aboutsummaryrefslogtreecommitdiffstats
path: root/testing/vault/APKBUILD
diff options
context:
space:
mode:
authorChristian Kampka <christian@kampka.net>2015-09-19 12:37:45 +0200
committerFrancesco Colista <fcolista@alpinelinux.org>2015-09-21 08:54:21 +0000
commit5061eaa7164287ab2bf209ff9b3b3197551b0f6d (patch)
treebf651caec3773d758fcd9ce3da10ace1a3321fb5 /testing/vault/APKBUILD
parent2b2d458b50da34ebb2659bbdcaecac89f7945dd6 (diff)
downloadaports-5061eaa7164287ab2bf209ff9b3b3197551b0f6d.tar.bz2
aports-5061eaa7164287ab2bf209ff9b3b3197551b0f6d.tar.xz
testing/vault: new aport
https://www.vaultproject.io Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
Diffstat (limited to 'testing/vault/APKBUILD')
-rw-r--r--testing/vault/APKBUILD99
1 files changed, 99 insertions, 0 deletions
diff --git a/testing/vault/APKBUILD b/testing/vault/APKBUILD
new file mode 100644
index 0000000000..15e47df035
--- /dev/null
+++ b/testing/vault/APKBUILD
@@ -0,0 +1,99 @@
+# Contributor: Christian Kampka <christian@kampka.net>
+# Maintainer:
+pkgname=vault
+pkgver=0.2.0
+pkgrel=0
+pkgdesc="Vault is a tool for securely accessing secrets."
+url="https://www.vaultproject.io/"
+arch="all"
+license="MPL 2.0"
+depends=""
+depends_dev=""
+makedepends="go godep $depends_dev"
+#install="$pkgname.pre-install $pkgname.pre-deinstall $pkgname.post-deinstall"
+pkgusers="vault"
+pkggroups="vault"
+subpackages=""
+options="!strip"
+source="http://dev.alpinelinux.org/archive/$pkgname/$pkgname-$pkgver.tar.gz
+ Godeps.json
+ vault.confd
+ vault.hcl
+ vault.initd"
+
+prepare() {
+ cd "${_builddir}"
+ local i
+ for i in $source; do
+ case $i in
+ *.patch) msg $i; patch -p1 -i "$srcdir"/$i || return 1;;
+ esac
+ done
+}
+
+_disturl="dev.alpinelinux.org:/archive/$pkgname/"
+_gourl="github.com/hashicorp/vault"
+_builddir="${srcdir}/vault"
+
+snapshot() {
+ abuild clean
+ abuild deps
+
+ export GOPATH="${_builddir}"
+ mkdir -p $_builddir
+ cd "$srcdir"
+
+ msg "Checking out v${pkgver} tag"
+ git clone -q --branch v${pkgver} https://$_gourl || return 1
+
+ cd ${_builddir}
+ # use custom godeps file
+
+ install -D "$startdir"/Godeps.json \
+ $_builddir/Godeps/Godeps.json || return 1
+
+ #go get -v -d || return 1
+ godep restore || return 1
+
+ cd "$srcdir"
+ tar zcf $pkgname-$pkgver.tar.gz vault || return 1
+ rsync --progress -La $pkgname-$pkgver.tar.gz \
+ $_disturl || return 1
+ cd $startdir && abuild undeps
+}
+
+build() {
+ cd "$_builddir" || return 1
+ export GOPATH="${_builddir}"
+ mkdir -p "${_builddir}/src/github.com/hashicorp"
+ ln -s "${_builddir}" "${_builddir}/src/github.com/hashicorp/vault"
+ go build -x -v -o bin/${pkgname} || return 1
+}
+
+package() {
+ cd "$_builddir"
+ install -m755 -D "${srcdir}/${pkgname}.initd" \
+ "${pkgdir}/etc/init.d/${pkgname}" || return 1
+ install -m644 -D "${srcdir}/${pkgname}.confd" \
+ "${pkgdir}/etc/conf.d/$pkgname" || return 1
+ install -m750 -o root -g vault \
+ -D "${_builddir}/bin/${pkgname}" \
+ "${pkgdir}/usr/sbin/${pkgname}" || return 1
+ install -m750 -o vault -g vault -d "$pkgdir/var/lib/${pkgname}" || return 1
+ install -m750 -o root -g vault -D "$srcdir/${pkgname}.hcl" "$pkgdir/etc/${pkgname}.hcl" || return 1
+}
+md5sums="643de042da4583a16e9d5ecd0c7fffea vault-0.2.0.tar.gz
+c7c60a8240345c248e72a57030239b03 Godeps.json
+2148a788620484be07e1e24feb1cbd34 vault.confd
+1f7802f479024809856e3be2e44a1b19 vault.hcl
+8b75990815b758db94f400de001cbc81 vault.initd"
+sha256sums="92502d43a10a0903c9d1add944dde2c36ba3af09e20e4bd6e0e3648313a7eab7 vault-0.2.0.tar.gz
+3ce579dfe7f7dc2a0519f835e55c85d314b1f90e5d74b29cc2966b6b0534a0d7 Godeps.json
+f197536bc5bf4531072c0a5cb17627bf01abd188b0cc2005e0ff1768e6143d32 vault.confd
+cacbd75cbaccf1034cd21d3015797cf0c1c1ce9c7e7ef7c1e4db4b54b92fe696 vault.hcl
+cdbeba798d2b06a178e9c6eb638ff88c4f1c21eaa6c8881a87fac679c8e7c46e vault.initd"
+sha512sums="9417147e2e271dcd5d96176095d62666538f21981dc22d8353a864e8a2eee368067d1ae761bb3955d0fa30dcfdaa93b5d6b5c4d8267028d3fb7a422eb417bfa6 vault-0.2.0.tar.gz
+6092da41eeda3c3fb1766e310fa7ac73b26fcc34cf2b9a51574387eb1137d4e8322631a05b5d75bdc96b15f1d08da2bf98d299856a76ebe92e40d89743288f49 Godeps.json
+6f3f30e5c9d9dd5117f18fce0e669f0cd752a6be4910405d6b394f15273372731ee887a5ba4c700293e5b8bc2bf40fd69d4337156f77b03549d2dc2c0a666bec vault.confd
+8c064aa5dcca84822c1fa85e9d0ff520df46f794b2e9c689a9b4f81f74279387b3aebc08b3ca26cf786c2fcf1a330e765bf5a511074c24f87e5346672346ba1c vault.hcl
+038f5fd0b7bc84bd8be82a1cb8ac7a5357319bdb77e07936b4072fcb00a30add1cb3744f3a333d2a8b860c821aab0d88249033f61d2a2125de6bb6b2a4c9aef6 vault.initd"