# Buildsheet autogenerated by ravenadm tool -- Do not edit. NAMEBASE= bind VERSION= 9.20.18 KEYWORDS= dns net VARIANTS= std SDESC[std]= Berkeley Internet Name Domain (Domain Name Server) HOMEPAGE= https://www.isc.org/downloads/bind/ CONTACT= nobody DOWNLOAD_GROUPS= main SITES[main]= ISC/bind9/9.20.18 DISTFILE[1]= bind-9.20.18.tar.xz:main DF_INDEX= 1 SPKGS[std]= set server tools man dev docs OPTIONS_AVAILABLE= FIXED_RRSET GEOIP LARGE_FILE QUERYTRACE OPTIONS_STANDARD= FIXED_RRSET GEOIP LARGE_FILE QUERYTRACE BUILD_DEPENDS= idnkit:dev:std idnkit:primary:std lmdb:dev:std libnghttp2:dev:std libuv:dev:std json-c:dev:std liburcu:dev:std BUILDRUN_DEPENDS= json-c:primary:std libuv:primary:std lmdb:primary:std libnghttp2:primary:std liburcu:primary:std EXRUN[tools]= idnkit:primary:std USES= cclibs:server,tools cpe iconv pkgconfig ssl readline ncurses:build libtool perl:build GNOME_COMPONENTS= libxml2 DISTNAME= bind-9.20.18 LICENSE= MPL:server LICENSE_FILE= MPL:{{WRKSRC}}/COPYRIGHT LICENSE_SCHEME= solo CPE_VENDOR= isc FPC_EQUIVALENT= dns/bind920 MUST_CONFIGURE= gnu CONFIGURE_ARGS= --localstatedir=/var --sysconfdir={{ETCDIR}} --disable-linux-caps --disable-dnstap --without-gssapi --with-readline --with-openssl={{OPENSSLBASE}} --with-lmdb STD_CDEFINES="-DDIG_SIGCHASE=1" SINGLE_JOB= yes INSTALL_REQ_TOOLCHAIN= yes PLIST_SUB= ETCDIR={{BIND_ETCDIR}} LIBVER=9.20.18 RC_SUBR= named:server SUB_FILES= named.conf SUB_LIST= NAMED_BEFORE="SERVERS" NAMED_REQUIRE="NETWORKING ldconfig syslogd" [FIXED_RRSET].DESCRIPTION= Enable fixed rrset ordering [FIXED_RRSET].CONFIGURE_ENABLE_BOTH= fixed-rrset [QUERYTRACE].DESCRIPTION= Enable the very verbose query tracelogging [QUERYTRACE].CONFIGURE_ENABLE_BOTH= querytrace [GEOIP].DESCRIPTION= Allow geographically based ACL [GEOIP].BUILDRUN_DEPENDS_ON= GeoIP:primary:std [GEOIP].BUILD_DEPENDS_ON= GeoIP:dev:std [GEOIP].CONFIGURE_ENABLE_BOTH= geoip [LARGE_FILE].DESCRIPTION= 64-bit file support [LARGE_FILE].CONFIGURE_ENABLE_BOTH= largefile post-patch: ${REINPLACE_CMD} -e "s|/opt/local|${PREFIX}|g" \ ${WRKSRC}/configure post-install: ${MKDIR} ${STAGEDIR}${ETCDIR} ${STAGEDIR}${STD_DOCDIR}/arm . for i in dynamic master slave working ${MKDIR} ${STAGEDIR}${ETCDIR}/$i . endfor . for l in bind/filter-a bind/filter-aaaa libdns libisc libisccc libisccfg libns ${STRIP_CMD} ${STAGEDIR}${PREFIX}/lib/${l}.so . endfor ${INSTALL_DATA} ${WRKDIR}/named.conf \ ${STAGEDIR}${ETCDIR}/named.conf.sample ${INSTALL_DATA} ${FILESDIR}/named.root \ ${STAGEDIR}${ETCDIR} ${INSTALL_DATA} ${FILESDIR}/empty.db \ ${STAGEDIR}${ETCDIR}/master ${INSTALL_DATA} ${FILESDIR}/localhost-forward.db \ ${STAGEDIR}${ETCDIR}/master ${INSTALL_DATA} ${FILESDIR}/localhost-reverse.db \ ${STAGEDIR}${ETCDIR}/master ${RM} -r ${STAGEDIR}/var # documentation ${INSTALL_DATA} ${WRKSRC}/doc/arm/*.rst ${STAGEDIR}${STD_DOCDIR}/arm ${INSTALL_DATA} ${WRKSRC}/README* ${STAGEDIR}${STD_DOCDIR} [FILE:743:descriptions/desc.server] BIND is open source software that enables you to publish your Domain Name System (DNS) information on the Internet, and to resolve DNS queries for your users. The name BIND stands for "Berkeley Internet Name Domain", because the software originated in the early 1980s at the University of California at Berkeley. BIND is by far the most widely used DNS software on the Internet, providing a robust and stable platform on top of which organizations can build distributed computing systems with the knowledge that those systems are fully compliant with published DNS standards. The BIND software distribution has three parts: 1. Domain Name Resolver 2. Domain Name Authority server 3. Tools This package contains parts 1 and 2. [FILE:357:descriptions/desc.tools] BIND is open source software that enables you to publish your Domain Name System (DNS) information on the Internet, and to resolve DNS queries for your users. The name BIND stands for "Berkeley Internet Name Domain", because the software originated in the early 1980s at the University of California at Berkeley. This package contains the BIND tools. [FILE:98:distinfo] dfc546c990ac4515529cd45c4dd995862b18ae8a2d0cb29208e8896a5d325331 5775248 bind-9.20.18.tar.xz [FILE:535:manifests/plist.server] @sample %%ETCDIR%%/named.conf.sample %%ETCDIR%%/named.root %%ETCDIR%%/master/ empty.db localhost-forward.db localhost-reverse.db bin/named-checkconf lib/ libdns-%%LIBVER%%.so libdns.so libisc-%%LIBVER%%.so libisc.so libisccc-%%LIBVER%%.so libisccc.so libisccfg-%%LIBVER%%.so libisccfg.so libns-%%LIBVER%%.so libns.so lib/bind/ filter-a.so filter-aaaa.so sbin/ ddns-confgen named rndc rndc-confgen tsig-keygen @dir(bind,bind,) %%ETCDIR%%/dynamic @dir(bind,bind,) %%ETCDIR%%/slave @dir(bind,bind,) %%ETCDIR%%/working [FILE:316:manifests/plist.tools] bin/ arpaname delv dig dnssec-cds dnssec-dsfromkey dnssec-importkey dnssec-keyfromlabel dnssec-keygen dnssec-ksr dnssec-revoke dnssec-settime dnssec-signzone dnssec-verify host mdig named-checkzone named-compilezone named-journalprint named-nzd2nzf named-rrchecker nsec3hash nslookup nsupdate [FILE:542:manifests/plist.man] share/man/man1/ arpaname.1 delv.1 dig.1 dnssec-cds.1 dnssec-dsfromkey.1 dnssec-importkey.1 dnssec-keyfromlabel.1 dnssec-keygen.1 dnssec-ksr.1 dnssec-revoke.1 dnssec-settime.1 dnssec-signzone.1 dnssec-verify.1 host.1 mdig.1 named-checkconf.1 named-checkzone.1 named-compilezone.1 named-journalprint.1 named-nzd2nzf.1 named-rrchecker.1 nsec3hash.1 nslookup.1 nsupdate.1 share/man/man5/ named.conf.5 rndc.conf.5 share/man/man8/ ddns-confgen.8 filter-a.8 filter-aaaa.8 named.8 rndc-confgen.8 rndc.8 tsig-keygen.8 [FILE:2362:manifests/plist.dev] include/dns/ acl.h adb.h badcache.h bit.h byaddr.h cache.h callbacks.h catz.h cert.h client.h clientinfo.h compress.h db.h dbiterator.h diff.h dispatch.h dlz.h dlz_dlopen.h dns64.h dnsrps.h dnssec.h dnstap.h ds.h dsdigest.h dsync.h dyndb.h ecs.h ede.h edns.h enumclass.h enumtype.h fixedname.h forward.h geoip.h ipkeylist.h iptable.h journal.h kasp.h keydata.h keyflags.h keymgr.h keystore.h keytable.h keyvalues.h librpz.h log.h master.h masterdump.h message.h name.h nametree.h ncache.h nsec.h nsec3.h nta.h opcode.h order.h peer.h private.h qp.h rbt.h rcode.h rdata.h rdataclass.h rdatalist.h rdataset.h rdatasetiter.h rdataslab.h rdatastruct.h rdatatype.h remote.h request.h resolver.h result.h rootns.h rpz.h rriterator.h rrl.h sdlz.h secalg.h secproto.h skr.h soa.h ssu.h stats.h time.h tkey.h trace.h transport.h tsig.h ttl.h types.h update.h validator.h view.h xfrin.h zone.h zonekey.h zoneverify.h zt.h include/dst/ dst.h gssapi.h include/irs/resconf.h include/isc/ ascii.h assertions.h async.h atomic.h attributes.h backtrace.h barrier.h base32.h base64.h buffer.h commandline.h condition.h counter.h crc64.h dir.h dnsstream.h endian.h errno.h error.h file.h fips.h formatcheck.h fuzz.h getaddresses.h hash.h hashmap.h heap.h helper.h hex.h histo.h hmac.h ht.h httpd.h interfaceiter.h iterated_hash.h job.h lang.h lex.h list.h log.h loop.h magic.h managers.h md.h mem.h meminfo.h mutex.h mutexblock.h net.h netaddr.h netmgr.h netscope.h nonce.h once.h os.h overflow.h parseint.h pause.h portset.h proxy2.h queue.h quota.h radix.h random.h ratelimiter.h refcount.h regex.h region.h result.h rwlock.h safe.h serial.h signal.h siphash.h sockaddr.h spinlock.h stats.h stdio.h stdtime.h strerr.h string.h symtab.h syslog.h thread.h tid.h time.h timer.h tls.h tm.h types.h urcu.h url.h utf8.h util.h uv.h work.h xml.h include/isccc/ alist.h base64.h cc.h ccmsg.h sexpr.h symtab.h symtype.h types.h util.h include/isccfg/ aclconf.h cfg.h check.h duration.h grammar.h kaspconf.h log.h namedconf.h include/ns/ client.h hooks.h interfacemgr.h listenlist.h log.h notify.h query.h server.h sortlist.h stats.h types.h update.h xfrout.h [FILE:148:files/empty.db] $TTL 3h @ SOA @ nobody.localhost. 42 1d 12h 1w 3h ; Serial, Refresh, Retry, Expire, Neg. cache TTL @ NS @ ; Silence a BIND warning @ A 127.0.0.1 [FILE:158:files/localhost-forward.db] $TTL 3h localhost. SOA localhost. nobody.localhost. 42 1d 12h 1w 3h ; Serial, Refresh, Retry, Expire, Neg. cache TTL NS localhost. A 127.0.0.1 AAAA ::1 [FILE:226:files/localhost-reverse.db] $TTL 3h @ SOA localhost. nobody.localhost. 42 1d 12h 1w 3h ; Serial, Refresh, Retry, Expire, Neg. cache TTL NS localhost. 1.0.0 PTR localhost. 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0 PTR localhost. [FILE:1688:files/messages-server.ucl] server: { type: "install" message: </dev/null devfs_domount ${named_chrootdir}/dev devfsrules_hide_all devfs -m ${named_chrootdir}/dev rule apply path null unhide devfs -m ${named_chrootdir}/dev rule apply path random unhide else if [ -c ${named_chrootdir}/dev/null -a \ -c ${named_chrootdir}/dev/random ]; then info "named chroot: using pre-mounted devfs." else err 1 "named chroot: devfs cannot be mounted from " \ "within a jail. Thus a chrooted named cannot " \ "be run from within a jail. Either mount the " \ "devfs with null and random from the host, or " \ "run named without chrooting it, set " \ "named_chrootdir=\"\" in /etc/rc.conf." fi fi # If OpenSSL from ports, then the engines should be present in the # chroot, named loads them after chrooting. if [ -d ${_openssl_engines} ]; then # FIXME when 8.4 is gone see if # security.jail.param.allow.mount.nullfs can be used. if [ `${SYSCTL_N} security.jail.jailed` -eq 0 -o `${SYSCTL_N} security.jail.mount_allowed` -eq 1 ]; then mkdir -p ${named_chrootdir}${_openssl_engines} mount -t nullfs ${_openssl_engines} ${named_chrootdir}${_openssl_engines} else warn "named chroot: cannot nullfs mount OpenSSL" \ "engines into the chroot, will copy the shared" \ "libraries instead." mkdir -p ${named_chrootdir}${_openssl_engines} cp -f ${_openssl_engines}/*.so ${named_chrootdir}${_openssl_engines} fi fi # Copy and/or update key files to the chroot /etc # for file in localtime protocols services; do if [ -r /etc/${file} ] && \ ! cmp -s /etc/${file} "${named_chrootdir}/etc/${file}"; then cp -p /etc/${file} "${named_chrootdir}/etc/${file}" fi done } # Make symlinks to the correct pid file # make_symlinks() { checkyesno named_symlink_enable && ln -fs "${named_chrootdir}${pidfile}" ${pidfile} } named_poststart() { make_symlinks if checkyesno named_wait; then until ${_named_program_root}/bin/host ${named_wait_host} >/dev/null 2>&1; do echo " Waiting for nameserver to resolve ${named_wait_host}" sleep 1 done fi } named_reload() { # This is a one line function, but ${named_program} is not defined early # enough to be there when the reload_cmd variable is defined up there. rndc reload } find_pidfile() { if get_pidfile_from_conf pid-file ${named_conf}; then pidfile="${_pidfile_from_conf}" else pidfile="/var/run/named/pid" fi } named_stop() { find_pidfile # This duplicates an undesirably large amount of code from the stop # routine in rc.subr in order to use rndc to shut down the process, # and to give it a second chance in case rndc fails. rc_pid=$(check_pidfile ${pidfile} ${command}) if [ -z "${rc_pid}" ]; then [ -n "${rc_fast}" ] && return 0 _run_rc_notrunning return 1 fi echo 'Stopping named.' if rndc stop; then wait_for_pids ${rc_pid} else echo -n 'rndc failed, trying kill: ' kill -TERM ${rc_pid} wait_for_pids ${rc_pid} fi } named_poststop() { if [ -n "${named_chrootdir}" -a -c ${named_chrootdir}/dev/null ]; then # if using OpenSSL from ports, unmount OpenSSL engines, if they # were not mounted but only copied, do nothing. if [ -d ${_openssl_engines} -a \( `${SYSCTL_N} security.jail.jailed` -eq 0 -o `${SYSCTL_N} security.jail.mount_allowed` -eq 1 \) ]; then umount ${named_chrootdir}${_openssl_engines} fi # unmount /dev if [ `${SYSCTL_N} security.jail.jailed` -eq 0 ]; then umount ${named_chrootdir}/dev 2>/dev/null || true else warn "named chroot:" \ "cannot unmount devfs from inside jail!" fi fi } create_file() { if [ -e "$1" ]; then unlink $1 fi install -o root -g wheel -m 0644 /dev/null $1 } rndc() { if [ -z "${rndc_flags}" ]; then if [ -s "${rndc_conf}" ] ; then rndc_flags="-c ${rndc_conf}" elif [ -s "${rndc_key}" ] ; then rndc_flags="-k ${rndc_key}" else rndc_flags="" fi fi ${_named_program_root}/sbin/rndc ${rndc_flags} "$@" } named_prestart() { find_pidfile if [ -n "${named_pidfile}" ]; then warn 'named_pidfile: now determined from the conf file' fi piddir=`/usr/bin/dirname ${pidfile}` if [ ! -d ${piddir} ]; then install -d -o ${named_uid} -g ${named_uid} ${piddir} fi command_args="-u ${named_uid:=root} -c ${named_conf} ${command_args}" local line nsip firstns # Is the user using a sandbox? # if [ -n "${named_chrootdir}" ]; then rc_flags="${rc_flags} -t ${named_chrootdir}" checkyesno named_chroot_autoupdate && chroot_autoupdate else named_symlink_enable=NO fi # Create an rndc.key file for the user if none exists # confgen_command="${_named_program_root}/sbin/rndc-confgen -a -b256 -u ${named_uid} \ -c ${_named_confdir}/rndc.key" if [ -s "${_named_confdir}/rndc.conf" ]; then unset confgen_command fi if [ -s "${_named_confdir}/rndc.key" ]; then case `stat -f%Su ${_named_confdir}/rndc.key` in root|${named_uid}) ;; *) ${confgen_command} ;; esac else ${confgen_command} fi local checkconf checkconf="${_named_program_root}/bin/named-checkconf" if ! checkyesno named_chroot_autoupdate && [ -n "${named_chrootdir}" ]; then checkconf="${checkconf} -t ${named_chrootdir}" fi # Create a forwarder configuration based on /etc/resolv.conf if checkyesno named_auto_forward; then if [ ! -s /etc/resolv.conf ]; then warn "named_auto_forward enabled, but no /etc/resolv.conf" # Empty the file in case it is included in named.conf [ -s "${_named_confdir}/auto_forward.conf" ] && create_file ${_named_confdir}/auto_forward.conf ${checkconf} ${named_conf} || err 3 'named-checkconf for ${named_conf} failed' return fi create_file /var/run/naf-resolv.conf create_file /var/run/auto_forward.conf echo ' forwarders {' > /var/run/auto_forward.conf while read line; do case "${line}" in 'nameserver '*|'nameserver '*) nsip=${line##nameserver[ ]} if [ -z "${firstns}" ]; then if [ ! "${nsip}" = '127.0.0.1' ]; then echo 'nameserver 127.0.0.1' echo " ${nsip};" >> /var/run/auto_forward.conf fi firstns=1 else [ "${nsip}" = '127.0.0.1' ] && continue echo " ${nsip};" >> /var/run/auto_forward.conf fi ;; esac echo ${line} done < /etc/resolv.conf > /var/run/naf-resolv.conf echo ' };' >> /var/run/auto_forward.conf echo '' >> /var/run/auto_forward.conf if checkyesno named_auto_forward_only; then echo " forward only;" >> /var/run/auto_forward.conf else echo " forward first;" >> /var/run/auto_forward.conf fi if cmp -s /etc/resolv.conf /var/run/naf-resolv.conf; then unlink /var/run/naf-resolv.conf else [ -e /etc/resolv.conf ] && unlink /etc/resolv.conf mv /var/run/naf-resolv.conf /etc/resolv.conf fi if cmp -s ${_named_confdir}/auto_forward.conf \ /var/run/auto_forward.conf; then unlink /var/run/auto_forward.conf else [ -e "${_named_confdir}/auto_forward.conf" ] && unlink ${_named_confdir}/auto_forward.conf mv /var/run/auto_forward.conf \ ${_named_confdir}/auto_forward.conf fi else # Empty the file in case it is included in named.conf [ -s "${_named_confdir}/auto_forward.conf" ] && create_file ${_named_confdir}/auto_forward.conf fi ${checkconf} ${named_conf} || err 3 "named-checkconf for ${named_conf} failed" } run_rc_command "$1" [FILE:3289:files/named.root] ; This file holds the information on root name servers needed to ; initialize cache of Internet domain name servers ; (e.g. reference this file in the "cache . " ; configuration file of BIND domain name servers). ; ; This file is made available by InterNIC ; under anonymous FTP as ; file /domain/named.cache ; on server FTP.INTERNIC.NET ; -OR- RS.INTERNIC.NET ; ; last update: April 11, 2017 ; related version of root zone: 2017041101 ; ; formerly NS.INTERNIC.NET ; . 3600000 NS A.ROOT-SERVERS.NET. A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:ba3e::2:30 ; ; FORMERLY NS1.ISI.EDU ; . 3600000 NS B.ROOT-SERVERS.NET. B.ROOT-SERVERS.NET. 3600000 A 192.228.79.201 B.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:84::b ; ; FORMERLY C.PSI.NET ; . 3600000 NS C.ROOT-SERVERS.NET. C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12 C.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2::c ; ; FORMERLY TERP.UMD.EDU ; . 3600000 NS D.ROOT-SERVERS.NET. D.ROOT-SERVERS.NET. 3600000 A 199.7.91.13 D.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2d::d ; ; FORMERLY NS.NASA.GOV ; . 3600000 NS E.ROOT-SERVERS.NET. E.ROOT-SERVERS.NET. 3600000 A 192.203.230.10 E.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:a8::e ; ; FORMERLY NS.ISC.ORG ; . 3600000 NS F.ROOT-SERVERS.NET. F.ROOT-SERVERS.NET. 3600000 A 192.5.5.241 F.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2f::f ; ; FORMERLY NS.NIC.DDN.MIL ; . 3600000 NS G.ROOT-SERVERS.NET. G.ROOT-SERVERS.NET. 3600000 A 192.112.36.4 G.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:12::d0d ; ; FORMERLY AOS.ARL.ARMY.MIL ; . 3600000 NS H.ROOT-SERVERS.NET. H.ROOT-SERVERS.NET. 3600000 A 198.97.190.53 H.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:1::53 ; ; FORMERLY NIC.NORDU.NET ; . 3600000 NS I.ROOT-SERVERS.NET. I.ROOT-SERVERS.NET. 3600000 A 192.36.148.17 I.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fe::53 ; ; OPERATED BY VERISIGN, INC. ; . 3600000 NS J.ROOT-SERVERS.NET. J.ROOT-SERVERS.NET. 3600000 A 192.58.128.30 J.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:c27::2:30 ; ; OPERATED BY RIPE NCC ; . 3600000 NS K.ROOT-SERVERS.NET. K.ROOT-SERVERS.NET. 3600000 A 193.0.14.129 K.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fd::1 ; ; OPERATED BY ICANN ; . 3600000 NS L.ROOT-SERVERS.NET. L.ROOT-SERVERS.NET. 3600000 A 199.7.83.42 L.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:9f::42 ; ; OPERATED BY WIDE ; . 3600000 NS M.ROOT-SERVERS.NET. M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33 M.ROOT-SERVERS.NET. 3600000 AAAA 2001:dc3::35 ; End of file [FILE:59:files/special.mk] BIND_ETCDIR?= etc/namedb ETCDIR= ${PREFIX}/${BIND_ETCDIR}