Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 9 Oct 2019 16:06:07 +0000 (UTC)
From:      Dmitri Goutnik <dmgk@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r514170 - in head/security: . aws-vault
Message-ID:  <201910091606.x99G67Oe056490@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: dmgk
Date: Wed Oct  9 16:06:07 2019
New Revision: 514170
URL: https://svnweb.freebsd.org/changeset/ports/514170

Log:
  New port: security/aws-vault
  
  AWS Vault is a tool to securely store and access AWS credentials in a
  development environment.
  
  AWS Vault stores IAM credentials in your operating system's secure keystore and
  then generates temporary credentials from those to expose to your shell and
  applications. It's designed to be complementary to the AWS CLI tools, and is
  aware of your profiles and configuration in ~/.aws/config.
  
  WWW: https://github.com/99designs/aws-vault
  
  Approved by:	araujo (mentor)
  Differential Revision:	https://reviews.freebsd.org/D21955

Added:
  head/security/aws-vault/
  head/security/aws-vault/Makefile   (contents, props changed)
  head/security/aws-vault/distinfo   (contents, props changed)
  head/security/aws-vault/pkg-descr   (contents, props changed)
Modified:
  head/security/Makefile

Modified: head/security/Makefile
==============================================================================
--- head/security/Makefile	Wed Oct  9 16:01:35 2019	(r514169)
+++ head/security/Makefile	Wed Oct  9 16:06:07 2019	(r514170)
@@ -36,6 +36,7 @@
     SUBDIR += autossh
     SUBDIR += avcheck
     SUBDIR += aws-iam-authenticator
+    SUBDIR += aws-vault
     SUBDIR += axTLS
     SUBDIR += barnyard2
     SUBDIR += barnyard2-sguil

Added: head/security/aws-vault/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/aws-vault/Makefile	Wed Oct  9 16:06:07 2019	(r514170)
@@ -0,0 +1,59 @@
+# $FreeBSD$
+
+PORTNAME=	aws-vault
+DISTVERSIONPREFIX=	v
+DISTVERSION=	4.6.4
+CATEGORIES=	security
+
+MAINTAINER=	dmgk@FreeBSD.org
+COMMENT=	Vault for securely storing and accessing AWS credentials
+
+LICENSE=	MIT
+LICENSE_FILE=	${WRKSRC}/LICENSE
+
+USES=		go:modules
+
+USE_GITHUB=	yes
+GH_ACCOUNT=	99designs
+GH_TUPLE=	\
+		99designs:keyring:v1.1.2:99designs_keyring/vendor/github.com/99designs/keyring \
+		alecthomas:kingpin:v2.2.6:alecthomas_kingpin/vendor/gopkg.in/alecthomas/kingpin.v2 \
+		alecthomas:template:a0175ee3bccc:alecthomas_template/vendor/github.com/alecthomas/template \
+		alecthomas:units:2efee857e7cf:alecthomas_units/vendor/github.com/alecthomas/units \
+		aws:aws-sdk-go:v1.20.17:aws_aws_sdk_go/vendor/github.com/aws/aws-sdk-go \
+		danieljoos:wincred:v1.0.2:danieljoos_wincred/vendor/github.com/danieljoos/wincred \
+		dvsekhvalnov:jose2go:7f401d37b68a:dvsekhvalnov_jose2go/vendor/github.com/dvsekhvalnov/jose2go \
+		go-ini:ini:v1.44.0:go_ini_ini/vendor/gopkg.in/ini.v1 \
+		godbus:dbus:4481cbc300e2:godbus_dbus/vendor/github.com/godbus/dbus \
+		golang:crypto:60c769a6c586:golang_crypto/vendor/golang.org/x/crypto \
+		golang:sys:c7b8b68b1456:golang_sys/vendor/golang.org/x/sys \
+		gsterjov:go-libsecret:a6f4afe4910c:gsterjov_go_libsecret/vendor/github.com/gsterjov/go-libsecret \
+		jmespath:go-jmespath:c2b33e8439af:jmespath_go_jmespath/vendor/github.com/jmespath/go-jmespath \
+		keybase:go-keychain:48d3d31d256d:keybase_go_keychain/vendor/github.com/keybase/go-keychain \
+		mitchellh:go-homedir:v1.1.0:mitchellh_go_homedir/vendor/github.com/mitchellh/go-homedir \
+		skratchdot:open-golang:79abb63cd66e:skratchdot_open_golang/vendor/github.com/skratchdot/open-golang
+
+GO_BUILDFLAGS=	-ldflags="-s -w -X main.Version=${PORTVERSION}"
+
+PLIST_FILES=	bin/${PORTNAME} \
+		etc/bash_completion.d/aws-vault \
+		share/zsh/site-functions/_aws-vault
+
+PORTDOCS=	README.md USAGE.md
+
+OPTIONS_DEFINE=	DOCS
+
+post-install:
+	@${MKDIR} ${STAGEDIR}${PREFIX}/etc/bash_completion.d
+	@${MKDIR} ${STAGEDIR}${PREFIX}/share/zsh/site-functions
+	${INSTALL_DATA} ${WRKSRC}/completions/bash/aws-vault ${STAGEDIR}${PREFIX}/etc/bash_completion.d
+	${INSTALL_DATA} ${WRKSRC}/completions/zsh/_aws-vault ${STAGEDIR}${PREFIX}/share/zsh/site-functions
+
+post-install-DOCS-on:
+	@${MKDIR} ${STAGEDIR}${DOCSDIR}
+	${INSTALL_DATA} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR}
+
+do-test:
+	cd ${WRKSRC} && ${SETENV} ${MAKE_ENV} ${GO_ENV} ${GO_CMD} test ${GO_BUILDFLAGS} ./...
+
+.include <bsd.port.mk>

Added: head/security/aws-vault/distinfo
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/aws-vault/distinfo	Wed Oct  9 16:06:07 2019	(r514170)
@@ -0,0 +1,35 @@
+TIMESTAMP = 1570625672
+SHA256 (99designs-aws-vault-v4.6.4_GH0.tar.gz) = 58f71cc7acd7bfbe8d2fce7ae330998b6f1ef065e1ec78070a54c609b1b34118
+SIZE (99designs-aws-vault-v4.6.4_GH0.tar.gz) = 34013
+SHA256 (99designs-keyring-v1.1.2_GH0.tar.gz) = 0a99d5221c5f12cf8a66988963eb2e3f35354d9c0cb17dcea922eaf362245608
+SIZE (99designs-keyring-v1.1.2_GH0.tar.gz) = 22526
+SHA256 (alecthomas-kingpin-v2.2.6_GH0.tar.gz) = 4624eae43489de8a71ea60efaf6744c581b6bd62909f7514c484c1ea0efaba5a
+SIZE (alecthomas-kingpin-v2.2.6_GH0.tar.gz) = 44383
+SHA256 (alecthomas-template-a0175ee3bccc_GH0.tar.gz) = 3a4fafac5b6250aec1f09bcec8d0955c36a140fccd481908ca81e639709ee401
+SIZE (alecthomas-template-a0175ee3bccc_GH0.tar.gz) = 55266
+SHA256 (alecthomas-units-2efee857e7cf_GH0.tar.gz) = 1e8ded84579a751d732db65a6dc6c40c226b89b72c6c4d148394ff98d958ff5a
+SIZE (alecthomas-units-2efee857e7cf_GH0.tar.gz) = 3442
+SHA256 (aws-aws-sdk-go-v1.20.17_GH0.tar.gz) = 787ff8c1c7c537bef89e4cf0500b8b33abf5c20433024d1ef6703aeb1899f577
+SIZE (aws-aws-sdk-go-v1.20.17_GH0.tar.gz) = 11532445
+SHA256 (danieljoos-wincred-v1.0.2_GH0.tar.gz) = f97d313ccb14d292a4446c66762f257115edc1c26f68f5395bb3f242d26cf7f3
+SIZE (danieljoos-wincred-v1.0.2_GH0.tar.gz) = 8485
+SHA256 (dvsekhvalnov-jose2go-7f401d37b68a_GH0.tar.gz) = 1fab5891bc444136f923f872a57ba5971dcae2baeb48508f66684b6fb71b4768
+SIZE (dvsekhvalnov-jose2go-7f401d37b68a_GH0.tar.gz) = 68086
+SHA256 (go-ini-ini-v1.44.0_GH0.tar.gz) = 4ace9569814b40b7755e1395f10bbef9d4f80c0b975d5212ac4b2586ca148636
+SIZE (go-ini-ini-v1.44.0_GH0.tar.gz) = 35817
+SHA256 (godbus-dbus-4481cbc300e2_GH0.tar.gz) = 632f7646e51a60bcd7c5a7fe4a4a83e1cc7c80662a8ada2ee44809977f96644c
+SIZE (godbus-dbus-4481cbc300e2_GH0.tar.gz) = 62520
+SHA256 (golang-crypto-60c769a6c586_GH0.tar.gz) = 1fadbcecc014d9f4beaa2192f8709073a87d9e4edc223179b54881f13d7b132c
+SIZE (golang-crypto-60c769a6c586_GH0.tar.gz) = 1693081
+SHA256 (golang-sys-c7b8b68b1456_GH0.tar.gz) = 826e76dcb9c9c2ed234d81b2f4d8cb960a4fec707814521f938c9be99e9f1d80
+SIZE (golang-sys-c7b8b68b1456_GH0.tar.gz) = 1455888
+SHA256 (gsterjov-go-libsecret-a6f4afe4910c_GH0.tar.gz) = 37e4db5271e6164924ec764252cdad969982e2f6282946aec6efa76fbac95233
+SIZE (gsterjov-go-libsecret-a6f4afe4910c_GH0.tar.gz) = 3068
+SHA256 (jmespath-go-jmespath-c2b33e8439af_GH0.tar.gz) = 1ccd468fe91f58cd1b144f6317f06b53bf0a5da5e03e6a399a2d03f087db1fe9
+SIZE (jmespath-go-jmespath-c2b33e8439af_GH0.tar.gz) = 48265
+SHA256 (keybase-go-keychain-48d3d31d256d_GH0.tar.gz) = 9381b8fb22ffa81745785853ada5356cd169774baf8cfe831def6d64c966dc46
+SIZE (keybase-go-keychain-48d3d31d256d_GH0.tar.gz) = 2340711
+SHA256 (mitchellh-go-homedir-v1.1.0_GH0.tar.gz) = 646671c73a84a8dfb4a5a76b80c7b63549ffefa906524d45077301bc7da76600
+SIZE (mitchellh-go-homedir-v1.1.0_GH0.tar.gz) = 3362
+SHA256 (skratchdot-open-golang-79abb63cd66e_GH0.tar.gz) = 2396e574cd90b395117a0d44e8d4024b1e87f816d0ff0e16aef18c94472149a0
+SIZE (skratchdot-open-golang-79abb63cd66e_GH0.tar.gz) = 7074

Added: head/security/aws-vault/pkg-descr
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/aws-vault/pkg-descr	Wed Oct  9 16:06:07 2019	(r514170)
@@ -0,0 +1,9 @@
+AWS Vault is a tool to securely store and access AWS credentials in a
+development environment.
+
+AWS Vault stores IAM credentials in your operating system's secure keystore and
+then generates temporary credentials from those to expose to your shell and
+applications. It's designed to be complementary to the AWS CLI tools, and is
+aware of your profiles and configuration in ~/.aws/config.
+
+WWW: https://github.com/99designs/aws-vault



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201910091606.x99G67Oe056490>