bind/bind.patch

Fri, 07 Sep 2012 19:08:07 +0200

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Fri, 07 Sep 2012 19:08:07 +0200
changeset 667
9dacbd1d1aa2
permissions
-rw-r--r--

Correct build configuration in Solaris subdir, correct english grammar,
remove irrelevant strip notice, introduce custom CFLAG logic, facilitate
use of Solaris Studio compiler with needed build configuration
adjustments, conditionally build 64 bit position independent code,
and accommodate tun(7) in newer Solaris releases by renaming driver
and module from conflicting 'tun' to 'vtun'. These changes include
some nonstandard 'I give up' logic causing out of tree builds by
manipulating the PATH, for example.

     1 Index: bin/named/unix/os.c
     2 --- bin/named/unix/os.c.orig	2008-05-06 03:32:51 +0200
     3 +++ bin/named/unix/os.c	2008-07-25 07:47:14 +0200
     4 @@ -261,6 +261,13 @@
     5  	SET_CAP(CAP_SETGID);
     7  	/*
     8 +	 * Since we call chown, we need this.
     9 +	 */
    10 +#if defined(CAP_CHOWN)
    11 +	SET_CAP(CAP_CHOWN);
    12 +#endif
    13 +
    14 +	/*
    15  	 * Without this, we run into problems reading a configuration file
    16  	 * owned by a non-root user and non-world-readable on startup.
    17  	 */
    19 -----------------------------------------------------------------------------
    21 As mentionned in http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/5a6cb9a54b56b199
    22 "Assertion debug information" without this patch BIND+dlz crashes when
    23 doing zone transfer request ("host -la domain server")
    25 Index: bin/named/xfrout.c
    26 --- bin/named/xfrout.c.orig	2008-04-03 08:20:33.000000000 +0200
    27 +++ bin/named/xfrout.c	2008-11-27 08:58:20.000000000 +0100
    28 @@ -1744,6 +1745,7 @@ xfrout_senddone(isc_task_t *task, isc_ev
    29  		sendstream(xfr);
    30  	} else {
    31  		/* End of zone transfer stream. */
    32 +               if (xfr->zone != NULL)
    33  		inc_stats(xfr->zone, dns_nsstatscounter_xfrdone);
    34  		xfrout_log(xfr, ISC_LOG_INFO, "%s ended", xfr->mnemonic);
    35  		ns_client_next(xfr->client, ISC_R_SUCCESS);
    37 -----------------------------------------------------------------------------
    39 OpenPKG intentionally uses a reused "rdnc.key" and a "rdnc.conf"
    40 and hence we don't want to see those warning messages.
    42 Index: bin/rndc/rndc.c
    43 --- bin/rndc/rndc.c.orig	2010-07-11 02:12:18.000000000 +0200
    44 +++ bin/rndc/rndc.c	2011-02-06 17:08:38.000000000 +0100
    45 @@ -468,9 +468,11 @@
    46  			      admin_conffile, admin_keyfile);
    47  		key_only = ISC_TRUE;
    48  	} else if (! c_flag && isc_file_exists(admin_keyfile)) {
    49 +		/*
    50  		fprintf(stderr, "WARNING: key file (%s) exists, but using "
    51  			"default configuration file (%s)\n",
    52  			admin_keyfile, admin_conffile);
    53 +		*/
    54  	}
    56  	DO("create parser", cfg_parser_create(mctx, log, pctxp));

mercurial