+[Socket]
+ListenStream=127.0.0.1:53
+ListenDatagram=127.0.0.1:53
+ListenStream=[::1]:53
+ListenDatagram=[::1]:53
+NoDelay=true
+DeferAcceptSec=1
+
+[Install]
+WantedBy=sockets.target

Reply via email to