pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/net/bind918
Module Name: pkgsrc
Committed By: taca
Date: Fri Dec 13 17:29:56 UTC 2024
Modified Files:
pkgsrc/net/bind918: Makefile PLIST distinfo
pkgsrc/net/bind918/patches: patch-bin_named_server.c
patch-lib_isc_netmgr_netmgr.c patch-lib_isc_time.c
Log Message:
net/bind918: update to 9.18.32
9.18.32 (2024-12-11)
New Features
* Update built-in bind.keys file with the new 2025 IANA root key.
* Add an initial-ds entry to bind.keys for the new root key, ID 38696, which
is scheduled for publication in January 2025. [GL #4896]
Removed Features
* Move contributed DLZ modules into a separate repository. DLZ modules
should not be used except in testing.
* The DLZ modules were not maintained, the DLZ interface itself is going to
be scheduled for removal, and the DLZ interface is blocking. Any module
that blocks the query to the database blocks the whole server.
* The DLZ modules now live in
https://gitlab.isc.org/isc-projects/dlz-modules repository. [GL #4865]
Feature Changes
* Emit more helpful log messages for exceeding max-records-per-type.
* The new log message is emitted when adding or updating an RRset fails due
to exceeding the max-records-per-type limit. The log includes the owner
name and type, corresponding zone name, and the limit value. It will be
emitted on loading a zone file, inbound zone transfer (both AXFR and
IXFR), handling a DDNS update, or updating a cache DB. It's especially
helpful in the case of zone transfer, since the secondary side doesn't
have direct access to the offending zone data.
* It could also be used for max-types-per-name, but this change doesn't
implement it yet as it's much less likely to happen in practice.
* Harden key management when key files have become unavailable.
* Prior to doing key management, BIND 9 will check if the key files on disk
match the expected keys. If key files for previously observed keys have
become unavailable, this will prevent the internal key manager from
running.
Bug Fixes
* {&dns} is as valid as {?dns} in a SVCB's dohpath.
* dig failed to parse a valid SVCB record with a dohpath URI template
containing a {&dns}, like "dohpath=/some/path?key=value{&dns}". [GL
#4922]
* Fix NSEC3 closest encloser lookup for names with empty non-terminals.
* A previous performance optimization for finding the NSEC3 closest encloser
when generating authoritative responses could cause servers to return
incorrect NSEC3 records in some cases. This faulty optimization has been
removed. [GL #4950]
* dig options of the form [+-]option=<value> failed to display the value on
the printed command line. This has been fixed. [GL #4993]
* Provide more visibility into TLS configuration errors by logging
SSL_CTX_use_certificate_chain_file() and SSL_CTX_use_PrivateKey_file()
errors individually. [GL #5008]
To generate a diff of this commit:
cvs rdiff -u -r1.42 -r1.43 pkgsrc/net/bind918/Makefile
cvs rdiff -u -r1.4 -r1.5 pkgsrc/net/bind918/PLIST
cvs rdiff -u -r1.23 -r1.24 pkgsrc/net/bind918/distinfo
cvs rdiff -u -r1.1 -r1.2 pkgsrc/net/bind918/patches/patch-bin_named_server.c
cvs rdiff -u -r1.2 -r1.3 \
pkgsrc/net/bind918/patches/patch-lib_isc_netmgr_netmgr.c \
pkgsrc/net/bind918/patches/patch-lib_isc_time.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/net/bind918/Makefile
diff -u pkgsrc/net/bind918/Makefile:1.42 pkgsrc/net/bind918/Makefile:1.43
--- pkgsrc/net/bind918/Makefile:1.42 Thu Nov 14 22:21:03 2024
+++ pkgsrc/net/bind918/Makefile Fri Dec 13 17:29:56 2024
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.42 2024/11/14 22:21:03 wiz Exp $
+# $NetBSD: Makefile,v 1.43 2024/12/13 17:29:56 taca Exp $
DISTNAME= bind-${BIND_VERSION}
PKGNAME= ${DISTNAME:S/-P/pl/}
-PKGREVISION= 3
CATEGORIES= net
MASTER_SITES= https://downloads.isc.org/isc/bind9/${BIND_VERSION}/
EXTRACT_SUFX= .tar.xz
@@ -16,7 +15,7 @@ CONFLICTS+= host-[0-9]*
MAKE_JOBS_SAFE= no
-BIND_VERSION= 9.18.31
+BIND_VERSION= 9.18.32
BUILD_DEFS+= BIND_DIR VARBASE
@@ -59,7 +58,7 @@ PKG_USERS= ${BIND_USER}:${BIND_GROUP}
PKG_GECOS.${BIND_USER}= Named pseudo-user
PKG_HOME.${BIND_USER}= ${BIND_DIR}
-DOCS= CHANGES OPTIONS.md README.md
+DOCS= OPTIONS.md README.md
FILES_SUBST+= BIND_GROUP=${BIND_GROUP} \
BIND_USER=${BIND_USER} PAX=${PAX:Q} \
Index: pkgsrc/net/bind918/PLIST
diff -u pkgsrc/net/bind918/PLIST:1.4 pkgsrc/net/bind918/PLIST:1.5
--- pkgsrc/net/bind918/PLIST:1.4 Mon Apr 24 13:48:06 2023
+++ pkgsrc/net/bind918/PLIST Fri Dec 13 17:29:56 2024
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.4 2023/04/24 13:48:06 taca Exp $
+@comment $NetBSD: PLIST,v 1.5 2024/12/13 17:29:56 taca Exp $
bin/arpaname
bin/delv
bin/dig
@@ -296,7 +296,6 @@ sbin/named
sbin/rndc
sbin/rndc-confgen
sbin/tsig-keygen
-share/doc/bind9/CHANGES
share/doc/bind9/OPTIONS.md
share/doc/bind9/README.md
share/examples/bind9/bind.keys
Index: pkgsrc/net/bind918/distinfo
diff -u pkgsrc/net/bind918/distinfo:1.23 pkgsrc/net/bind918/distinfo:1.24
--- pkgsrc/net/bind918/distinfo:1.23 Mon Oct 21 13:24:45 2024
+++ pkgsrc/net/bind918/distinfo Fri Dec 13 17:29:56 2024
@@ -1,11 +1,11 @@
-$NetBSD: distinfo,v 1.23 2024/10/21 13:24:45 taca Exp $
+$NetBSD: distinfo,v 1.24 2024/12/13 17:29:56 taca Exp $
-BLAKE2s (bind-9.18.31.tar.xz) = e91aa18a0bbfb992bff401d9c834742fac569a9de4a653478a8710fca3bdbbad
-SHA512 (bind-9.18.31.tar.xz) = e51873484be3ee367eb1e601b8e0adc45abcdb16df04021ea42ffcc51b99821f8b30f67b2a693a90ad3efa51698a651c8da9d7947ee8fa19680f627afe1f7034
-Size (bind-9.18.31.tar.xz) = 5385812 bytes
+BLAKE2s (bind-9.18.32.tar.xz) = bade94bc1d29146ef54d0558e6a1aaea968d7f3e6b2e3e24ef91caab54e4861e
+SHA512 (bind-9.18.32.tar.xz) = fa01978ca44cb5d559d8675dda4272b1327aebc0dca68b2e7b948e8c1bbd82da74f6258d40896ddccf86711d554b7ed4c0df93143e78b663724466738ac1320d
+Size (bind-9.18.32.tar.xz) = 5332480 bytes
SHA1 (patch-bin_named_main.c) = 4e4a763c478f1fcecb7e65968cf6ca20dacf01f1
SHA1 (patch-bin_named_os.c) = 5ecb0883076575d8ac5fcad68f9daad6c9be0d0b
-SHA1 (patch-bin_named_server.c) = 6e59d3f637ebb829eec2f76ba7c350fb5cf9be6d
+SHA1 (patch-bin_named_server.c) = 52190897c4c4b141d98ca5bca7cc3eb4c83ac584
SHA1 (patch-config.h.in) = 6072793048cdf590863046355eeffa1d93524c36
SHA1 (patch-configure.ac) = 65f4255300a0ab3b6b663fe59412570fd7b08675
SHA1 (patch-lib_dns_byaddr.c) = 647ddaaaf040233e18d1a87d83bc2bd63d2a20e3
@@ -22,10 +22,10 @@ SHA1 (patch-lib_dns_zone.c) = cd7bc1e76c
SHA1 (patch-lib_isc_include_isc_netmgr.h) = 48ac44c6a9b81e6b442deba6c075653d3691464b
SHA1 (patch-lib_isc_net.c) = 743de2701fa96ef25e5689f40e381628cff641d5
SHA1 (patch-lib_isc_netmgr_netmgr-int.h) = d84993edf254605f85421fbdd2fc523255c7316d
-SHA1 (patch-lib_isc_netmgr_netmgr.c) = 0e94f78e0f6ac43197883adac7828a3f0d04291c
+SHA1 (patch-lib_isc_netmgr_netmgr.c) = ad4ad0167d6c8c757a2f794e54b9d3314da370e3
SHA1 (patch-lib_isc_rwlock.c) = 1d114248ddee20db7a7429afab446f8b2f0dca82
SHA1 (patch-lib_isc_siphash.c) = 2dd80dde7bd8e869a3cf03c1699665b56eaaf866
-SHA1 (patch-lib_isc_time.c) = 22780fd25d89a0ece46ec1624b3977ca4c46281a
+SHA1 (patch-lib_isc_time.c) = a8ad9e2f18c58927e58aeda63041b5f5d54b2fa8
SHA1 (patch-lib_isc_timer.c) = aea2019bbf3d84cad77af432a2bbdf0da8f2f893
SHA1 (patch-lib_ns_Makefile.am) = a91e1713185c4366e96bf52ebee38e3b7e35a0c6
SHA1 (patch-lib_ns_client.c) = 4093c82254321e6c6eaa40ea1cf738b3f9bda0bb
Index: pkgsrc/net/bind918/patches/patch-bin_named_server.c
diff -u pkgsrc/net/bind918/patches/patch-bin_named_server.c:1.1 pkgsrc/net/bind918/patches/patch-bin_named_server.c:1.2
--- pkgsrc/net/bind918/patches/patch-bin_named_server.c:1.1 Sun Dec 11 01:57:55 2022
+++ pkgsrc/net/bind918/patches/patch-bin_named_server.c Fri Dec 13 17:29:56 2024
@@ -1,11 +1,11 @@
-$NetBSD: patch-bin_named_server.c,v 1.1 2022/12/11 01:57:55 sekiya Exp $
+$NetBSD: patch-bin_named_server.c,v 1.2 2024/12/13 17:29:56 taca Exp $
* Take from NetBSD base, especially disable checking working directory
is writable as BIND_USER in NetBSD base system.
---- bin/named/server.c.orig 2020-05-06 09:59:35.000000000 +0000
+--- bin/named/server.c.orig 2024-12-03 13:00:51.226928524 +0000
+++ bin/named/server.c
-@@ -6667,12 +6667,14 @@ directory_callback(const char *clausenam
+@@ -7161,12 +7161,14 @@ directory_callback(const char *clausenam
directory);
}
@@ -14,13 +14,13 @@ $NetBSD: patch-bin_named_server.c,v 1.1
isc_log_write(named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
NAMED_LOGMODULE_SERVER, ISC_LOG_ERROR,
"directory '%s' is not writable", directory);
- return (ISC_R_NOPERM);
+ return ISC_R_NOPERM;
}
+#endif
result = isc_dir_chdir(directory);
if (result != ISC_R_SUCCESS) {
-@@ -9110,6 +9112,7 @@ load_configuration(const char *filename,
+@@ -9560,6 +9562,7 @@ load_configuration(const char *filename,
named_os_changeuser();
}
@@ -28,7 +28,7 @@ $NetBSD: patch-bin_named_server.c,v 1.1
/*
* Check that the working directory is writable.
*/
-@@ -9120,7 +9123,7 @@ load_configuration(const char *filename,
+@@ -9570,7 +9573,7 @@ load_configuration(const char *filename,
result = ISC_R_NOPERM;
goto cleanup;
}
Index: pkgsrc/net/bind918/patches/patch-lib_isc_netmgr_netmgr.c
diff -u pkgsrc/net/bind918/patches/patch-lib_isc_netmgr_netmgr.c:1.2 pkgsrc/net/bind918/patches/patch-lib_isc_netmgr_netmgr.c:1.3
--- pkgsrc/net/bind918/patches/patch-lib_isc_netmgr_netmgr.c:1.2 Tue Feb 13 13:50:39 2024
+++ pkgsrc/net/bind918/patches/patch-lib_isc_netmgr_netmgr.c Fri Dec 13 17:29:56 2024
@@ -1,10 +1,10 @@
-$NetBSD: patch-lib_isc_netmgr_netmgr.c,v 1.2 2024/02/13 13:50:39 taca Exp $
+$NetBSD: patch-lib_isc_netmgr_netmgr.c,v 1.3 2024/12/13 17:29:56 taca Exp $
* Take from NetBSD base.
---- lib/isc/netmgr/netmgr.c.orig 2024-02-11 10:42:55.700991300 +0000
+--- lib/isc/netmgr/netmgr.c.orig 2024-12-03 13:00:51.590934387 +0000
+++ lib/isc/netmgr/netmgr.c
-@@ -314,7 +314,7 @@ isc__netmgr_create(isc_mem_t *mctx, uint
+@@ -323,7 +323,7 @@ isc__netmgr_create(isc_mem_t *mctx, uint
mgr->workers_running++;
isc_thread_create(nm_thread, &mgr->workers[i], &worker->thread);
@@ -13,8 +13,8 @@ $NetBSD: patch-lib_isc_netmgr_netmgr.c,v
isc_thread_setname(worker->thread, name);
}
-@@ -1910,6 +1910,13 @@ isc_nmhandle_getdata(isc_nmhandle_t *han
- return (handle->opaque);
+@@ -1928,6 +1928,13 @@ isc_nmhandle_getdata(isc_nmhandle_t *han
+ return handle->opaque;
}
+int
Index: pkgsrc/net/bind918/patches/patch-lib_isc_time.c
diff -u pkgsrc/net/bind918/patches/patch-lib_isc_time.c:1.2 pkgsrc/net/bind918/patches/patch-lib_isc_time.c:1.3
--- pkgsrc/net/bind918/patches/patch-lib_isc_time.c:1.2 Wed Feb 8 00:13:44 2023
+++ pkgsrc/net/bind918/patches/patch-lib_isc_time.c Fri Dec 13 17:29:56 2024
@@ -1,8 +1,8 @@
-$NetBSD: patch-lib_isc_time.c,v 1.2 2023/02/08 00:13:44 taca Exp $
+$NetBSD: patch-lib_isc_time.c,v 1.3 2024/12/13 17:29:56 taca Exp $
* More check time_t range.
---- lib/isc/time.c.orig 2023-01-12 22:21:15.270402532 +0000
+--- lib/isc/time.c.orig 2024-12-03 13:00:51.595934467 +0000
+++ lib/isc/time.c
@@ -318,7 +318,7 @@ isc_time_seconds(const isc_time_t *t) {
@@ -30,6 +30,6 @@ $NetBSD: patch-lib_isc_time.c,v 1.2 2023
+ * (Let's hope the compiler got the actual test right.)
+ */
+ UNUSED(i);
- return (ISC_R_RANGE);
+ return ISC_R_RANGE;
}
Home |
Main Index |
Thread Index |
Old Index