Sun, 02 Sep 2012 18:18:43 +0200
Introduce new version of tcpdump, reorder taglib and cryptbreaker to
the end because they fail to build on Linux, and correct flawed URLs
probably copied from the doxygen build entry.
michael@556 | 1 | Index: bin/named/unix/os.c |
michael@556 | 2 | --- bin/named/unix/os.c.orig 2008-05-06 03:32:51 +0200 |
michael@556 | 3 | +++ bin/named/unix/os.c 2008-07-25 07:47:14 +0200 |
michael@556 | 4 | @@ -261,6 +261,13 @@ |
michael@556 | 5 | SET_CAP(CAP_SETGID); |
michael@556 | 6 | |
michael@556 | 7 | /* |
michael@556 | 8 | + * Since we call chown, we need this. |
michael@556 | 9 | + */ |
michael@556 | 10 | +#if defined(CAP_CHOWN) |
michael@556 | 11 | + SET_CAP(CAP_CHOWN); |
michael@556 | 12 | +#endif |
michael@556 | 13 | + |
michael@556 | 14 | + /* |
michael@556 | 15 | * Without this, we run into problems reading a configuration file |
michael@556 | 16 | * owned by a non-root user and non-world-readable on startup. |
michael@556 | 17 | */ |
michael@556 | 18 | |
michael@556 | 19 | ----------------------------------------------------------------------------- |
michael@556 | 20 | |
michael@556 | 21 | As mentionned in http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/5a6cb9a54b56b199 |
michael@556 | 22 | "Assertion debug information" without this patch BIND+dlz crashes when |
michael@556 | 23 | doing zone transfer request ("host -la domain server") |
michael@556 | 24 | |
michael@556 | 25 | Index: bin/named/xfrout.c |
michael@556 | 26 | --- bin/named/xfrout.c.orig 2008-04-03 08:20:33.000000000 +0200 |
michael@556 | 27 | +++ bin/named/xfrout.c 2008-11-27 08:58:20.000000000 +0100 |
michael@556 | 28 | @@ -1744,6 +1745,7 @@ xfrout_senddone(isc_task_t *task, isc_ev |
michael@556 | 29 | sendstream(xfr); |
michael@556 | 30 | } else { |
michael@556 | 31 | /* End of zone transfer stream. */ |
michael@556 | 32 | + if (xfr->zone != NULL) |
michael@556 | 33 | inc_stats(xfr->zone, dns_nsstatscounter_xfrdone); |
michael@556 | 34 | xfrout_log(xfr, ISC_LOG_INFO, "%s ended", xfr->mnemonic); |
michael@556 | 35 | ns_client_next(xfr->client, ISC_R_SUCCESS); |
michael@556 | 36 | |
michael@556 | 37 | ----------------------------------------------------------------------------- |
michael@556 | 38 | |
michael@556 | 39 | OpenPKG intentionally uses a reused "rdnc.key" and a "rdnc.conf" |
michael@556 | 40 | and hence we don't want to see those warning messages. |
michael@556 | 41 | |
michael@556 | 42 | Index: bin/rndc/rndc.c |
michael@556 | 43 | --- bin/rndc/rndc.c.orig 2010-07-11 02:12:18.000000000 +0200 |
michael@556 | 44 | +++ bin/rndc/rndc.c 2011-02-06 17:08:38.000000000 +0100 |
michael@556 | 45 | @@ -468,9 +468,11 @@ |
michael@556 | 46 | admin_conffile, admin_keyfile); |
michael@556 | 47 | key_only = ISC_TRUE; |
michael@556 | 48 | } else if (! c_flag && isc_file_exists(admin_keyfile)) { |
michael@556 | 49 | + /* |
michael@556 | 50 | fprintf(stderr, "WARNING: key file (%s) exists, but using " |
michael@556 | 51 | "default configuration file (%s)\n", |
michael@556 | 52 | admin_keyfile, admin_conffile); |
michael@556 | 53 | + */ |
michael@556 | 54 | } |
michael@556 | 55 | |
michael@556 | 56 | DO("create parser", cfg_parser_create(mctx, log, pctxp)); |