Mon, 17 Sep 2012 19:10:10 +0200
Update to new version of vendor software although Oracle fails to deliver.
More specifically, newer db(3) patch revisions exist but Oracle has
removed them from the canonical download server URI for Berkely DB.
michael@556 | 1 | Index: bin/named/unix/os.c |
michael@556 | 2 | --- bin/named/unix/os.c.orig 2008-05-06 03:32:51 +0200 |
michael@556 | 3 | +++ bin/named/unix/os.c 2008-07-25 07:47:14 +0200 |
michael@556 | 4 | @@ -261,6 +261,13 @@ |
michael@556 | 5 | SET_CAP(CAP_SETGID); |
michael@556 | 6 | |
michael@556 | 7 | /* |
michael@556 | 8 | + * Since we call chown, we need this. |
michael@556 | 9 | + */ |
michael@556 | 10 | +#if defined(CAP_CHOWN) |
michael@556 | 11 | + SET_CAP(CAP_CHOWN); |
michael@556 | 12 | +#endif |
michael@556 | 13 | + |
michael@556 | 14 | + /* |
michael@556 | 15 | * Without this, we run into problems reading a configuration file |
michael@556 | 16 | * owned by a non-root user and non-world-readable on startup. |
michael@556 | 17 | */ |
michael@556 | 18 | |
michael@556 | 19 | ----------------------------------------------------------------------------- |
michael@556 | 20 | |
michael@556 | 21 | As mentionned in http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/5a6cb9a54b56b199 |
michael@556 | 22 | "Assertion debug information" without this patch BIND+dlz crashes when |
michael@556 | 23 | doing zone transfer request ("host -la domain server") |
michael@556 | 24 | |
michael@556 | 25 | Index: bin/named/xfrout.c |
michael@556 | 26 | --- bin/named/xfrout.c.orig 2008-04-03 08:20:33.000000000 +0200 |
michael@556 | 27 | +++ bin/named/xfrout.c 2008-11-27 08:58:20.000000000 +0100 |
michael@556 | 28 | @@ -1744,6 +1745,7 @@ xfrout_senddone(isc_task_t *task, isc_ev |
michael@556 | 29 | sendstream(xfr); |
michael@556 | 30 | } else { |
michael@556 | 31 | /* End of zone transfer stream. */ |
michael@556 | 32 | + if (xfr->zone != NULL) |
michael@556 | 33 | inc_stats(xfr->zone, dns_nsstatscounter_xfrdone); |
michael@556 | 34 | xfrout_log(xfr, ISC_LOG_INFO, "%s ended", xfr->mnemonic); |
michael@556 | 35 | ns_client_next(xfr->client, ISC_R_SUCCESS); |
michael@556 | 36 | |
michael@556 | 37 | ----------------------------------------------------------------------------- |
michael@556 | 38 | |
michael@556 | 39 | OpenPKG intentionally uses a reused "rdnc.key" and a "rdnc.conf" |
michael@556 | 40 | and hence we don't want to see those warning messages. |
michael@556 | 41 | |
michael@556 | 42 | Index: bin/rndc/rndc.c |
michael@556 | 43 | --- bin/rndc/rndc.c.orig 2010-07-11 02:12:18.000000000 +0200 |
michael@556 | 44 | +++ bin/rndc/rndc.c 2011-02-06 17:08:38.000000000 +0100 |
michael@556 | 45 | @@ -468,9 +468,11 @@ |
michael@556 | 46 | admin_conffile, admin_keyfile); |
michael@556 | 47 | key_only = ISC_TRUE; |
michael@556 | 48 | } else if (! c_flag && isc_file_exists(admin_keyfile)) { |
michael@556 | 49 | + /* |
michael@556 | 50 | fprintf(stderr, "WARNING: key file (%s) exists, but using " |
michael@556 | 51 | "default configuration file (%s)\n", |
michael@556 | 52 | admin_keyfile, admin_conffile); |
michael@556 | 53 | + */ |
michael@556 | 54 | } |
michael@556 | 55 | |
michael@556 | 56 | DO("create parser", cfg_parser_create(mctx, log, pctxp)); |