Apply a fix from upstream: https://github.com/NLnetLabs/unbound/pull/122 which fixes https://github.com/NLnetLabs/unbound/issues/125 Briefly: TCP socket timeouts would effectively be disabled after the exchange of the initial DNS query/response. Bump PKGREVISION.diff -r1.72 -r1.73 pkgsrc/net/unbound/Makefile
(he)
@@ -1,16 +1,17 @@ | @@ -1,16 +1,17 @@ | |||
1 | # $NetBSD: Makefile,v 1.72 2019/11/19 10:10:44 he Exp $ | 1 | # $NetBSD: Makefile,v 1.73 2019/12/03 08:08:58 he Exp $ | |
2 | 2 | |||
3 | DISTNAME= unbound-1.9.5 | 3 | DISTNAME= unbound-1.9.5 | |
4 | PKGREVISION= 1 | |||
4 | CATEGORIES= net | 5 | CATEGORIES= net | |
5 | MASTER_SITES= http://www.nlnetlabs.nl/downloads/unbound/ | 6 | MASTER_SITES= http://www.nlnetlabs.nl/downloads/unbound/ | |
6 | 7 | |||
7 | MAINTAINER= pettai@NetBSD.org | 8 | MAINTAINER= pettai@NetBSD.org | |
8 | HOMEPAGE= http://www.unbound.net/ | 9 | HOMEPAGE= http://www.unbound.net/ | |
9 | COMMENT= DNS resolver and recursive server | 10 | COMMENT= DNS resolver and recursive server | |
10 | LICENSE= modified-bsd | 11 | LICENSE= modified-bsd | |
11 | 12 | |||
12 | BUILD_DEFS+= VARBASE UNBOUND_USER UNBOUND_GROUP | 13 | BUILD_DEFS+= VARBASE UNBOUND_USER UNBOUND_GROUP | |
13 | FILES_SUBST+= UNBOUND_USER=${UNBOUND_USER} UNBOUND_GROUP=${UNBOUND_GROUP} | 14 | FILES_SUBST+= UNBOUND_USER=${UNBOUND_USER} UNBOUND_GROUP=${UNBOUND_GROUP} | |
14 | 15 | |||
15 | USE_LIBTOOL= yes | 16 | USE_LIBTOOL= yes | |
16 | CONFIGURE_ARGS+= --enable-allsymbols | 17 | CONFIGURE_ARGS+= --enable-allsymbols |
@@ -1,7 +1,8 @@ | @@ -1,7 +1,8 @@ | |||
1 | $NetBSD: distinfo,v 1.54 2019/11/19 10:10:44 he Exp $ | 1 | $NetBSD: distinfo,v 1.55 2019/12/03 08:08:58 he Exp $ | |
2 | 2 | |||
3 | SHA1 (unbound-1.9.5.tar.gz) = e5a417fe46e5f2911b91e5ec6bbedc2ed14d9d0b | 3 | SHA1 (unbound-1.9.5.tar.gz) = e5a417fe46e5f2911b91e5ec6bbedc2ed14d9d0b | |
4 | RMD160 (unbound-1.9.5.tar.gz) = a49319ccc743709687792a57f1796acfa22e791e | 4 | RMD160 (unbound-1.9.5.tar.gz) = a49319ccc743709687792a57f1796acfa22e791e | |
5 | SHA512 (unbound-1.9.5.tar.gz) = 0b198b49165b25c93899ca41fead67c479e5b6fd255f7e2af6930f4b9898c73d8a72caf376fce9a2a33199d0764db58388371c3fdbd442999ddfdb0b8b5394ea | 5 | SHA512 (unbound-1.9.5.tar.gz) = 0b198b49165b25c93899ca41fead67c479e5b6fd255f7e2af6930f4b9898c73d8a72caf376fce9a2a33199d0764db58388371c3fdbd442999ddfdb0b8b5394ea | |
6 | Size (unbound-1.9.5.tar.gz) = 5686689 bytes | 6 | Size (unbound-1.9.5.tar.gz) = 5686689 bytes | |
7 | SHA1 (patch-configure) = eabd0c478e92ebe37adf143849389e0e792dc77f | 7 | SHA1 (patch-configure) = eabd0c478e92ebe37adf143849389e0e792dc77f | |
8 | SHA1 (patch-util_netevent.c) = 3fba509f23d74fce18e45ffe1fcdb97ad609be46 |
$NetBSD: patch-util_netevent.c,v 1.1 2019/12/03 08:08:58 he Exp $
Apply fix from
https://github.com/NLnetLabs/unbound/pull/122
which fixes
https://github.com/NLnetLabs/unbound/issues/125
Briefly: TCP socket timeouts would effectively be disabled after
the exchange of the initial DNS query/response.
--- util/netevent.c.orig 2019-11-19 06:51:50.000000000 +0000
+++ util/netevent.c
@@ -1001,7 +1001,7 @@ tcp_callback_writer(struct comm_point* c
tcp_req_info_handle_writedone(c->tcp_req_info);
} else {
comm_point_stop_listening(c);
- comm_point_start_listening(c, -1, -1);
+ comm_point_start_listening(c, -1, c->tcp_timeout_msec);
}
}