rpms/bind/F-7 .cvsignore, 1.26, 1.27 bind-9.3.2-redhat_doc.patch, 1.2, 1.3 bind-chroot-admin.in, 1.22, 1.23 bind.spec, 1.182, 1.183 sources, 1.33, 1.34 bind-9.3.1-redhat_doc.patch, 1.1, NONE

Adam Tkac (atkac) fedora-extras-commits at redhat.com
Tue Jun 5 12:16:55 UTC 2007


Author: atkac

Update of /cvs/pkgs/rpms/bind/F-7
In directory cvs-int.fedora.redhat.com:/tmp/cvs-serv5306

Modified Files:
	.cvsignore bind-9.3.2-redhat_doc.patch bind-chroot-admin.in 
	bind.spec sources 
Removed Files:
	bind-9.3.1-redhat_doc.patch 
Log Message:
- added /var/named/dynamic directory which is primary designed for dynamic DNS zones



Index: .cvsignore
===================================================================
RCS file: /cvs/pkgs/rpms/bind/F-7/.cvsignore,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -r1.26 -r1.27
--- .cvsignore	2 May 2007 14:47:24 -0000	1.26
+++ .cvsignore	5 Jun 2007 12:16:15 -0000	1.27
@@ -1,3 +1,3 @@
-bind-chroot.tar.gz
-libbind-man.tar.gz
 bind-9.4.1.tar.gz
+libbind-man.tar.gz
+bind-chroot.tar.bz2

bind-9.3.2-redhat_doc.patch:

Index: bind-9.3.2-redhat_doc.patch
===================================================================
RCS file: /cvs/pkgs/rpms/bind/F-7/bind-9.3.2-redhat_doc.patch,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- bind-9.3.2-redhat_doc.patch	12 Mar 2007 15:15:37 -0000	1.2
+++ bind-9.3.2-redhat_doc.patch	5 Jun 2007 12:16:15 -0000	1.3
@@ -1,6 +1,6 @@
 --- bind-9.4.0/bin/named/named.8.redhat_doc	2007-01-30 01:23:44.000000000 +0100
 +++ bind-9.4.0/bin/named/named.8	2007-03-12 15:39:19.000000000 +0100
-@@ -205,6 +205,75 @@
+@@ -205,6 +205,76 @@
  \fI/var/run/named.pid\fR
  .RS 4
  The default process\-id file.
@@ -37,9 +37,9 @@
 +means that files in the zone database directory cannot be modified by dynamic
 +DNS (DDNS) updates or zone transfers.
 +.PP
-+The Red Hat BIND distribution and SELinux policy creates two directories where
-+named is allowed to create and modify files: $ROOTDIR/var/named/slaves and
-+$ROOTDIR/var/named/data. By placing files you want named to modify, such as
++The Red Hat BIND distribution and SELinux policy creates three directories where
++named is allowed to create and modify files: /var/named/slaves, /var/named/dynamic
++and /var/named/data. By placing files you want named to modify, such as
 +slave or DDNS updateable zone files and database / statistics dump files in 
 +these directories, named will work normally and no further operator action is
 +required. Files in these directories are automatically assigned the 'named_cache_t'
@@ -50,7 +50,8 @@
 +setsebool(8) command or the system-config-security GUI . If you do this, you
 +must also set the ENABLE_ZONE_WRITE variable in /etc/sysconfig/named to 
 +1 / yes to set the ownership of files in the $ROOTDIR/var/named directory
-+to named:named in order for named to be allowed to write them. 
++to named:named in order for named to be allowed to write them.
++NOTE: this approach is deprecated and will be drop in future releases
 +.PP
 +\fBRed Hat BIND named_sdb SDB support:\fR
 +.PP


Index: bind-chroot-admin.in
===================================================================
RCS file: /cvs/pkgs/rpms/bind/F-7/bind-chroot-admin.in,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -r1.22 -r1.23
--- bind-chroot-admin.in	24 May 2007 14:16:40 -0000	1.22
+++ bind-chroot-admin.in	5 Jun 2007 12:16:15 -0000	1.23
@@ -78,18 +78,18 @@
 	/bin/chown root:named /etc/sysconfig/named;
 	/bin/chmod 0640 /etc/sysconfig/named;
     fi
-    /bin/mkdir -p ${BIND_DIR}/{slaves,data};
+    /bin/mkdir -p ${BIND_DIR}/{slaves,data,dynamic};
     /bin/chown --preserve-root root:named ${BIND_DIR};
-    /bin/chown --preserve-root named:named ${BIND_DIR}/{slaves,data};
+    /bin/chown --preserve-root named:named ${BIND_DIR}/{slaves,data,dynamic};
     /bin/chmod --preserve-root 750 ${BIND_DIR}
-    /bin/chmod --preserve-root 770 ${BIND_DIR}/{slaves,data};
+    /bin/chmod --preserve-root 770 ${BIND_DIR}/{slaves,data,dynamic};
         
-    mkdir -p ${BIND_CHROOT_PREFIX}/{etc,dev,var/{run/named,named/{slaves,data}}};
+    mkdir -p ${BIND_CHROOT_PREFIX}/{etc,dev,var/{run/named,named/{slaves,data,dynamic}}};
     /bin/chown --preserve-root root:named ${BIND_CHROOT_PREFIX}/{etc,dev,var/{run,named/}};
     /bin/chown --preserve-root root:named ${BIND_CHROOT_PREFIX}/var;
     /bin/chmod --preserve-root 750 ${BIND_CHROOT_PREFIX}/{,etc,dev,var,var/{run,named/}};
-    /bin/chown --preserve-root named:named ${BIND_CHROOT_PREFIX}/var/{run/named,named/{data,slaves}};
-    /bin/chmod --preserve-root 770 ${BIND_CHROOT_PREFIX}/var/{run/named,named/{slaves,data}};        
+    /bin/chown --preserve-root named:named ${BIND_CHROOT_PREFIX}/var/{run/named,named/{data,slaves,dynamic}};
+    /bin/chmod --preserve-root 770 ${BIND_CHROOT_PREFIX}/var/{run/named,named/{slaves,data,dynamic}};        
     
     [ ! -e "${BIND_CHROOT_PREFIX}/dev/random" ] && /bin/mknod "${BIND_CHROOT_PREFIX}/dev/random" c 1 8 
     [ ! -e "${BIND_CHROOT_PREFIX}/dev/zero" ] && /bin/mknod "${BIND_CHROOT_PREFIX}/dev/zero" c 1 5
@@ -238,7 +238,7 @@
     changed=`/bin/mktemp /tmp/XXXXXX`;
     rm -f $changed
     if [ $ENABLED -eq 0 ] ; then # chroot is enabled
-	/usr/bin/find /{etc/{named.*,rndc.*},${BIND_DIR#/}{/*,/data/*,/slaves/*}}  -maxdepth 0 -type f |
+	/usr/bin/find /{etc/{named.*,rndc.*},${BIND_DIR#/}{/*,/data/*,/slaves/*,/dynamic/*}}  -maxdepth 0 -type f |
 	while read f;
         do
 	    replace_with_link ${BIND_CHROOT_PREFIX}/$f $f;
@@ -251,7 +251,7 @@
 	done
 	pfx=${BIND_CHROOT_PREFIX}
     else              # chroot is disabled	
-	/usr/bin/find /var/named/chroot/{etc/{named.*,rndc.*},var/named{/*,/data/*,/slaves/*}} -maxdepth 0 |
+	/usr/bin/find /var/named/chroot/{etc/{named.*,rndc.*},var/named{/*,/data/*,/slaves/*,/dynamic/*}} -maxdepth 0 |
 	while read f; 
 	do
 	    if [ ! -d "$f" ]; then
@@ -280,11 +280,11 @@
     chmod 750 ${pfx}/var/named  >/dev/null 2>&1;
     chmod 640 ${pfx}/var/named/* >/dev/null 2>&1;
     chmod 750 ${pfx}/var/named/*/. >/dev/null 2>&1;
-    chown -h named:named /var/named/{data{,/*},slaves{,*/}} >/dev/null 2>&1;
-    chown -h named:named ${BIND_CHROOT_PREFIX}/var/named/{data{,/*},slaves{,*/}} >/dev/null 2>&1;
-    chmod 770 ${pfx}/var/named/{data,slaves} >/dev/null 2>&1;
-    chmod 660 ${pfx}/var/named/{data/*,slaves/*} >/dev/null 2>&1;
-    chmod 770 ${pfx}/var/named/{data/*/.,slaves/*/.} >/dev/null 2>&1;
+    chown -h named:named /var/named/{data{,/*},slaves{,/*},dynamic{,/*}} >/dev/null 2>&1;
+    chown -h named:named ${BIND_CHROOT_PREFIX}/var/named/{data{,/*},slaves{,/*},dynamic{,/*}} >/dev/null 2>&1;
+    chmod 770 ${pfx}/var/named/{data,slaves,dynamic} >/dev/null 2>&1;
+    chmod 660 ${pfx}/var/named/{data/*,slaves/*,dynamic/*} >/dev/null 2>&1;
+    chmod 770 ${pfx}/var/named/{data/*/.,slaves/*/.,dynamic/*/.} >/dev/null 2>&1;
     if [ -e $changed ]; then
 	if selinux_enabled && [ -x /sbin/restorecon ]; then
 	   /sbin/restorecon -R ${BIND_CHROOT_PREFIX}/etc ${BIND_CHROOT_PREFIX}/var/named ${BIND_CHROOT_PREFIX}/var/run/named >/dev/null 2>&1;
@@ -295,7 +295,7 @@
 	   /sbin/restorecon /etc/rndc.key   >/dev/null 2>&1;
 	   /sbin/restorecon /etc/rndc.conf  >/dev/null 2>&1;
 	   /sbin/restorecon /var/named{/,/*} >/dev/null 2>&1;
-	   /sbin/restorecon /var/named/{slaves,data}{/,/*} >/dev/null 2>&1;
+	   /sbin/restorecon /var/named/{slaves,data,dynamic}{/,/*} >/dev/null 2>&1;
 	   /sbin/restorecon /var/named/named.ca ${BIND_CHROOT_PREFIX}/var/named/named.ca  >/dev/null 2>&1;
 	   /sbin/restorecon ${BIND_CHROOT_PREFIX} >/dev/null 2>&1;
 	   /sbin/restorecon /var/named/named.ca >/dev/null 2>&1;
@@ -319,6 +319,7 @@
 	    rmdir ${BIND_CHROOT_PREFIX}/var/run/dbus  >/dev/null 2>&1 || :;
 	    rmdir ${BIND_CHROOT_PREFIX}/var/run  >/dev/null 2>&1 || :;
 	    rmdir ${BIND_CHROOT_PREFIX}/var/named/slaves  >/dev/null 2>&1 || :;
+	    rmdir ${BIND_CHROOT_PREFIX}/var/named/dynamic  >/dev/null 2>&1 || :;
 	    rmdir ${BIND_CHROOT_PREFIX}/var/named/data  >/dev/null 2>&1 || :;
 	    rmdir ${BIND_CHROOT_PREFIX}/var/named  >/dev/null 2>&1 || :;
 	    rmdir ${BIND_CHROOT_PREFIX}/var/tmp  >/dev/null 2>&1 || :;


Index: bind.spec
===================================================================
RCS file: /cvs/pkgs/rpms/bind/F-7/bind.spec,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -r1.182 -r1.183
--- bind.spec	24 May 2007 14:16:40 -0000	1.182
+++ bind.spec	5 Jun 2007 12:16:15 -0000	1.183
@@ -17,7 +17,7 @@
 Name: 		bind
 License: 	BSD-like
 Version: 	9.4.1
-Release: 	4%{?dist}
+Release: 	5%{?dist}
 Epoch:   	31
 Url: 		http://www.isc.org/products/BIND/
 Buildroot:	%{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
@@ -29,7 +29,7 @@
 Source3: 	named.logrotate
 Source4: 	keygen.c
 Source5: 	rfc1912.txt
-Source6: 	bind-chroot.tar.gz
+Source6: 	bind-chroot.tar.bz2
 Source7: 	bind-9.3.1rc1-sdb_tools-Makefile.in
 Source8: 	http://www.venaas.no/ldap/bind-sdb/dnszone.schema
 Source9: 	libbind-man.tar.gz
@@ -375,11 +375,12 @@
 mkdir -p ${RPM_BUILD_ROOT}/var/named
 mkdir -p ${RPM_BUILD_ROOT}/var/named/slaves
 mkdir -p ${RPM_BUILD_ROOT}/var/named/data
+mkdir -p ${RPM_BUILD_ROOT}/var/named/dynamic
 mkdir -p ${RPM_BUILD_ROOT}%{_mandir}/{man1,man5,man8}
 mkdir -p ${RPM_BUILD_ROOT}/var/run/named
 #chroot
 mkdir -p ${RPM_BUILD_ROOT}/%{chroot_prefix}
-tar --no-same-owner -zxvf %{SOURCE6} --directory ${RPM_BUILD_ROOT}/%{chroot_prefix}
+tar --no-same-owner -jxvf %{SOURCE6} --directory ${RPM_BUILD_ROOT}/%{chroot_prefix}
 # these are required to prevent them being erased during upgrade of previous
 # versions that included them (bug #130121):
 touch ${RPM_BUILD_ROOT}/%{chroot_prefix}/etc/named.conf
@@ -628,6 +629,7 @@
 %dir /var/named
 %defattr(0660,named,named,0770)
 %dir /var/named/slaves
+%dir /var/named/dynamic
 %dir /var/named/data
 %dir /var/run/named
 %defattr(0754,root,root,0750)
@@ -761,6 +763,7 @@
 %defattr(0660,named,named,0770)
 %dir %prefix/var/named/slaves
 %dir %prefix/var/named/data
+%dir %prefix/var/named/dynamic
 %dir %prefix/var/run/named
 %dir %prefix/var/tmp
 %ghost %prefix/dev/null
@@ -806,6 +809,11 @@
 
 
 %changelog
+* Tue Jun 05 2007 Adam Tkac <atkac redhat com> 31:9.4.1-5.fc7
+- added /var/named/dynamic directory. This directory is primary designed
+  for dynamic DNS zones. In future releases named could write only into
+  dynamic, data and slaves directories
+
 * Thu May 24 2007 Adam Tkac <atkac redhat com> 31:9.4.1-4.fc7
 - start using deprecated ldap API
 - fix minor bug in bind-chroot-admin (#241103)


Index: sources
===================================================================
RCS file: /cvs/pkgs/rpms/bind/F-7/sources,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -r1.33 -r1.34
--- sources	2 May 2007 14:47:24 -0000	1.33
+++ sources	5 Jun 2007 12:16:15 -0000	1.34
@@ -1,3 +1,3 @@
-3567c35a24cb83a8a69443a399bbb6c8  bind-chroot.tar.gz
-13fef79f99fcefebb51d84b08805de51  libbind-man.tar.gz
 09b54d35036cb0423b2e618f21766285  bind-9.4.1.tar.gz
+13fef79f99fcefebb51d84b08805de51  libbind-man.tar.gz
+5306e4032389c2a8ddba678882bc82ad  bind-chroot.tar.bz2


--- bind-9.3.1-redhat_doc.patch DELETED ---




More information about the fedora-extras-commits mailing list