Received: by mail.netbsd.org (Postfix, from userid 605) id AEA6B84D75; Sun, 21 Oct 2018 15:51:48 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id AF0A984D60 for ; Sun, 21 Oct 2018 15:51:47 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id Ey6kcYWdj_Gy for ; Sun, 21 Oct 2018 15:51:46 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.netbsd.org [199.233.217.197]) by mail.netbsd.org (Postfix) with ESMTP id 6092184D21 for ; Sun, 21 Oct 2018 15:51:46 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id 543A2FBEE; Sun, 21 Oct 2018 15:51:46 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_15401371067010" MIME-Version: 1.0 Date: Sun, 21 Oct 2018 15:51:46 +0000 From: "Takahiro Kambe" Subject: CVS commit: pkgsrc/net/bind912 To: pkgsrc-changes@NetBSD.org Reply-To: taca@netbsd.org X-Mailer: log_accum Message-Id: <20181021155146.543A2FBEE@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_15401371067010 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: taca Date: Sun Oct 21 15:51:46 UTC 2018 Modified Files: pkgsrc/net/bind912: Makefile distinfo pkgsrc/net/bind912/patches: patch-lib_isc_unix_socket.c Log Message: net/bind912: udpate to 9.12.3 --- 9.12.3 released --- --- 9.12.3rc1 released --- 5038. [bug] Chaosnet addresses were compared incorrectly. [GL #562] 5035. [test] Fixed errors that prevented the DNSRPS subtests from running in the rpz and rpzrecurse system tests. [GL #503] 5034. [bug] A race between threads could prevent zone maintenance scheduled immediately after zone load from being performed. [GL #542] 5033. [bug] When adding NTAs to multiple views using "rndc nta", the text returned via rndc was incorrectly terminated after the first line, making it look as if only one NTA had been added. Also, it was not possible to differentiate between views with the same name but different classes; this has been corrected with the addition of a "-class" option. [GL #105] 5032. [func] Add krb5-selfsub and ms-selfsub update policy rules. [GL #511] 5030. [bug] Align CMSG buffers to a 64-bit boundary, fixes crash on architectures with strict alignment. [GL #521] 5028. [bug] Spread the initial RRSIG expiration times over the entire working sig-validity-interval when signing a zone in named to even out re-signing and transfer loads. [GL #418] 5026. [bug] rndc reconfig should not touch already loaded zones. [GL #276] 5022. [doc] Update ms-self, ms-subdomain, krb5-self, and krb5-subdomain documentation. [GL !708] 5021. [bug] dig returned a non-zero exit code when it received a reply over TCP after a retry. [GL #487] 5019. [cleanup] A message is now logged when ixfr-from-differences is set at zone level for an inline-signed zone. [GL #470] 5018. [bug] Fix incorrect sizeof arguments in lib/isc/pk11.c. [GL !588] 5017. [bug] lib/isc/pk11.c failed to unlink the session before releasing the lock which is unsafe. [GL !589] 5016. [bug] Named could assert with overlapping filter-aaaa and dns64 acls. [GL #445] 5015. [bug] Reloading all zones caused zone maintenance to cease for inline-signed zones. [GL #435] 5014. [bug] Signatures loaded from the journal for the signed version of an inline-signed zone were not scheduled for refresh. [GL #482] 5013. [bug] A referral response with a non-empty ANSWER section was inadvertently being treated as an error. [GL #390] 5012. [bug] Fix lock order reversal in pk11_initialize. [GL !590] 5009. [bug] Upon an OpenSSL failure, the first error in the OpenSSL error queue was not logged. [GL #476] 5008. [bug] "rndc signing -nsec3param ..." requests were silently ignored for zones which were not yet loaded or transferred. [GL #468] 5007. [cleanup] Replace custom ISC boolean and integer data types with C99 stdint.h and stdbool.h types. [GL #9] 5006. [cleanup] Code preparing a delegation response was extracted from query_delegation() and query_zone_delegation() into a separate function in order to decrease code duplication. [GL #431] 5005. [bug] dnssec-verify, and dnssec-signzone at the verification step, failed on some validly signed zones. [GL #442] 5004. [bug] 'rndc reconfig' could cause inline zones to stop re-signing. [GL #439] 5003. [bug] dns_acl_isinsecure did not handle geoip elements. [GL #406] 5002. [bug] mdig: Handle malformed +ednsopt option, support 100 +ednsopt options per query rather than 100 total and address memory leaks if +ednsopt was specified. [GL #410] 5001. [bug] Fix refcount errors on error paths. [GL !563] 5000. [bug] named_server_servestale() could leave the server in exclusive mode if an error occured. [GL #441] 4996. [bug] dig: Handle malformed +ednsopt option. [GL #403] 4995. [test] Add tests for "tcp-self" update policy. [GL !282] 4994. [bug] Trust anchor telemetry queries were not being sent upstream for locally served zones. [GL #392] 4992. [bug] The wrong address was being logged for trust anchor telemetry queries. [GL #379] 4990. [bug] Prevent a possible NULL reference in pkcs11-keygen. [GL #401] 4988. [bug] Don't synthesize NXDOMAIN from NSEC for records under a DNAME. [GL #386] To generate a diff of this commit: cvs rdiff -u -r1.4 -r1.5 pkgsrc/net/bind912/Makefile cvs rdiff -u -r1.2 -r1.3 pkgsrc/net/bind912/distinfo cvs rdiff -u -r1.1 -r1.2 \ pkgsrc/net/bind912/patches/patch-lib_isc_unix_socket.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_15401371067010 Content-Disposition: inline Content-Length: 4805 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/net/bind912/Makefile diff -u pkgsrc/net/bind912/Makefile:1.4 pkgsrc/net/bind912/Makefile:1.5 --- pkgsrc/net/bind912/Makefile:1.4 Thu Sep 27 04:24:18 2018 +++ pkgsrc/net/bind912/Makefile Sun Oct 21 15:51:46 2018 @@ -1,4 +1,4 @@ -# $NetBSD: Makefile,v 1.4 2018/09/27 04:24:18 wiz Exp $ +# $NetBSD: Makefile,v 1.5 2018/10/21 15:51:46 taca Exp $ DISTNAME= bind-${BIND_VERSION} PKGNAME= ${DISTNAME:S/-P/pl/} @@ -15,7 +15,7 @@ CONFLICTS+= host-[0-9]* MAKE_JOBS_SAFE= no USE_CWRAPPERS= no -BIND_VERSION= 9.12.2-P2 +BIND_VERSION= 9.12.3 .include "../../mk/bsd.prefs.mk" @@ -26,7 +26,6 @@ BUILD_DEFS+= BIND_DIR VARBASE USE_TOOLS+= pax perl pkg-config USE_LIBTOOL= yes GNU_CONFIGURE= yes -#CONFIG_SHELL= sh -x CONFIGURE_ARGS+= --with-libtool CONFIGURE_ARGS+= --sysconfdir=${PKG_SYSCONFDIR} Index: pkgsrc/net/bind912/distinfo diff -u pkgsrc/net/bind912/distinfo:1.2 pkgsrc/net/bind912/distinfo:1.3 --- pkgsrc/net/bind912/distinfo:1.2 Thu Sep 20 10:03:03 2018 +++ pkgsrc/net/bind912/distinfo Sun Oct 21 15:51:46 2018 @@ -1,12 +1,12 @@ -$NetBSD: distinfo,v 1.2 2018/09/20 10:03:03 taca Exp $ +$NetBSD: distinfo,v 1.3 2018/10/21 15:51:46 taca Exp $ -SHA1 (bind-9.12.2-P2.tar.gz) = 2f18c562201b7a1288d21a2427718bacbc988eb1 -RMD160 (bind-9.12.2-P2.tar.gz) = 2bd96c309584b61fcc885f7fdde665b1040da7ae -SHA512 (bind-9.12.2-P2.tar.gz) = 458adf6b3d0df286e7d345a21c40b639efcb275e76f9e0bf4e40a5d76dcac875016324393e129f29397be326d1017367c506ec9cbb35871c98fad4281bc4e05a -Size (bind-9.12.2-P2.tar.gz) = 9422128 bytes +SHA1 (bind-9.12.3.tar.gz) = 55131f7ab7d9f970ec3097eba5bbfb06346bcf7a +RMD160 (bind-9.12.3.tar.gz) = bbfc7901afad2f2bcfa1d0515fd4eac01539da5e +SHA512 (bind-9.12.3.tar.gz) = ffb9a1fbf2ae06f5af51754ef3809ebd7239184359eda11c6f09a9959e362a3fbc78bad81538bfdb2aea64c4d9718f5e4fc06e726f465b888d1099bac6020922 +Size (bind-9.12.3.tar.gz) = 8616664 bytes SHA1 (patch-bin_tests_system_metadata_tests.sh) = d01a492d0b7738760bdbff714248e279a78fef28 SHA1 (patch-config.threads.in) = 8341bdb11888d3efdde5f115de91b1f46aa40bd0 SHA1 (patch-configure) = 020f4746544f74606ccc57cb30de7f7501a47e10 SHA1 (patch-contrib_dlz_config.dlz.in) = 6c53d61aaaf1a952a867e4c4da0194db94f511d7 SHA1 (patch-lib_dns_rbt.c) = 8af91b6d40b591d28d15f7f98c9b7a82df234381 -SHA1 (patch-lib_isc_unix_socket.c) = d525e84924b42eb107b00aecdbc92fbb5a3df3db +SHA1 (patch-lib_isc_unix_socket.c) = 2b73d1fb3b5d807e83aab125325b7096ed9e4036 Index: pkgsrc/net/bind912/patches/patch-lib_isc_unix_socket.c diff -u pkgsrc/net/bind912/patches/patch-lib_isc_unix_socket.c:1.1 pkgsrc/net/bind912/patches/patch-lib_isc_unix_socket.c:1.2 --- pkgsrc/net/bind912/patches/patch-lib_isc_unix_socket.c:1.1 Sun Sep 9 13:16:01 2018 +++ pkgsrc/net/bind912/patches/patch-lib_isc_unix_socket.c Sun Oct 21 15:51:46 2018 @@ -1,33 +1,24 @@ -$NetBSD: patch-lib_isc_unix_socket.c,v 1.1 2018/09/09 13:16:01 taca Exp $ +$NetBSD: patch-lib_isc_unix_socket.c,v 1.2 2018/10/21 15:51:46 taca Exp $ -Make ENOBUFS a soft error -https://gitlab.isc.org/isc-projects/bind9/issues/462 +Apply fix from NetBSD revision 1.24. ---- lib/isc/unix/socket.c.orig 2018-07-24 17:22:12.000000000 +0000 +--- lib/isc/unix/socket.c.orig 2018-10-06 05:51:22.000000000 +0000 +++ lib/isc/unix/socket.c -@@ -256,6 +256,7 @@ typedef enum { poll_idle, poll_active, p - #define SOFT_ERROR(e) ((e) == EAGAIN || \ +@@ -257,6 +257,7 @@ typedef enum { poll_idle, poll_active, p (e) == EWOULDBLOCK || \ + (e) == ENOBUFS || \ (e) == EINTR || \ + (e) == ENOBUFS || \ (e) == 0) #define DLVL(x) ISC_LOGCATEGORY_GENERAL, ISC_LOGMODULE_SOCKET, ISC_LOG_DEBUG(x) -@@ -1951,7 +1952,7 @@ doio_recv(isc__socket_t *sock, isc_socke - SOFT_OR_HARD(EHOSTDOWN, ISC_R_HOSTDOWN); - /* HPUX 11.11 can return EADDRNOTAVAIL. */ - SOFT_OR_HARD(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL); -- ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES); -+ SOFT_OR_HARD(ENOBUFS, ISC_R_NORESOURCES); - /* Should never get this one but it was seen. */ - #ifdef ENOPROTOOPT - SOFT_OR_HARD(ENOPROTOOPT, ISC_R_HOSTUNREACH); -@@ -2148,7 +2149,7 @@ doio_send(isc__socket_t *sock, isc_socke - ALWAYS_HARD(EHOSTDOWN, ISC_R_HOSTUNREACH); - #endif - ALWAYS_HARD(ENETUNREACH, ISC_R_NETUNREACH); -- ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES); -+ SOFT_OR_HARD(ENOBUFS, ISC_R_NORESOURCES); - ALWAYS_HARD(EPERM, ISC_R_HOSTUNREACH); - ALWAYS_HARD(EPIPE, ISC_R_NOTCONNECTED); - ALWAYS_HARD(ECONNRESET, ISC_R_CONNECTIONRESET); +@@ -1574,7 +1575,8 @@ build_msghdr_send(isc__socket_t *sock, c + + #if defined(IPV6_USE_MIN_MTU) + if ((sock->type == isc_sockettype_udp) && +- ((dev->attributes & ISC_SOCKEVENTATTR_USEMINMTU) != 0)) ++ ((dev->attributes & ISC_SOCKEVENTATTR_USEMINMTU) != 0) && ++ (sock->pf == AF_INET6)) + { + int use_min_mtu = 1; /* -1, 0, 1 */ + --_----------=_15401371067010--