pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/net/bind914 net/bind914: update to 9.14.2
details: https://anonhg.NetBSD.org/pkgsrc/rev/8e80aed07642
branches: trunk
changeset: 396052:8e80aed07642
user: taca <taca%pkgsrc.org@localhost>
date: Mon May 20 16:31:08 2019 +0000
description:
net/bind914: update to 9.14.2
pkgsrc change: remove "USE_CWRAPPERS=no".
--- 9.14.2 released ---
5233. [bug] Negative trust anchors did not work with "forward only;"
to validating resolvers. [GL #997]
5231. [protocol] Add support for displaying CLIENT-TAG and SERVER-TAG.
[GL #960]
5229. [protocol] Enforce known SSHFP fingerprint lengths. [GL #852]
5228. [cleanup] If trusted-keys and managed-keys are configured
simultaneously for the same name, the key cannot
be rolled automatically. This configuration now
logs a warning. [GL #868]
5224. [bug] Only test provide-ixfr on TCP streams. [GL #991]
5223. [bug] Fixed a race in the filter-aaaa plugin accessing
the hash table. [GL #1005]
5222. [bug] 'delv -t ANY' could leak memory. [GL #983]
5221. [test] Enable parallel execution of system tests on
Windows. [GL !4101]
5220. [cleanup] Refactor the isc_stat structure to take advantage
of stdatomic. [GL !1493]
5219. [bug] Fixed a race in the filter-aaaa plugin that could
trigger a crash when returning an instance object
to the memory pool. [GL #982]
5218. [bug] Conditionally include <dlfcn.h>. [GL #995]
5217. [bug] Restore key id calculation for RSAMD5. [GL #996]
5216. [bug] Fetches-per-zone counter wasn't updated correctly
when doing qname minimization. [GL #992]
5215. [bug] Change #5124 was incomplete; named could still
return FORMERR instead of SERVFAIL in some cases.
[GL #990]
5214. [bug] win32: named now removes its lock file upon shutdown.
[GL #979]
5213. [bug] win32: Eliminated a race which allowed named.exe running
as a service to be killed prematurely during shutdown.
[GL #978]
5211. [bug] Allow out-of-zone additional data to be included
in authoritative responses if recursion is allowed
and "minimal-responses" is disabled. This behavior
was inadvertently removed in change #4605. [GL #817]
5210. [bug] When dnstap is enabled and recursion is not
available, incoming queries are now logged
as "auth". Previously, this depended on whether
recursion was requested by the client, not on
whether recursion was available. [GL #963]
5209. [bug] When update-check-ksk is true, add_sigs was not
considering offline keys, leaving record sets signed
with the incorrect type key. [GL #763]
5208. [test] Run valid rdata wire encodings through totext+fromtext
and tofmttext+fromtext methods to check these methods.
[GL #899]
5207. [test] Check delv and dig TTL values. [GL #965]
5206. [bug] Delv could print out bad TTLs. [GL #965]
5205. [bug] Enforce that a DS hash exists. [GL #899]
5204. [test] Check that dns_rdata_fromtext() produces a record that
will be accepted by dns_rdata_fromwire(). [GL #852]
5203. [bug] Enforce whether key rdata exists or not in KEY,
DNSKEY, CDNSKEY and RKEY. [GL #899]
5202. [bug] <dns/ecs.h> was missing ISC_LANG_ENDDECLS. [GL #976]
5190. [bug] Ignore trust anchors using disabled algorithms.
[GL #806]
diffstat:
net/bind914/MESSAGE | 4 ++--
net/bind914/Makefile | 6 ++----
net/bind914/distinfo | 12 ++++++------
net/bind914/patches/patch-lib_isc_stats.c | 6 +++---
4 files changed, 13 insertions(+), 15 deletions(-)
diffs (89 lines):
diff -r df86207589ec -r 8e80aed07642 net/bind914/MESSAGE
--- a/net/bind914/MESSAGE Mon May 20 16:04:22 2019 +0000
+++ b/net/bind914/MESSAGE Mon May 20 16:31:08 2019 +0000
@@ -1,5 +1,5 @@
===========================================================================
-$NetBSD: MESSAGE,v 1.1 2019/04/30 03:34:34 taca Exp $
+$NetBSD: MESSAGE,v 1.2 2019/05/20 16:31:08 taca Exp $
Please consider running BIND under the pseudo user account "${BIND_USER}"
in a chroot environment for security reasons.
@@ -7,7 +7,7 @@
To achieve this, set the variable "named_chrootdir" in /etc/rc.conf to
the directory with the chroot environment e.g. "${BIND_DIR}".
-Note: named(8) requires writable directories under "/etc/namedb" which
+Note: named(8) requires writable directories under "/etc/namedb" which
specified by "directory" in "options" statement:
cache
diff -r df86207589ec -r 8e80aed07642 net/bind914/Makefile
--- a/net/bind914/Makefile Mon May 20 16:04:22 2019 +0000
+++ b/net/bind914/Makefile Mon May 20 16:31:08 2019 +0000
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.3 2019/05/07 06:56:23 wiz Exp $
+# $NetBSD: Makefile,v 1.4 2019/05/20 16:31:08 taca Exp $
DISTNAME= bind-${BIND_VERSION}
PKGNAME= ${DISTNAME:S/-P/pl/}
-PKGREVISION= 1
CATEGORIES= net
MASTER_SITES= ftp://ftp.isc.org/isc/bind9/${BIND_VERSION}/
@@ -14,9 +13,8 @@
CONFLICTS+= host-[0-9]*
MAKE_JOBS_SAFE= no
-USE_CWRAPPERS= no
-BIND_VERSION= 9.14.1
+BIND_VERSION= 9.14.2
.include "../../mk/bsd.prefs.mk"
diff -r df86207589ec -r 8e80aed07642 net/bind914/distinfo
--- a/net/bind914/distinfo Mon May 20 16:04:22 2019 +0000
+++ b/net/bind914/distinfo Mon May 20 16:31:08 2019 +0000
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.2 2019/05/02 13:29:53 taca Exp $
+$NetBSD: distinfo,v 1.3 2019/05/20 16:31:08 taca Exp $
-SHA1 (bind-9.14.1.tar.gz) = 29e43a99c059c5458822833b2267f237361feca6
-RMD160 (bind-9.14.1.tar.gz) = 12e8bec5d7eb29d588596a204220edfe12bbc743
-SHA512 (bind-9.14.1.tar.gz) = 560944951b6c6a2801967813597440f7ffb3687adf455ea27751d5976954643b9ea86d0da4661caf4fa9673c1d5c1ce7f34cce94a8edfa95eb60dd1cf7839c56
-Size (bind-9.14.1.tar.gz) = 6235968 bytes
+SHA1 (bind-9.14.2.tar.gz) = b46c8713804cb8de43ded17cfb852d2db8e184d9
+RMD160 (bind-9.14.2.tar.gz) = 74d9d8d29515aa7d57e9d986d6e4b0f8af6b7962
+SHA512 (bind-9.14.2.tar.gz) = f538e6b894e19084b3a25df85e4997b244878bbd3a080b9c77fda72e1b526d79006e9f140f22d5b6b33e81b94897b8f7b5ec4dd56800b4c13ba48b91422a2286
+Size (bind-9.14.2.tar.gz) = 6263879 bytes
SHA1 (patch-bin_named_Makefile.in) = 12e071c61e0f326d0fd7613c6b8884ad0da35214
SHA1 (patch-bin_named_main.c) = 51c8ab464a009575b6513c7ed4b79f89446eb7d0
SHA1 (patch-bin_named_pfilter.c) = b54f872c883c8fbc2d9c04df65c185dc057cc36b
@@ -37,6 +37,6 @@
SHA1 (patch-lib_isc_include_isc_socket.h) = 956beab8ea6a1a004b1d1682600ead6863ba05c9
SHA1 (patch-lib_isc_include_isc_types.h) = 985874069eee13504da4dca020d6fc964e8a1f83
SHA1 (patch-lib_isc_rwlock.c) = 7eb832915528d00e616b6c7503ec346143946876
-SHA1 (patch-lib_isc_stats.c) = ee363394c8f3f10e514ac390152302e7093aa249
+SHA1 (patch-lib_isc_stats.c) = 0dde2b7cbde80f608e52bf8136b3af227b65ba4b
SHA1 (patch-lib_isc_unix_socket.c) = 8f6ac08539fb4c9b3eb1aa5fe4c3811f010aa87b
SHA1 (patch-lib_isc_unix_time.c) = 04312e043601688aa2b0a09dad1bcb51d9273e9d
diff -r df86207589ec -r 8e80aed07642 net/bind914/patches/patch-lib_isc_stats.c
--- a/net/bind914/patches/patch-lib_isc_stats.c Mon May 20 16:04:22 2019 +0000
+++ b/net/bind914/patches/patch-lib_isc_stats.c Mon May 20 16:31:08 2019 +0000
@@ -1,8 +1,8 @@
-$NetBSD: patch-lib_isc_stats.c,v 1.1 2019/04/30 03:34:34 taca Exp $
+$NetBSD: patch-lib_isc_stats.c,v 1.2 2019/05/20 16:31:08 taca Exp $
* Platform fixes from NetBSD base system.
---- lib/isc/stats.c.orig 2019-04-06 20:09:59.000000000 +0000
+--- lib/isc/stats.c.orig 2019-05-10 04:51:34.000000000 +0000
+++ lib/isc/stats.c
@@ -30,7 +30,11 @@
#define ISC_STATS_MAGIC ISC_MAGIC('S', 't', 'a', 't')
@@ -15,4 +15,4 @@
+#endif
struct isc_stats {
- /*% Unlocked */
+ unsigned int magic;
Home |
Main Index |
Thread Index |
Old Index