Received: by mail.netbsd.org (Postfix, from userid 605) id 04A6584D1C; Wed, 17 Feb 2021 21:36:05 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 3DC8A84CF1 for ; Wed, 17 Feb 2021 21:36:04 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([IPv6:::1]) by localhost (mail.netbsd.org [IPv6:::1]) (amavisd-new, port 10025) with ESMTP id nBuWyMKTIQFh for ; Wed, 17 Feb 2021 21:36:03 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.netbsd.org [199.233.217.197]) by mail.netbsd.org (Postfix) with ESMTP id 5D29E84CDA for ; Wed, 17 Feb 2021 21:36:03 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id 5687EFA95; Wed, 17 Feb 2021 21:36:03 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1613597763234250" MIME-Version: 1.0 Date: Wed, 17 Feb 2021 21:36:03 +0000 From: "Thomas Klausner" Subject: CVS commit: pkgsrc/net/bind916 To: pkgsrc-changes@NetBSD.org Reply-To: wiz@netbsd.org X-Mailer: log_accum Message-Id: <20210217213603.5687EFA95@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_1613597763234250 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: wiz Date: Wed Feb 17 21:36:03 UTC 2021 Modified Files: pkgsrc/net/bind916: Makefile distinfo pkgsrc/net/bind916/patches: patch-lib_ns_client.c Log Message: bind: update to 9.16.12. XXX: why does this have so many patches? --- 9.16.12 released --- 5578. [protocol] Make "check-names" accept A records below "_spf", "_spf_rate", and "_spf_verify" labels in order to cater for the "exists" SPF mechanism specified in RFC 7208 section 5.7 and appendix D.1. [GL #2377] 5577. [bug] Fix the "three is a crowd" key rollover bug in KASP by correctly implementing Equation (2) of the "Flexible and Robust Key Rollover" paper. [GL #2375] 5575. [bug] When migrating to KASP, BIND 9 considered keys with the "Inactive" and/or "Delete" timing metadata to be possible active keys. This has been fixed. [GL #2406] 5572. [bug] Address potential double free in generatexml(). [GL #2420] 5571. [bug] named failed to start when its configuration included a zone with a non-builtin "allow-update" ACL attached. [GL #2413] 5570. [bug] Improve performance of the DNSSEC verification code by reducing the number of repeated calls to dns_dnssec_keyfromrdata(). [GL #2073] 5569. [bug] Emit useful error message when "rndc retransfer" is applied to a zone of inappropriate type. [GL #2342] 5568. [bug] Fixed a crash in "dnssec-keyfromlabel" when using ECDSA keys. [GL #2178] 5567. [bug] Dig now reports unknown dash options while pre-parsing the options. This prevents "-multi" instead of "+multi" from reporting memory usage before ending option parsing with "Invalid option: -lti". [GL #2403] 5566. [func] Add "stale-answer-client-timeout" option, which is the amount of time a recursive resolver waits before attempting to answer the query using stale data from cache. [GL #2247] 5565. [func] The SONAMEs for BIND 9 libraries now include the current BIND 9 version number, in an effort to tightly couple internal libraries with a specific release. [GL #2387] 5562. [security] Fix off-by-one bug in ISC SPNEGO implementation. (CVE-2020-8625) [GL #2354] 5561. [bug] KASP incorrectly set signature validity to the value of the DNSKEY signature validity. This is now fixed. [GL #2383] 5560. [func] The default value of "max-stale-ttl" has been changed from 12 hours to 1 day and the default value of "stale-answer-ttl" has been changed from 1 second to 30 seconds, following RFC 8767 recommendations. [GL #2248] 5456. [func] Added "primaries" as a synonym for "masters" in named.conf, and "primary-only" as a synonym for "master-only" in the parameters to "notify", to bring terminology up-to-date with RFC 8499. [GL #1948] 5362. [func] Limit the size of IXFR responses so that AXFR will be used instead if it would be smaller. This is controlled by the "max-ixfr-ratio" option, which is a percentage representing the ratio of IXFR size to the size of the entire zone. This value cannot exceed 100%, which is the default. [GL #1515] To generate a diff of this commit: cvs rdiff -u -r1.9 -r1.10 pkgsrc/net/bind916/Makefile \ pkgsrc/net/bind916/distinfo cvs rdiff -u -r1.1 -r1.2 pkgsrc/net/bind916/patches/patch-lib_ns_client.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1613597763234250 Content-Disposition: inline Content-Length: 4256 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/net/bind916/Makefile diff -u pkgsrc/net/bind916/Makefile:1.9 pkgsrc/net/bind916/Makefile:1.10 --- pkgsrc/net/bind916/Makefile:1.9 Fri Jan 29 16:17:15 2021 +++ pkgsrc/net/bind916/Makefile Wed Feb 17 21:36:03 2021 @@ -1,4 +1,4 @@ -# $NetBSD: Makefile,v 1.9 2021/01/29 16:17:15 otis Exp $ +# $NetBSD: Makefile,v 1.10 2021/02/17 21:36:03 wiz Exp $ DISTNAME= bind-${BIND_VERSION} PKGNAME= ${DISTNAME:S/-P/pl/} @@ -15,7 +15,7 @@ CONFLICTS+= host-[0-9]* MAKE_JOBS_SAFE= no -BIND_VERSION= 9.16.11 +BIND_VERSION= 9.16.12 BUILD_DEFS+= BIND_DIR VARBASE Index: pkgsrc/net/bind916/distinfo diff -u pkgsrc/net/bind916/distinfo:1.9 pkgsrc/net/bind916/distinfo:1.10 --- pkgsrc/net/bind916/distinfo:1.9 Fri Jan 29 16:17:15 2021 +++ pkgsrc/net/bind916/distinfo Wed Feb 17 21:36:03 2021 @@ -1,9 +1,9 @@ -$NetBSD: distinfo,v 1.9 2021/01/29 16:17:15 otis Exp $ +$NetBSD: distinfo,v 1.10 2021/02/17 21:36:03 wiz Exp $ -SHA1 (bind-9.16.11.tar.xz) = 1bfb5725c85fd9dffe868d8e826a1f8c0de509cc -RMD160 (bind-9.16.11.tar.xz) = 65d5e1c21f0e1b97cc785ffc6790ebc76d88741f -SHA512 (bind-9.16.11.tar.xz) = 5ed632df7c74f5e6693db9b378450ea3073b8002e9924df1d0465f8b8edb933df3a853d3965a290a0477a67ca2bfa79f679d7e344db08a65462860c58d04dc1b -Size (bind-9.16.11.tar.xz) = 5007520 bytes +SHA1 (bind-9.16.12.tar.xz) = 4e75a4c9ffb905d7eaa389464f0f3418c94cb2e7 +RMD160 (bind-9.16.12.tar.xz) = 7b180be178a847af1f47f06fbfec4bf79326df68 +SHA512 (bind-9.16.12.tar.xz) = 001613bd3c8bfc73d60bf3c053b233233a981132206e1ae5847820c5416ba0d65b0e026817ea3a718c7d3745c28a8de8dd9fb4355344955bead7bc2e1433e074 +Size (bind-9.16.12.tar.xz) = 5017756 bytes SHA1 (patch-bin_dig_dighost.c) = b1073911d80ecd519af98b6678968296ff8c0c98 SHA1 (patch-bin_dig_include_dig_dig.h) = 10166f5bb98b208c7b10d63eb31e8253f704acc8 SHA1 (patch-bin_named_Makefile.in) = f1367da6a226ba44d0ee13acf00b8abeb5b1b7eb @@ -50,7 +50,7 @@ SHA1 (patch-lib_isc_unix_net.c) = c654f6 SHA1 (patch-lib_isc_unix_socket.c) = a034eebc922a3266fdf5acc5fe849709eccbb6ca SHA1 (patch-lib_isc_unix_time.c) = fac9e66754e099f53ba8c499f5f179825a0b0fbd SHA1 (patch-lib_ns_Makefile.in) = 5d3ecf4d6673cf227635c03779e9969e6eeb8227 -SHA1 (patch-lib_ns_client.c) = e0453a7483a4f899023e0c5ab970cda241976b90 +SHA1 (patch-lib_ns_client.c) = c5d9e41f58027bdfa6a1cb43cd2cd35b44e85227 SHA1 (patch-lib_ns_include_ns_client.h) = 56009c601d54491ffd16f6438d55206705a5aa23 SHA1 (patch-lib_ns_include_ns_pfilter.h) = cc86752971b4f9f7492283c4ad3ff29bc1bae237 SHA1 (patch-lib_ns_interfacemgr.c) = fc31720734b02155acd7fa9b370a6ebb82022532 Index: pkgsrc/net/bind916/patches/patch-lib_ns_client.c diff -u pkgsrc/net/bind916/patches/patch-lib_ns_client.c:1.1 pkgsrc/net/bind916/patches/patch-lib_ns_client.c:1.2 --- pkgsrc/net/bind916/patches/patch-lib_ns_client.c:1.1 Sun Aug 9 15:20:22 2020 +++ pkgsrc/net/bind916/patches/patch-lib_ns_client.c Wed Feb 17 21:36:03 2021 @@ -1,8 +1,8 @@ -$NetBSD: patch-lib_ns_client.c,v 1.1 2020/08/09 15:20:22 taca Exp $ +$NetBSD: patch-lib_ns_client.c,v 1.2 2021/02/17 21:36:03 wiz Exp $ * Take from NetBSD base. ---- lib/ns/client.c.orig 2020-05-06 09:59:35.000000000 +0000 +--- lib/ns/client.c.orig 2021-02-04 11:35:16.000000000 +0000 +++ lib/ns/client.c @@ -87,8 +87,8 @@ isc_log_write(ns_lctx, NS_LOGCATEGORY_CLIENT, NS_LOGMODULE_CLIENT, \ @@ -24,7 +24,7 @@ $NetBSD: patch-lib_ns_client.c,v 1.1 202 LIBNS_EXTERNAL_DATA atomic_uint_fast32_t ns_client_requests; #else /* if defined(_WIN32) && !defined(_WIN64) */ LIBNS_EXTERNAL_DATA atomic_uint_fast64_t ns_client_requests; -@@ -2334,6 +2334,8 @@ ns__client_setup(ns_client_t *client, ns +@@ -2309,6 +2309,8 @@ ns__client_setup(ns_client_t *client, ns * Retain these values from the existing client, but * zero every thing else. */ @@ -33,11 +33,11 @@ $NetBSD: patch-lib_ns_client.c,v 1.1 202 *client = (ns_client_t){ .magic = 0, .mctx = oldmctx, .manager = oldmgr, -@@ -2342,6 +2344,7 @@ ns__client_setup(ns_client_t *client, ns +@@ -2317,6 +2319,7 @@ ns__client_setup(ns_client_t *client, ns .sendbuf = sendbuf, .message = message, .query = query }; +#endif } - client->state = NS_CLIENTSTATE_INACTIVE; + client->query.attributes &= ~NS_QUERYATTR_ANSWERED; --_----------=_1613597763234250--