head 1.15; access; symbols pkgsrc-2025Q4:1.14.0.4 pkgsrc-2025Q4-base:1.14 pkgsrc-2025Q3:1.14.0.2 pkgsrc-2025Q3-base:1.14 pkgsrc-2025Q2:1.12.0.22 pkgsrc-2025Q2-base:1.12 pkgsrc-2025Q1:1.12.0.20 pkgsrc-2025Q1-base:1.12 pkgsrc-2024Q4:1.12.0.18 pkgsrc-2024Q4-base:1.12 pkgsrc-2024Q3:1.12.0.16 pkgsrc-2024Q3-base:1.12 pkgsrc-2024Q2:1.12.0.14 pkgsrc-2024Q2-base:1.12 pkgsrc-2024Q1:1.12.0.12 pkgsrc-2024Q1-base:1.12 pkgsrc-2023Q4:1.12.0.10 pkgsrc-2023Q4-base:1.12 pkgsrc-2023Q3:1.12.0.8 pkgsrc-2023Q3-base:1.12 pkgsrc-2023Q2:1.12.0.6 pkgsrc-2023Q2-base:1.12 pkgsrc-2023Q1:1.12.0.4 pkgsrc-2023Q1-base:1.12 pkgsrc-2022Q4:1.12.0.2 pkgsrc-2022Q4-base:1.12 pkgsrc-2022Q3:1.11.0.16 pkgsrc-2022Q3-base:1.11 pkgsrc-2022Q2:1.11.0.14 pkgsrc-2022Q2-base:1.11 pkgsrc-2022Q1:1.11.0.12 pkgsrc-2022Q1-base:1.11 pkgsrc-2021Q4:1.11.0.10 pkgsrc-2021Q4-base:1.11 pkgsrc-2021Q3:1.11.0.8 pkgsrc-2021Q3-base:1.11 pkgsrc-2021Q2:1.11.0.6 pkgsrc-2021Q2-base:1.11 pkgsrc-2021Q1:1.11.0.4 pkgsrc-2021Q1-base:1.11 pkgsrc-2020Q4:1.11.0.2 pkgsrc-2020Q4-base:1.11 pkgsrc-2020Q3:1.10.0.2 pkgsrc-2020Q3-base:1.10 pkgsrc-2020Q2:1.9.0.4 pkgsrc-2020Q2-base:1.9 pkgsrc-2020Q1:1.9.0.2 pkgsrc-2020Q1-base:1.9 pkgsrc-2019Q4:1.8.0.18 pkgsrc-2019Q4-base:1.8 pkgsrc-2019Q3:1.8.0.14 pkgsrc-2019Q3-base:1.8 pkgsrc-2019Q2:1.8.0.12 pkgsrc-2019Q2-base:1.8 pkgsrc-2019Q1:1.8.0.10 pkgsrc-2019Q1-base:1.8 pkgsrc-2018Q4:1.8.0.8 pkgsrc-2018Q4-base:1.8 pkgsrc-2018Q3:1.8.0.6 pkgsrc-2018Q3-base:1.8 pkgsrc-2018Q2:1.8.0.4 pkgsrc-2018Q2-base:1.8 pkgsrc-2018Q1:1.8.0.2 pkgsrc-2018Q1-base:1.8 pkgsrc-2017Q4:1.6.0.8 pkgsrc-2017Q4-base:1.6 pkgsrc-2017Q3:1.6.0.6 pkgsrc-2017Q3-base:1.6 pkgsrc-2017Q2:1.6.0.2 pkgsrc-2017Q1:1.4.0.2 pkgsrc-2017Q1-base:1.4 pkgsrc-2014Q4:1.2.0.2 pkgsrc-2014Q4-base:1.2 pkgsrc-2014Q3:1.1.0.24 pkgsrc-2014Q3-base:1.1 pkgsrc-2014Q2:1.1.0.22 pkgsrc-2014Q2-base:1.1 pkgsrc-2014Q1:1.1.0.20 pkgsrc-2014Q1-base:1.1 pkgsrc-2013Q4:1.1.0.18 pkgsrc-2013Q4-base:1.1 pkgsrc-2013Q3:1.1.0.16 pkgsrc-2013Q3-base:1.1 pkgsrc-2013Q2:1.1.0.14 pkgsrc-2013Q2-base:1.1 pkgsrc-2013Q1:1.1.0.12 pkgsrc-2013Q1-base:1.1 pkgsrc-2012Q4:1.1.0.10 pkgsrc-2012Q4-base:1.1 pkgsrc-2012Q3:1.1.0.8 pkgsrc-2012Q3-base:1.1 pkgsrc-2012Q2:1.1.0.6 pkgsrc-2012Q2-base:1.1 pkgsrc-2012Q1:1.1.0.4 pkgsrc-2012Q1-base:1.1 pkgsrc-2011Q4:1.1.0.2; locks; strict; comment @# @; 1.15 date 2025.12.27.19.04.17; author wiz; state dead; branches; next 1.14; commitid 3tgjQcvHB3Oy15oG; 1.14 date 2025.07.24.07.50.01; author wiz; state Exp; branches; next 1.13; commitid 7bdwBY5HgC5jjY3G; 1.13 date 2025.06.30.11.00.50; author jperkin; state dead; branches; next 1.12; commitid HdbxdRxUip3e7U0G; 1.12 date 2022.09.29.13.49.50; author jperkin; state Exp; branches; next 1.11; commitid YVLRR8z5t0OAmLVD; 1.11 date 2020.12.21.00.26.51; author otis; state Exp; branches; next 1.10; commitid cwmWswruo8woJxAC; 1.10 date 2020.07.02.13.01.38; author otis; state Exp; branches; next 1.9; commitid mGm4UShHUYRtmveC; 1.9 date 2020.03.17.19.04.49; author adam; state Exp; branches; next 1.8; commitid vfW5cr5w5GcoSM0C; 1.8 date 2018.02.02.10.03.05; author jperkin; state Exp; branches; next 1.7; commitid Lb7TDnbLhQEALgpA; 1.7 date 2018.01.02.12.18.15; author fhajny; state Exp; branches; next 1.6; commitid DQ8C1d5ccbIAvilA; 1.6 date 2017.08.24.20.59.22; author he; state Exp; branches 1.6.2.1; next 1.5; commitid AuoBzun7ORRdBv4A; 1.5 date 2017.06.23.17.12.54; author fhajny; state dead; branches; next 1.4; commitid 85l6ykAaw20ikwWz; 1.4 date 2017.03.09.13.32.54; author fhajny; state Exp; branches; next 1.3; commitid uqh2AEL1XgPVwSIz; 1.3 date 2015.03.27.23.37.52; author rodent; state dead; branches; next 1.2; commitid 4FSrr5JawrZbNify; 1.2 date 2014.12.10.14.50.09; author fhajny; state Exp; branches; next 1.1; commitid LMaKFcuCnfUajv1y; 1.1 date 2012.01.23.15.11.54; author ghen; state Exp; branches 1.1.2.1; next ; 1.6.2.1 date 2017.08.24.20.59.22; author bsiegert; state dead; branches; next 1.6.2.2; commitid 9nVvOgadZ2q2P05A; 1.6.2.2 date 2017.08.28.19.01.04; author bsiegert; state Exp; branches; next ; commitid 9nVvOgadZ2q2P05A; 1.1.2.1 date 2012.01.23.15.11.54; author tron; state dead; branches; next 1.1.2.2; 1.1.2.2 date 2012.01.26.23.39.10; author tron; state Exp; branches; next ; desc @@ 1.15 log @net/powerdns: Update to version 5.0.2 Provided by Marcin Gondek in wip. 5.0.2 Released: 11th of December 2025 This is release 5.0.2 of the Authoritative Server. It contains bug fixes and a minor feature. Please review the Upgrade Notes before upgrading from versions < 5.0.x. New Features allow finer-grained rrset changes through the API References: #16589, pull request 16599 Bug Fixes m4/pdns_check_libcrypto: fix ecdsa/eddsa includedir (famfo) References: #16538, pull request 16603 add missing catch block for STL exceptions in createForward References: #16564, pull request 16566 REST API: bring back 404 errors References: #16059, pull request 16532 Give backends the ability to perform extra actions during zone rectify References: #15894, #16499, pull request 16512 meson build: restore original binary names References: #16401, pull request 16486 sdist: copy files as files, not as new dirs¶ References: #16398, pull request 16466 @ text @$NetBSD: patch-configure,v 1.14 2025/07/24 07:50:01 wiz Exp $ Fix unportable test(1) operator. --- configure.orig 2025-07-24 07:47:20.356946188 +0000 +++ configure @@@@ -22199,12 +22199,12 @@@@ fi then : - if test "x$enable_fortify_source" == "xauto" + if test "x$enable_fortify_source" = "xauto" then : enable_fortify_source=3 fi - if test "x$enable_fortify_source" == "x3" + if test "x$enable_fortify_source" = "x3" then : { printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking whether C++ compiler handles -D_FORTIFY_SOURCE=3" >&5 @@@@ -22253,7 +22253,7 @@@@ fi fi - if test "x$enable_fortify_source" == "x2" + if test "x$enable_fortify_source" = "x2" then : { printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking whether C++ compiler handles -D_FORTIFY_SOURCE=2" >&5 @@@@ -22302,7 +22302,7 @@@@ fi fi - if test "x$enable_fortify_source" == "x1" + if test "x$enable_fortify_source" = "x1" then : { printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking whether C++ compiler handles -D_FORTIFY_SOURCE=1" >&5 @@@@ -27378,7 +27378,7 @@@@ fi if test "x$PG_CONFIG" != "x" -o "x$PGSQL_LIBS" = "x" then : - if test "x$PG_CONFIG" == "x" + if test "x$PG_CONFIG" = "x" then : # Extract the first word of "pg_config", so it can be a program name with args. @@@@ -27428,7 +27428,7 @@@@ fi fi - if test "x$PG_CONFIG" == "x" + if test "x$PG_CONFIG" = "x" then : as_fn_error $? "Can not find pg_config, use --with-pg-config to specify the path to pg_config" "$LINENO" 5 @@@@ -31468,7 +31468,7 @@@@ fi then : - if test "x$enable_lto" == "xthin" + if test "x$enable_lto" = "xthin" then : { printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking whether C++ compiler handles -flto=thin" >&5 @@@@ -31518,7 +31518,7 @@@@ fi fi - if test "x$enable_lto" == "xauto" + if test "x$enable_lto" = "xauto" then : { printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking whether C++ compiler handles -flto=auto" >&5 @@@@ -31568,7 +31568,7 @@@@ fi fi - if test "x$enable_lto" == "xyes" + if test "x$enable_lto" = "xyes" then : { printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking whether C++ compiler handles -flto" >&5 @ 1.14 log @powerdns*: fix unportable test(1) operator @ text @d1 1 a1 1 $NetBSD$ @ 1.13 log @powerdns: Update to 4.9.5. pkgsrc changes: * Rename Makefile.backend to backend.mk * Include many options by default, there is no benefit to disabling them if they do not require additional dependencies, packages should be useful out of the box. Upstream changes too many to list here, see the following URLs: https://docs.powerdns.com/authoritative/changelog/4.7.html https://docs.powerdns.com/authoritative/changelog/4.8.html https://docs.powerdns.com/authoritative/changelog/4.9.html @ text @d1 1 a1 1 $NetBSD: patch-configure,v 1.12 2022/09/29 13:49:50 jperkin Exp $ d3 1 a3 1 Shell portability. d5 1 a5 1 --- configure.orig 2020-12-17 14:49:10.000000000 +0000 d7 2 a8 1 @@@@ -22688,7 +22688,7 @@@@ fi a9 1 if test "x$PG_CONFIG" != "x" -o "x$PGSQL_LIBS" = "x"; then : d11 36 a46 2 - if test "x$PG_CONFIG" == "x"; then : + if test "x$PG_CONFIG" = "x"; then : d49 1 a49 2 set dummy pg_config; ac_word=$2 @@@@ -22732,7 +22732,7 @@@@ fi d53 3 a55 2 - if test "x$PG_CONFIG" == "x"; then : + if test "x$PG_CONFIG" = "x"; then : d58 25 d84 1 @ 1.12 log @powerdns: Update to 4.6.3. The changelogs are very long and unwieldly, even trying to use the raw versions as they're written in RST, so please see the following URLs for the full list of changes (which are many) since 4.4.1: https://doc.powerdns.com/authoritative/changelog/4.6.html https://doc.powerdns.com/authoritative/changelog/4.5.html https://doc.powerdns.com/authoritative/changelog/4.4.html While here clean up various pkglint warnings. @ text @d1 1 a1 1 $NetBSD: patch-configure,v 1.11 2020/12/21 00:26:51 otis Exp $ @ 1.11 log @net/powerdns: Update to 4.4.0 Security fix: * This release drops GSS/TSIG support, please see PowerDNS Security Advisory 2020-06 https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2020-06.html Changelog: * New features: - the LMDB backend now supports long record content, making it production ready for everybody - the SVCB and HTTPS record types are supported, with limited additional processing transaction handling in the 2136 handler and the HTTP API was again improved a lot, avoiding various spurious issues users may have noticed if they do a lot of changes a new setting (consistent-backends) offers a roughly 30% speedup, subject to conditions - we finally emit Prometheus metrics! * Improvements: - don’t log trusted-notification-proxy notify at error level - Stop using incbin and use od & sed to generate constant string data. * Bug Fixes: - clear the LMDB set state when performing a new lookup or list to prevent corruption cases - SVCB: Correctly parse and print unknown params - fix direct-dnskey in AXFR-out @ text @d1 3 a3 1 $NetBSD$ @ 1.10 log @net/powerdns: Update to 4.3.0 Changes since 4.2.2: * Released: - 7th of April 2020 * Improvements: - reduce the number of temporary memory allocations - adjust NSEC TTLs to negative TTL - Add more SQL schema files to packages and tarballs - only log "No question section in packet" at Debug logging level - do not update identical notified serials - IXFR: only sign SOA in empty response for +DO queries - Prepare the caches' buckets in advance - Rework NetmaskTree for better CPU and memory efficiency. - allow local-ipv6 until 4.4.0 - Add metrics about the size of our in-memory rings - gpgsqlbackend: stop using prepared statements - Enforce a strict maximum size for the packet and records caches - API: optionally, do not return dnssec info in domain list - zone file parser: Add a parameter to limit the number of "$GENERATE" steps - api: avoid a large number of new database connections - Emulate a buffered read in the pipe backend, ~3x faster - LUA performance: register lua functions only once - API: make max request/response body size configurable - API: add edited_serial to Zone object - Improve error when notification comes in for non-slave zone - LUA record: rewrote the health checking system * Bug fixes: - avoid IXFR-in corruption when deltas come in close together (please see the IXFR-in corruption upgrade notes) - improve sql schema updates - Fix NSECx for unpublished DNSKEYs properly - emit correct NSEC/NSEC3 bitmaps in hidden key situations - Refuse NSEC records with a bitmap length > 32 - YaHTTP: Support bracketed IPv6 addresses - Make sure the default-publish-cds and default-publish-cdnskey options are - respected for AXFR - make sure records from LMDB backend end up in the right packet section - Clear the TSIG algo between iterations in the API - HTTP API: Allow DNAME in apex with SOA and NS records - various memory/thread correctness fixes - LUA view: do not crash on empty IP list - REST API: accept headers without spaces - on luaSynth exception, drain db output - tinydnsbackend: limit timestamp-based TTLs - Ensure that pdns can read pdns.conf when upgrading from an older package - Ixfrdist: handle reading of empty files gracefully - webserver: handle exceptions instead of SIGABRTing the world * New features: - add full option to "pdns_control show-config" - Add "IO wait" and "steal" metrics on Linux - API: add includerings option to statistics endpoint - Add an extended status report in the bind backend - add default-publish-{cds|cdnskey} options - remotebackend: Support alsoNotifies, setFresh, getUnfreshSlaveInfos - Add support for managing unpublished DNSSEC keys - gmysql backend, add an option to send the SSL capability flag - pdnsutil: offer to increase serial after edit-zone * Removed features: - remove goracle, lua, mydns, opendbx, oracle backends - deprecate SOA autocomplete in pdnsutil check-zone * misc.: - remove the implicit 5->7 algorithm upgrade - Make Lua mandatory for Auth For complete and up-to-date changelog, see: https://doc.powerdns.com/authoritative/changelog/4.3.html pkgsrc notes: ~~~~~~~~~~~~~ The default options have changed since 4.2.2 a bit: - option "lua" has been removed as LUA is now mandatory - option "luarecords" has been added with default "on". When not present in PKG_OPTIONS, LUA records support will be disabled. @ text @d1 1 a1 1 $NetBSD: patch-configure,v 1.9 2020/03/17 19:04:49 adam Exp $ d3 1 a3 4 Do not add default compiler flags. Leave pkgsrc to handle security features. --- configure.orig 2020-04-06 12:51:03.000000000 +0000 d5 1 a5 21 @@@@ -3738,8 +3738,8 @@@@ case $host_os in *\ *) host_os=`echo "$h # Add some default CFLAGS and CXXFLAGS, can be appended to using the environment variables -CFLAGS="-g -O2 -Wall -Wextra -Wshadow -Wno-unused-parameter $CFLAGS" -CXXFLAGS="-g -O2 -Wall -Wextra -Wshadow -Wno-unused-parameter $CXXFLAGS" +CFLAGS="-Wall $CFLAGS" +CXXFLAGS="-Wall $CXXFLAGS" ac_ext=c ac_cpp='$CPP $CPPFLAGS' @@@@ -7901,7 +7901,7 @@@@ rm -f core conftest.err conftest.$ac_obj fi { $as_echo "$as_me:${as_lineno-$LINENO}: result: $gl_cv_warn_cxx__fstack_protector" >&5 $as_echo "$gl_cv_warn_cxx__fstack_protector" >&6; } -if test "x$gl_cv_warn_cxx__fstack_protector" = xyes; then : +if test "x$gl_cv_warn_cxx__fstack_protector" = xDISABLED; then : CFLAGS="-fstack-protector $CFLAGS" CXXFLAGS="-fstack-protector $CXXFLAGS" @@@@ -22582,7 +22582,7 @@@@ fi d14 1 a14 1 @@@@ -22626,7 +22626,7 @@@@ fi @ 1.9 log @powerdns: updated to 4.2.1 4.2.1 This release fixes several bugs and makes a few features more robust or intuitive. It also contains a few performance improvements for API users. New Features Add SLAVE-RENOTIFY zone metadata support Add configurable timeout for inbound AXFR Add CentOS 8 as builder target gmysql backend, add an option to send the SSL capability flag Improvements API: reduce number of database connections Register a few known RR types and remove an unknown one bindbackend: use metadata for also-notifies as well pdnsutil increase-serial: under SOA-EDIT=INCEPTION-EPOCH, bump as if it is EPOCH API: optionally do not return dnssec info in domain list Basic validation of $GENERATE parameters Bug Fixes LUA view: do not crash on empty IP list API: Accept headers without spaces Avoid database state-related SERVFAILs after a LUA error Just before 4.2.0, some SQL-related fixes broke edit-zone and other features with the LMDB backend. This has been fixed now. rfc2136, pdnsutil: somewhat improve duplicate record handling 4.2.0 Compared to the last release candidate, one more bug has been fixed. The LMDB backend is incomplete in this version. Slaving zones works, loading zones with pdnsutil works, but more fine grained edits (using edit-zone, or the REST API) fail. We hope to fix this soon in a 4.2.x release. For an overview of features new since 4.1.x, please see the 4.2.0 announcement blog post. Bug Fixes bind getAllDomains: ignore per-zone exceptions @ text @d1 1 a1 1 $NetBSD: patch-configure,v 1.8 2018/02/02 10:03:05 jperkin Exp $ d6 1 a6 1 --- configure.orig 2019-11-29 19:23:06.000000000 +0000 d8 1 a8 1 @@@@ -3721,8 +3721,8 @@@@ case $host_os in *\ *) host_os=`echo "$h d12 2 a13 2 -CFLAGS="-Wall -g -O2 $CFLAGS" -CXXFLAGS="-Wall -g -O2 $CXXFLAGS" d19 1 a19 1 @@@@ -7884,7 +7884,7 @@@@ rm -f core conftest.err conftest.$ac_obj d28 1 a28 1 @@@@ -22723,7 +22723,7 @@@@ fi d37 1 a37 1 @@@@ -22767,7 +22767,7 @@@@ fi @ 1.8 log @powerdns: Leave pkgsrc to handle security features. @ text @d1 1 a1 1 $NetBSD: patch-configure,v 1.7 2018/01/02 12:18:15 fhajny Exp $ d3 1 a3 1 Regen after excluding -latomic test on NetBSD. d6 1 a6 1 --- configure.orig 2017-11-30 09:43:31.000000000 +0000 d8 1 a8 3 @@@@ -5569,9 +5569,14 @@@@ else fi a9 24 - case "$host" in - mips* | powerpc-* ) - { $as_echo "$as_me:${as_lineno-$LINENO}: checking whether the linker accepts -latomic" >&5 + case "$host_os" in + netbsd*) + : # no -latomic + ;; + *) + case "$host" in + mips* | powerpc-* ) + { $as_echo "$as_me:${as_lineno-$LINENO}: checking whether the linker accepts -latomic" >&5 $as_echo_n "checking whether the linker accepts -latomic... " >&6; } LDFLAGS="-latomic $LDFLAGS" cat confdefs.h - <<_ACEOF >conftest.$ac_ext @@@@ -5593,7 +5598,9 @@@@ else fi rm -f core conftest.err conftest.$ac_objext \ - conftest$ac_exeext conftest.$ac_ext + conftest$ac_exeext conftest.$ac_ext + ;; + esac ;; esac d11 9 a19 1 @@@@ -6797,7 +6804,7 @@@@ rm -f core conftest.err conftest.$ac_obj d28 1 a28 1 @@@@ -20586,7 +20593,7 @@@@ fi d37 1 a37 1 @@@@ -20630,7 +20637,7 @@@@ fi @ 1.7 log @Update net/powerdns* to 4.1.0. PowerDNS Authoritative Server 4.1.0 =========================================================== - Improved performance: 400% speedup in some scenarios - Crypto API: DNSSEC fully configurable via RESTful API - Improved documentation - Database related improvements - Enhanced tooling - Support for TCP Fast Open - Support for non-local bind - Support for Botan 2.x (and removal of support for Botan 1.10) - Our packages now ship with PKCS #11 support. - Recursor passthrough removal Full changelog: https://doc.powerdns.com/authoritative/changelog/4.1.html PowerDNS Authoritative Server 4.0.5 =========================================================== Fixes - Fix for missing check on API operations (CVE-2017-15091) - Bindbackend: do not corrupt data supplied by other backends in getAllDomains - API: prevent sending nameservers list and zone-level NS in rrsets - gpgsql: make statement names actually unique - Fix remotebackend params - Fix godbc query logging - For create-slave-zone, actually add all slaves, and not only first n times - Fix a regression in axfr-rectify + test - When making a netmask from a comboaddress, we neglected to zero the port - Fix libatomic detection on ppc64 - Catch DNSName exception in the Zoneparser - Publish inactive KSK/CSK as CDNSKEY/CDS - Handle AFSDB record separately due to record structure. - Treat requestor's payload size lower than 512 as equal to 512 - Correctly purge entries from the caches after a transfer - Handle a signing pipe worker dying with work still pending - Ignore SOA-EDIT for PRESIGNED zones. - Check return value for all getTSIGKey calls. Improvements - Fix ldap-strict autoptr feature, including a test - mydnsbackend: Add getAllDomains - Stubresolver: Use only recursor setting if given - LuaWrapper: Allow embedded NULs in strings received from Lua - sdig: Clarify that the ednssubnet option takes "subnet/mask" - Tests: Ensure all required tools are available - PowerDNS sdig does not truncate trailing bits of EDNS Client Subnet mask - LuaJIT 2.1: Lua fallback functionality no longer uses Lua namespace - Add support for Botan 2.x - Ship ldapbackend schema files in tarball - Collection of schema changes - Fix typo in two log messages - Add help text on autodetecting systemd support - Use a unique pointer for bind backend's d_of - Fix some of the issues found by @@jpmens @ text @d1 1 a1 1 $NetBSD: patch-configure,v 1.6 2017/08/24 20:59:22 he Exp $ d4 1 d37 9 @ 1.6 log @Omit the insistence on -latomic on mips and powerpc if we're on NetBSD. No PKGREVISION bump, no change for other platforms, and this is a build fix for those affected by the problem. @ text @d1 1 a1 1 $NetBSD$ d5 1 a5 1 --- configure.orig 2017-08-24 16:29:40.591346034 +0000 d7 1 a7 1 @@@@ -5567,9 +5567,14 @@@@ else d12 1 a12 1 - mips* | powerpc* ) d20 1 a20 1 + mips* | powerpc* ) d23 3 a25 3 if ${ax_cv_check_ldflags___latomic+:} false; then : $as_echo_n "(cached) " >&6 @@@@ -5606,7 +5611,9 @@@@ else d28 3 a30 3 - LDFLAGS="-latomic $LDFLAGS" + LDFLAGS="-latomic $LDFLAGS" d36 18 @ 1.6.2.1 log @file patch-configure was added on branch pkgsrc-2017Q2 on 2017-08-28 19:01:04 +0000 @ text @d1 35 @ 1.6.2.2 log @Pullup ticket #5536 - requested by he net/powerdns: build fix Revisions pulled up: - net/powerdns/distinfo 1.26 - net/powerdns/patches/patch-configure 1.6 - net/powerdns/patches/patch-m4_pdns__check__os.m4 1.1 --- Module Name: pkgsrc Committed By: he Date: Thu Aug 24 20:59:22 UTC 2017 Modified Files: pkgsrc/net/powerdns: distinfo Added Files: pkgsrc/net/powerdns/patches: patch-configure patch-m4_pdns__check__os.m4 Log Message: Omit the insistence on -latomic on mips and powerpc if we're on NetBSD. No PKGREVISION bump, no change for other platforms, and this is a build fix for those affected by the problem. @ text @a0 35 $NetBSD: patch-configure,v 1.6 2017/08/24 20:59:22 he Exp $ Regen after excluding -latomic test on NetBSD. --- configure.orig 2017-08-24 16:29:40.591346034 +0000 +++ configure @@@@ -5567,9 +5567,14 @@@@ else fi - case "$host" in - mips* | powerpc* ) - { $as_echo "$as_me:${as_lineno-$LINENO}: checking whether the linker accepts -latomic" >&5 + case "$host_os" in + netbsd*) + : # no -latomic + ;; + *) + case "$host" in + mips* | powerpc* ) + { $as_echo "$as_me:${as_lineno-$LINENO}: checking whether the linker accepts -latomic" >&5 $as_echo_n "checking whether the linker accepts -latomic... " >&6; } if ${ax_cv_check_ldflags___latomic+:} false; then : $as_echo_n "(cached) " >&6 @@@@ -5606,7 +5611,9 @@@@ else fi - LDFLAGS="-latomic $LDFLAGS" + LDFLAGS="-latomic $LDFLAGS" + ;; + esac ;; esac @ 1.5 log @Update net/powerdns* to 4.0.4. This release features a fix for the ed25519 signer. This signer hashed the message before signing, resulting in unverifiable signatures. Also on the Elliptic Curve front, support was added for ED448 (DNSSEC algorithm 16) by using libdecaf. Bug fixes - Do not hash the message in the ed25519 signer - Make URI integers 16 bits, fixes #5443 - configure.ac: Corrects syntax error in test statement on existance of libcrypto_ecdsa - configure.ac: Fix quoting issue fixes #5401 - configure.ac: Check in the detected OpenSSL/libcrypto for ECDSA - configure.ac: Check if we can link against libatomic if needed - Fix typo in ldapbackend.cc from issue #5091 - Sort NSEC record case insensitive - Make sure NSEC ordernames are always lower case - API: correctly take TTL from first record even if we are at the last comment - Fix AtomicCounter unit tests on 32-bit - Fix negative port detection for IPv6 addresses on 32-bit - Remove support for 'right' timezones, as this code turned out to be broken - Lowercase the TSIG algorithm name in hash computation - Handle exceptions raised by closesocket() - Don't leak on signing errors during outgoing AXFR; signpipe stumbles over interrupted rrsets; fix memory leak in gmysql backend - TinyCDB backend: Don't leak a CDB object in case of bogus data Improvements - ODBC backend: Allow query logging - Add ED25519 (algo 15) and ED448 (algo 16) support with libdecaf signer - YaHTTP: Sync with upstream changes - Send a notification to all slave servers after every dnsupdate - Add option to set a global lua-axfr-script value - dnsreplay: Add --source-ip and --source-port options - calidns: Use the correct socket family (IPv4 / IPv6) - Add an option to allow AXFR of zones with a different (higher/lower) serial - API: Make trailing dot handling consistent with pdnsutil - SuffixMatchNode: Fix insertion issue for an existing node - Do not resolve the NS-records for NOTIFY targets if the "only-notify" whitelist is empty, as a target will never match an empty whitelist. - Improve the AXFR DNSSEC freshness check; Ignore NSEC3PARAM metadata in an unsigned zone - Create additional reuseport sockets before dropping privileges; remove transaction in pgpsql backend @ text @d1 1 a1 1 $NetBSD: patch-configure,v 1.4 2017/03/09 13:32:54 fhajny Exp $ d3 1 a3 1 Portability. d5 1 a5 1 --- configure.orig 2017-01-17 08:44:02.000000000 +0000 d7 29 a35 9 @@@@ -25420,7 +25420,7 @@@@ $as_echo "$as_me: Built-in modules: $mod $as_echo "$as_me: Dynamic modules: $dynmodules" >&6;} { $as_echo "$as_me:${as_lineno-$LINENO}: " >&5 $as_echo "$as_me: " >&6;} -if test "x$libcrypto_ecdsa" == "xyes"; then : +if test "x$libcrypto_ecdsa" = "xyes"; then : { $as_echo "$as_me:${as_lineno-$LINENO}: OpenSSL ecdsa: yes" >&5 $as_echo "$as_me: OpenSSL ecdsa: yes" >&6;} else @ 1.4 log @Update net/powerdns to 4.0.3. pkgsrc changes: - Remove options for cryptopp and geoip (the latter to go into a separate package). - Clean up a lot of patches that do not seem to be needed anymore. PowerDNS Authoritative Server 4.0.3 =================================== - Revert "In 'Bind2Backend::lookup()', use the 'zoneId' when we have it" PowerDNS Authoritative Server 4.0.2 Security issues fixed: - 2016-02: Crafted queries can cause abnormal CPU usage - 2016-03: Denial of service via the web server - 2016-04: Insufficient validation of TSIG signatures - 2016-05: Crafted zone record can cause a denial of service Other highlights: - Don't parse spurious RRs in queries when we don't need them (Security Advisory 2016-02) - Don't exit if the webserver can't accept a connection (Security Advisory 2016-03) - Check TSIG signature on IXFR (Security Advisory 2016-04) - Correctly check unknown record content size (Security Advisory 2016-05) - ODBC backend: actually prepare statements - Improve root-zone performance - Plug memory leak in postgresql backend (Christian Hofstaedtler) - calidns: Don't crash if we don't have enough 'unknown' queries remaining - Improve PacketCache cleaning (Kees Monshouwer) - Bind backend: update status message on reload, keep the existing zone on failure - Fix TSIG for single thread distributor (Kees Monshouwer) - Change default for any-to-tcp to yes (Kees Monshouwer) - Don't look up the packet cache for TSIG-enabled queries - Fix build with OpenSSL 1.1.0 final (Christian Hofstaedtler) - pdnsutil: create-slave-zone accept multiple masters (Hannu Ylitalo) PowerDNS Authoritative Server 4.0.1 =================================== Bug fixes - Wait for the connection to the carbon server to be established - Don't try to deallocate empty PG statements - Send the correct response when queried for an NSEC directly (Kees Monshouwer) - Don't include bind files if length <= 2 or > sizeof(filename) - Catch runtime_error when parsing a broken MNAME Improvements - Make DNSPacket return a ComboAddredd for local and remote (Aki Tuomi) - OpenSSL 1.1.0 support (Christian Hofstaedtler) - Fix typos in a logmessage and exception (Christian Hofsteadtler) - pdnsutil: Remove checking of ctime and always diff the changes (Hannu Ylitalo) - dnsreplay: Only add Client Subnet stamp when asked - Use toLogString() for ringAccount (Kees Monshouwer) Additions - Add limits to the size of received {A,I}XFR - Add used filedescriptor statistic (Kees Monshouwer) PowerDNS Authoritative Server 4.0.0 =================================== - Moved to C++ 2011, a cleaner more powerful version of C++ that has allowed us to improve the quality of implementation in many places. - Implemented dedicated infrastructure for dealing with DNS names that is fully "DNS Native" and needs less escaping and unescaping. - Due to this, the PowerDNS Authoritative Server can now serve DNSSEC-enabled root-zones. - All backends derived from the Generic SQL backend use prepared statements. - Both the server and pdns_control do the right thing when chroot'ed. - Caches are now fully canonically ordered, which means entries can be wiped on suffix in all places - A revived and supported ODBC backend (godbc). - A revived and supported LDAP backend (ldap). - Support for CDS/CDNSKEY and RFC 7344 key-rollovers. - Support for the ALIAS record. - The webserver and API are no longer experimental. - The API-path has moved to /api/v1 - DNSUpdate is no longer experimental. - ECDSA (algorithm 13 and 14) supported without in-tree cryptographic libraries (provided by OpenSSL). - Experimental support for ed25519 DNSSEC signatures (when compiled with libsodium support). - Many new pdnsutil commands. - GeoIP backend has gained many features, and can now e.g. run based on explicit netmasks not present in the GeoIP databases - Removed support for LMDB. - Removed the Geo backened (use the improved GeoIP instead). - pdnssec has been renamed to pdnsutil. - Support for the PolarSSL/MbedTLS, Crypto++ and Botan cryptographic libraries have been dropped in favor of the (faster) OpenSSL libcrypto (except for GOST, which is still provided by Botan). - ECDSA P256 SHA256 (algorithm 13) is now the default algorithm when securing zones. - The PowerDNS Authoritative Server now listens by default on all IPv6 addresses. - Several superfluous queries have been dropped from the Generic SQL backends. - The INCEPTION, INCEPTION-WEEK and EPOCH SOA-EDIT metadata values are marked as deprecated and will be removed in 4.1.0 @ text @d1 1 a1 1 $NetBSD$ @ 1.3 log @Updated to latest release, 3.4.3. Updated and defuzzed patches. Added cryptopp and zeromq options, which are disabled by default. ChangeLog: PowerDNS Authoritative Server 3.4.3 Warning: Version 3.4.3 of the PowerDNS Authoritative Server is a major upgrade if you are coming from 2.9.x. Additionally, if you are coming from any 3.x version (including 3.3.1), there is a mandatory SQL schema upgrade. Please refer to the Upgrade documentation for important information on correct and stable operation, as well as notes on performance and memory use. Released March 2nd, 2015 Bug fixes: commit ceb49ce: pdns_control: exit 1 on unknown command (Ruben Kerkhof) commit 1406891: evaluate KSK ZSK pairs per algorithm (Kees Monshouwer) commit 3ca050f: always set di.notified_serial in getAllDomains (Kees Monshouwer) commit d9d09e1: pdns_control: don't open socket in /tmp (Ruben Kerkhof) New features: commit 2f67952: Limit who can send us AXFR notify queries (Ruben Kerkhof) Improvements: commit d7bec64: respond REFUSED instead of NOERROR for "unknown zone" situations commit ebeb9d7: Check for Lua 5.3 (Ruben Kerkhof) commit d09931d: Check compiler for relro support instead of linker (Ruben Kerkhof) commit c4b0d0c: Replace PacketHandler with UeberBackend where possible (Christian Hofstaedtler) commit 5a85152: PacketHandler: Share UeberBackend with DNSSECKeeper (Christian Hofstaedtler) commit 97bd444: fix building with GCC 5 Experimental API changes (Christian Hofstaedtler): commit ca44706: API: move shared DomainInfo reader into it's own function commit 102602f: API: allow writing to domains.account field commit d82f632: API: read and expose domain account field commit 2b06977: API: be more strict when parsing record contents commit 2f72b7c: API: Reject unknown types (TYPE0) commit d82f632: API: read and expose domain account field PowerDNS Authoritative Server 3.4.2 Warning: Version 3.4.2 of the PowerDNS Authoritative Server is a major upgrade if you are coming from 2.9.x. Additionally, if you are coming from any 3.x version (including 3.3.1), there is a mandatory SQL schema upgrade. Please refer to the Upgrade documentation for important information on correct and stable operation, as well as notes on performance and memory use. Released February 3rd, 2015 Find the downloads on our download page. This is a performance and bugfix update to 3.4.1 and any earlier version. For high traffic setups, including those using DNSSEC, upgrading to 3.4.2 may show tremendous performance increases. A list of changes since 3.4.1 follows. Improvements: commit 73004f1: implement CORS for the HTTP API commit 4d9c289: qtype is now case insensitive in API and database commit 13af5d8, commit 223373a, commit 1d5a68d, commit 705a73f, commit b418d52: Allow (optional) PIE hardening commit 2f86f20: json-api: remove priority from json commit cefcf9f: backport remotebackend fixes commit 920f987, commit dd8853c: Support Lua 5.3 commit 003aae5: support single-type ZSK signing commit 1c57e1d: Potential fix for ticket #1907, we now try to trigger libgcc_s.so.1 to load before we chroot. I can't reproduce the bug on my local system, but this "should" help. Seriously. commit 031ab21: update polarssl to 1.3.9 Bug fixes: commit 60b2b7c, commit d962fbc: refuse overly long labels in names commit a64fd6a: auth: limit long version strings to 63 characters and catch exceptions in secpoll commit fa52e02: pdnssec: fix ttl check for RRSIG records commit 0678b25: fix up latency reporting for sub-millisecond latencies (would clip to 0) commit d45c1f1: make sure we don't throw an exception on "pdns_control show" of an unknown variable commit 63c8088: fix startup race condition with carbon thread already trying to broadcast uninitialized data commit 796321c: make qsize-q more robust commit 407867c: mind04 discovered we count corrupt packets and EAGAIN situations as validly received packets, skewing the udp questions/answers graphs on auth. commit f06d069: make latency & qsize reporting 'live'. Plus fix that we only reported the qsize of the first distributor. commit 2f3498e: fix up statbag for carbon protocol and function pointers commit 0f2f999: get priority from table in Lua axfrfilter; fixes ticket #1857 commit 96963e2, commit bbcbbbe, commit d5c9c07: various backends: fix records pointing at root commit e94c2c4: remove additional layer of trailing . stripping, which broke MX records to the root in the BIND backend. Should close ticket #1243. commit 8f35ba2: api: use uncached results for getKeys() commit c574336: read ALLOW-AXFR-FROM from the backend with the metadata Minor changes: commit 1e39b4c: move manpages to section 1 commit b3992d9: secpoll: Replace ~ with _ commit 9799ef5: only zones with an active ksk are secure commit d02744f: api: show keys for zones without active ksk New features: commit 1b97ba0: add signatures metric to auth, so we can plot signatures/second commit 92cef2d: pdns_control: make it posible to notify all zones at once commit f648752: JSON API: provide flush-cache, notify, axfr-retrieve commit 02653a7: add 'bench-db' to do very simple database backend performance benchmark commit a83257a: enable callback based metrics to statbas, and add 5 such metrics: uptime, sys-msec, user-msec, key-cache-size, meta-cache-size, signature-cache-size Performance improvements: commit a37fe8c: better key for packetcache commit e5217bb: don't do time(0) under signature cache lock commit d061045, commit 135db51, commit 7d0f392: shard the packet cache, closing ticket #1910. commit d71a712: with thanks to Jack Lloyd, this works around the default Botan allocator slowing down for us during production use. @ text @d1 1 a1 1 $NetBSD: patch-configure,v 1.2 2014/12/10 14:50:09 fhajny Exp $ d4 2 a5 1 --- configure.orig 2014-10-30 10:18:31.000000000 +0000 d7 9 a15 40 @@@@ -19403,7 +19403,7 @@@@ fi if test "x$MYSQL_config_check" != "xskip"; then { $as_echo "$as_me:${as_lineno-$LINENO}: checking for mysql_config" >&5 $as_echo_n "checking for mysql_config... " >&6; } - if test "x$MYSQL_config_check" == "x"; then + if test "x$MYSQL_config_check" = "x"; then # check if it's in path for m in /bin /usr/bin /usr/local/bin /opt/csw/bin; do if test -x $m/mysql_config; then @@@@ -19412,7 +19412,7 @@@@ $as_echo_n "checking for mysql_config... fi done - if test "x$MYSQL_config" == "x"; then + if test "x$MYSQL_config" = "x"; then { $as_echo "$as_me:${as_lineno-$LINENO}: result: not found" >&5 $as_echo "not found" >&6; } else @@@@ -19518,7 +19518,7 @@@@ fi # Check whether --with-pgsql-config was given. if test "${with_pgsql_config+set}" = set; then : withval=$with_pgsql_config; PGSQL_pg_config="$withval" - if test "x$PGSQL_pg_config" == "xyes" || test ! -x "$PGSQL_pg_config"; then + if test "x$PGSQL_pg_config" = "xyes" || test ! -x "$PGSQL_pg_config"; then as_fn_error $? "--with-pgsql-config must provide a valid path to pg_config executable" "$LINENO" 5 fi @@@@ -19568,10 +19568,10 @@@@ fi if test "x$PGSQL_pg_config" != "x"; then - if test "x$PGSQL_lib_check" == "x"; then + if test "x$PGSQL_lib_check" = "x"; then PGSQL_lib_check=$($PGSQL_pg_config --libdir) fi - if test "x$PGSQL_inc_check" == "x"; then + if test "x$PGSQL_inc_check" = "x"; then PGSQL_inc_check=$($PGSQL_pg_config --includedir) fi PGSQL_CFLAGS= @ 1.2 log @Update PowerDNS to 3.4.1. pkgsrc changes: - SQLite 2.x support no longer exists - SQLite 3.x support cannot be compiled outside the main package because of how symbols are distributed, so making it a compile time option for net/powerdns now. Too many changes since 2.9.22.5 (over 2 years ago), see the full changelog: http://doc.powerdns.com/md/changelog/ Upgrade notes: - PowerDNS 3.4 comes with a mandatory database schema upgrade coming from any previous 3.x release. - PowerDNS 3.1 introduces native SQLite3 support for storing key material for DNSSEC in the bindbackend. With this change, support for bind+gsql-setups ('hybrid mode') has been dropped. - PowerDNS 3.0 introduces full DNSSEC support which requires changes to database schemas. By default, old non-DNSSEC schema is assumed. Please see the docs on upgrading for particular steps that need to be taken: http://doc.powerdns.com/md/authoritative/upgrading/ @ text @d1 1 a1 1 $NetBSD: patch-configure,v 1.1 2012/01/23 15:11:54 ghen Exp $ @ 1.1 log @Fix unportable == check in configure (I did not have PKG_DEVELOPER=yes when previously updating this pkg), noted by joerg. Also fix some PLIST issues (introduced with the same update). Bump PKGREVISION of affected packages. @ text @d1 1 a1 1 $NetBSD$ d3 2 a4 1 --- configure.orig 2012-01-23 14:16:18.745785316 +0000 d6 12 a17 3 @@@@ -16867,7 +16867,7 @@@@ do done modulelibs="$modulelibs `cat $srcdir/modules/${a}backend/OBJECTLIBS`" d19 27 a45 5 - if test ${a} == "gpgsql"; then + if test ${a} = "gpgsql"; then case "$host_os" in freebsd*) ;; @ 1.1.2.1 log @file patch-configure was added on branch pkgsrc-2011Q4 on 2012-01-26 23:39:10 +0000 @ text @d1 13 @ 1.1.2.2 log @Pullup ticket #3660 - requested by ghen net/powerdns: build fix net/powerdns-ldap: build fix net/powerdns-mysql: build fix net/powerdns-pgsql: build fix net/powerdns-sqlite: build fix Revisions pulled up: - net/powerdns-ldap/Makefile 1.8-1.9 - net/powerdns-ldap/PLIST 1.2-1.3 - net/powerdns-mysql/Makefile 1.8-1.9 - net/powerdns-mysql/PLIST 1.3-1.4 - net/powerdns-pgsql/Makefile 1.10-1.11 - net/powerdns-pgsql/PLIST 1.2-1.3 - net/powerdns-sqlite/Makefile 1.5-1.6 - net/powerdns-sqlite/PLIST 1.2-1.3 - net/powerdns/Makefile 1.6-1.7 - net/powerdns/PLIST 1.3-1.4 - net/powerdns/distinfo 1.10 - net/powerdns/patches/patch-configure 1.1 --- Module Name: pkgsrc Committed By: ghen Date: Mon Jan 23 15:11:54 UTC 2012 Modified Files: pkgsrc/net/powerdns: Makefile PLIST distinfo pkgsrc/net/powerdns-ldap: Makefile PLIST pkgsrc/net/powerdns-mysql: Makefile PLIST pkgsrc/net/powerdns-pgsql: Makefile PLIST pkgsrc/net/powerdns-sqlite: Makefile PLIST Added Files: pkgsrc/net/powerdns/patches: patch-configure Log Message: Fix unportable == check in configure (I did not have PKG_DEVELOPER=yes when previously updating this pkg), noted by joerg. Also fix some PLIST issues (introduced with the same update). Bump PKGREVISION of affected packages. --- Module Name: pkgsrc Committed By: ghen Date: Wed Jan 25 10:21:12 UTC 2012 Modified Files: pkgsrc/net/powerdns: Makefile PLIST pkgsrc/net/powerdns-ldap: Makefile PLIST pkgsrc/net/powerdns-mysql: Makefile PLIST pkgsrc/net/powerdns-pgsql: Makefile PLIST pkgsrc/net/powerdns-sqlite: Makefile PLIST Log Message: Previous PLIST change was wrong due to a libdir bug now fixed by sbd. Revert PLIST and bump PKGREVISION again for powerdns + modules. @ text @a0 13 $NetBSD$ --- configure.orig 2012-01-23 14:16:18.745785316 +0000 +++ configure @@@@ -16867,7 +16867,7 @@@@ do done modulelibs="$modulelibs `cat $srcdir/modules/${a}backend/OBJECTLIBS`" - if test ${a} == "gpgsql"; then + if test ${a} = "gpgsql"; then case "$host_os" in freebsd*) ;; @