From owner-svn-ports-all@freebsd.org Wed Oct 9 16:06:09 2019 Return-Path: Delivered-To: svn-ports-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 150F314F5F1; Wed, 9 Oct 2019 16:06:09 +0000 (UTC) (envelope-from dmgk@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46pJww6qnTz4bmM; Wed, 9 Oct 2019 16:06:08 +0000 (UTC) (envelope-from dmgk@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CA7441AE99; Wed, 9 Oct 2019 16:06:08 +0000 (UTC) (envelope-from dmgk@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x99G68HD056494; Wed, 9 Oct 2019 16:06:08 GMT (envelope-from dmgk@FreeBSD.org) Received: (from dmgk@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x99G67Oe056490; Wed, 9 Oct 2019 16:06:07 GMT (envelope-from dmgk@FreeBSD.org) Message-Id: <201910091606.x99G67Oe056490@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: dmgk set sender to dmgk@FreeBSD.org using -f From: Dmitri Goutnik Date: Wed, 9 Oct 2019 16:06:07 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r514170 - in head/security: . aws-vault X-SVN-Group: ports-head X-SVN-Commit-Author: dmgk X-SVN-Commit-Paths: in head/security: . aws-vault X-SVN-Commit-Revision: 514170 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Oct 2019 16:06:09 -0000 Author: dmgk Date: Wed Oct 9 16:06:07 2019 New Revision: 514170 URL: https://svnweb.freebsd.org/changeset/ports/514170 Log: New port: security/aws-vault AWS Vault is a tool to securely store and access AWS credentials in a development environment. AWS Vault stores IAM credentials in your operating system's secure keystore and then generates temporary credentials from those to expose to your shell and applications. It's designed to be complementary to the AWS CLI tools, and is aware of your profiles and configuration in ~/.aws/config. WWW: https://github.com/99designs/aws-vault Approved by: araujo (mentor) Differential Revision: https://reviews.freebsd.org/D21955 Added: head/security/aws-vault/ head/security/aws-vault/Makefile (contents, props changed) head/security/aws-vault/distinfo (contents, props changed) head/security/aws-vault/pkg-descr (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Wed Oct 9 16:01:35 2019 (r514169) +++ head/security/Makefile Wed Oct 9 16:06:07 2019 (r514170) @@ -36,6 +36,7 @@ SUBDIR += autossh SUBDIR += avcheck SUBDIR += aws-iam-authenticator + SUBDIR += aws-vault SUBDIR += axTLS SUBDIR += barnyard2 SUBDIR += barnyard2-sguil Added: head/security/aws-vault/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/aws-vault/Makefile Wed Oct 9 16:06:07 2019 (r514170) @@ -0,0 +1,59 @@ +# $FreeBSD$ + +PORTNAME= aws-vault +DISTVERSIONPREFIX= v +DISTVERSION= 4.6.4 +CATEGORIES= security + +MAINTAINER= dmgk@FreeBSD.org +COMMENT= Vault for securely storing and accessing AWS credentials + +LICENSE= MIT +LICENSE_FILE= ${WRKSRC}/LICENSE + +USES= go:modules + +USE_GITHUB= yes +GH_ACCOUNT= 99designs +GH_TUPLE= \ + 99designs:keyring:v1.1.2:99designs_keyring/vendor/github.com/99designs/keyring \ + alecthomas:kingpin:v2.2.6:alecthomas_kingpin/vendor/gopkg.in/alecthomas/kingpin.v2 \ + alecthomas:template:a0175ee3bccc:alecthomas_template/vendor/github.com/alecthomas/template \ + alecthomas:units:2efee857e7cf:alecthomas_units/vendor/github.com/alecthomas/units \ + aws:aws-sdk-go:v1.20.17:aws_aws_sdk_go/vendor/github.com/aws/aws-sdk-go \ + danieljoos:wincred:v1.0.2:danieljoos_wincred/vendor/github.com/danieljoos/wincred \ + dvsekhvalnov:jose2go:7f401d37b68a:dvsekhvalnov_jose2go/vendor/github.com/dvsekhvalnov/jose2go \ + go-ini:ini:v1.44.0:go_ini_ini/vendor/gopkg.in/ini.v1 \ + godbus:dbus:4481cbc300e2:godbus_dbus/vendor/github.com/godbus/dbus \ + golang:crypto:60c769a6c586:golang_crypto/vendor/golang.org/x/crypto \ + golang:sys:c7b8b68b1456:golang_sys/vendor/golang.org/x/sys \ + gsterjov:go-libsecret:a6f4afe4910c:gsterjov_go_libsecret/vendor/github.com/gsterjov/go-libsecret \ + jmespath:go-jmespath:c2b33e8439af:jmespath_go_jmespath/vendor/github.com/jmespath/go-jmespath \ + keybase:go-keychain:48d3d31d256d:keybase_go_keychain/vendor/github.com/keybase/go-keychain \ + mitchellh:go-homedir:v1.1.0:mitchellh_go_homedir/vendor/github.com/mitchellh/go-homedir \ + skratchdot:open-golang:79abb63cd66e:skratchdot_open_golang/vendor/github.com/skratchdot/open-golang + +GO_BUILDFLAGS= -ldflags="-s -w -X main.Version=${PORTVERSION}" + +PLIST_FILES= bin/${PORTNAME} \ + etc/bash_completion.d/aws-vault \ + share/zsh/site-functions/_aws-vault + +PORTDOCS= README.md USAGE.md + +OPTIONS_DEFINE= DOCS + +post-install: + @${MKDIR} ${STAGEDIR}${PREFIX}/etc/bash_completion.d + @${MKDIR} ${STAGEDIR}${PREFIX}/share/zsh/site-functions + ${INSTALL_DATA} ${WRKSRC}/completions/bash/aws-vault ${STAGEDIR}${PREFIX}/etc/bash_completion.d + ${INSTALL_DATA} ${WRKSRC}/completions/zsh/_aws-vault ${STAGEDIR}${PREFIX}/share/zsh/site-functions + +post-install-DOCS-on: + @${MKDIR} ${STAGEDIR}${DOCSDIR} + ${INSTALL_DATA} ${PORTDOCS:S|^|${WRKSRC}/|} ${STAGEDIR}${DOCSDIR} + +do-test: + cd ${WRKSRC} && ${SETENV} ${MAKE_ENV} ${GO_ENV} ${GO_CMD} test ${GO_BUILDFLAGS} ./... + +.include Added: head/security/aws-vault/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/aws-vault/distinfo Wed Oct 9 16:06:07 2019 (r514170) @@ -0,0 +1,35 @@ +TIMESTAMP = 1570625672 +SHA256 (99designs-aws-vault-v4.6.4_GH0.tar.gz) = 58f71cc7acd7bfbe8d2fce7ae330998b6f1ef065e1ec78070a54c609b1b34118 +SIZE (99designs-aws-vault-v4.6.4_GH0.tar.gz) = 34013 +SHA256 (99designs-keyring-v1.1.2_GH0.tar.gz) = 0a99d5221c5f12cf8a66988963eb2e3f35354d9c0cb17dcea922eaf362245608 +SIZE (99designs-keyring-v1.1.2_GH0.tar.gz) = 22526 +SHA256 (alecthomas-kingpin-v2.2.6_GH0.tar.gz) = 4624eae43489de8a71ea60efaf6744c581b6bd62909f7514c484c1ea0efaba5a +SIZE (alecthomas-kingpin-v2.2.6_GH0.tar.gz) = 44383 +SHA256 (alecthomas-template-a0175ee3bccc_GH0.tar.gz) = 3a4fafac5b6250aec1f09bcec8d0955c36a140fccd481908ca81e639709ee401 +SIZE (alecthomas-template-a0175ee3bccc_GH0.tar.gz) = 55266 +SHA256 (alecthomas-units-2efee857e7cf_GH0.tar.gz) = 1e8ded84579a751d732db65a6dc6c40c226b89b72c6c4d148394ff98d958ff5a +SIZE (alecthomas-units-2efee857e7cf_GH0.tar.gz) = 3442 +SHA256 (aws-aws-sdk-go-v1.20.17_GH0.tar.gz) = 787ff8c1c7c537bef89e4cf0500b8b33abf5c20433024d1ef6703aeb1899f577 +SIZE (aws-aws-sdk-go-v1.20.17_GH0.tar.gz) = 11532445 +SHA256 (danieljoos-wincred-v1.0.2_GH0.tar.gz) = f97d313ccb14d292a4446c66762f257115edc1c26f68f5395bb3f242d26cf7f3 +SIZE (danieljoos-wincred-v1.0.2_GH0.tar.gz) = 8485 +SHA256 (dvsekhvalnov-jose2go-7f401d37b68a_GH0.tar.gz) = 1fab5891bc444136f923f872a57ba5971dcae2baeb48508f66684b6fb71b4768 +SIZE (dvsekhvalnov-jose2go-7f401d37b68a_GH0.tar.gz) = 68086 +SHA256 (go-ini-ini-v1.44.0_GH0.tar.gz) = 4ace9569814b40b7755e1395f10bbef9d4f80c0b975d5212ac4b2586ca148636 +SIZE (go-ini-ini-v1.44.0_GH0.tar.gz) = 35817 +SHA256 (godbus-dbus-4481cbc300e2_GH0.tar.gz) = 632f7646e51a60bcd7c5a7fe4a4a83e1cc7c80662a8ada2ee44809977f96644c +SIZE (godbus-dbus-4481cbc300e2_GH0.tar.gz) = 62520 +SHA256 (golang-crypto-60c769a6c586_GH0.tar.gz) = 1fadbcecc014d9f4beaa2192f8709073a87d9e4edc223179b54881f13d7b132c +SIZE (golang-crypto-60c769a6c586_GH0.tar.gz) = 1693081 +SHA256 (golang-sys-c7b8b68b1456_GH0.tar.gz) = 826e76dcb9c9c2ed234d81b2f4d8cb960a4fec707814521f938c9be99e9f1d80 +SIZE (golang-sys-c7b8b68b1456_GH0.tar.gz) = 1455888 +SHA256 (gsterjov-go-libsecret-a6f4afe4910c_GH0.tar.gz) = 37e4db5271e6164924ec764252cdad969982e2f6282946aec6efa76fbac95233 +SIZE (gsterjov-go-libsecret-a6f4afe4910c_GH0.tar.gz) = 3068 +SHA256 (jmespath-go-jmespath-c2b33e8439af_GH0.tar.gz) = 1ccd468fe91f58cd1b144f6317f06b53bf0a5da5e03e6a399a2d03f087db1fe9 +SIZE (jmespath-go-jmespath-c2b33e8439af_GH0.tar.gz) = 48265 +SHA256 (keybase-go-keychain-48d3d31d256d_GH0.tar.gz) = 9381b8fb22ffa81745785853ada5356cd169774baf8cfe831def6d64c966dc46 +SIZE (keybase-go-keychain-48d3d31d256d_GH0.tar.gz) = 2340711 +SHA256 (mitchellh-go-homedir-v1.1.0_GH0.tar.gz) = 646671c73a84a8dfb4a5a76b80c7b63549ffefa906524d45077301bc7da76600 +SIZE (mitchellh-go-homedir-v1.1.0_GH0.tar.gz) = 3362 +SHA256 (skratchdot-open-golang-79abb63cd66e_GH0.tar.gz) = 2396e574cd90b395117a0d44e8d4024b1e87f816d0ff0e16aef18c94472149a0 +SIZE (skratchdot-open-golang-79abb63cd66e_GH0.tar.gz) = 7074 Added: head/security/aws-vault/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/aws-vault/pkg-descr Wed Oct 9 16:06:07 2019 (r514170) @@ -0,0 +1,9 @@ +AWS Vault is a tool to securely store and access AWS credentials in a +development environment. + +AWS Vault stores IAM credentials in your operating system's secure keystore and +then generates temporary credentials from those to expose to your shell and +applications. It's designed to be complementary to the AWS CLI tools, and is +aware of your profiles and configuration in ~/.aws/config. + +WWW: https://github.com/99designs/aws-vault