Index: branches/2018Q4/dns/powerdns-recursor40/Makefile =================================================================== --- branches/2018Q4/dns/powerdns-recursor40/Makefile (revision 485328) +++ branches/2018Q4/dns/powerdns-recursor40/Makefile (revision 485329) @@ -1,66 +1,69 @@ # Created by: sten@blinkenlights.nl # $FreeBSD$ PORTNAME= recursor -DISTVERSION= 4.0.8 -PORTREVISION= 7 +DISTVERSION= 4.0.9 +PORTREVISION?= 0 CATEGORIES= dns ipv6 MASTER_SITES= http://downloads.powerdns.com/releases/ PKGNAMEPREFIX= powerdns- PKGNAMESUFFIX= 40 DISTNAME= pdns-${PORTNAME}-${DISTVERSION} MAINTAINER= tremere@cainites.net COMMENT= Advanced DNS recursor LICENSE= GPLv2 + +DEPRECATED= FreeBSD 10.3 has reached EoL since 2018-04-30; users should upgrade and use dns/powerdns-recursor instead +EXPIRATION_DATE= 2018-12-31 BROKEN_armv6= fails to compile: use of overloaded operator << is ambiguous BROKEN_armv7= fails to compile: use of overloaded operator << is ambiguous BROKEN_sparc64= fails to compile: json11.cpp: undefined reference to std::__throw_out_of_range_fmt BROKEN_powerpc64= fails to compile: dnslabeltext.cc: undefined reference to std::__cxx11::basic_string BUILD_DEPENDS= ${LOCALBASE}/include/boost/shared_ptr.hpp:devel/boost-libs LIB_DEPENDS= libboost_context.so:devel/boost-libs \ libprotobuf.so:devel/protobuf CONFLICTS_INSTALL= powerdns-recursor USES= compiler:c++11-lib cpe gmake localbase:ldflags pkgconfig ssl tar:bzip2 GNU_CONFIGURE= YES CXXFLAGS+= -D_GLIBCXX_USE_C99 CONFIGURE_ARGS= --sysconfdir=${PREFIX}/etc/pdns \ --with-protobuf CPE_VENDOR= powerdns USE_RC_SUBR= pdns-recursor OPTIONS_DEFINE= OPTALGO SETUID OPTIONS_DEFAULT= LUA SETUID OPTIONS_RADIO= LUA_RG OPTIONS_RADIO_LUA_RG= LUA LUAJIT LUAJIT_DESC= Enable LuaJIT LUA_RG_DESC= Lua Engine OPTALGO_DESC= Enable optional algorithms (12, 15 & 16) SETUID_DESC= Run as pdns_recursor user LUA_CONFIGURE_WITH= lua LUA_USES= lua LUAJIT_CONFIGURE_WITH= luajit LUAJIT_LIB_DEPENDS= libluajit-5.1.so.2:lang/luajit OPTALGO_CONFIGURE_ON= --enable-botan \ --enable-libdecaf \ --enable-libsodium OPTALGO_LIB_DEPENDS= libbotan-2.so:security/botan2 \ libdecaf.so:security/libdecaf \ libsodium.so:security/libsodium SETUID_VARS= USERS=pdns_recursor GROUPS=pdns SETUID_EXTRA_PATCHES= ${PATCHDIR}/extrapatch-setuid SUB_FILES= pkg-message .include Index: branches/2018Q4/dns/powerdns-recursor40/distinfo =================================================================== --- branches/2018Q4/dns/powerdns-recursor40/distinfo (revision 485328) +++ branches/2018Q4/dns/powerdns-recursor40/distinfo (revision 485329) @@ -1,3 +1,3 @@ -TIMESTAMP = 1513108912 -SHA256 (pdns-recursor-4.0.8.tar.bz2) = 9c6ff00f0e26044b0c81f1a8304743b4fc0f6699a356fce28cc8c2e6aaf16513 -SIZE (pdns-recursor-4.0.8.tar.bz2) = 1071831 +TIMESTAMP = 1541587471 +SHA256 (pdns-recursor-4.0.9.tar.bz2) = a4d8cf2401488c0a2d9c5f97bb6ebf135243edf2272aa66aa3855f94551fe8b8 +SIZE (pdns-recursor-4.0.9.tar.bz2) = 1117598 Index: branches/2018Q4/dns/powerdns-recursor40/files/patch-boost-1.67 =================================================================== --- branches/2018Q4/dns/powerdns-recursor40/files/patch-boost-1.67 (revision 485328) +++ branches/2018Q4/dns/powerdns-recursor40/files/patch-boost-1.67 (revision 485329) @@ -1,2230 +1,2230 @@ https://github.com/PowerDNS/pdns/commit/e6a9dde524b5 ---- arguments.cc.orig 2017-12-11 10:38:52 UTC +--- arguments.cc.orig 2018-11-06 14:56:58 UTC +++ arguments.cc -@@ -443,7 +443,7 @@ bool ArgvMap::file(const char *fname, bool lax, bool i +@@ -443,7 +443,7 @@ bool ArgvMap::file(const char *fname, bo set("include-dir","Directory to include configuration files from"); if(!parseFile(fname, "", lax)) { - L << Logger::Warning << "Unable to open " << fname << std::endl; + g_log << Logger::Warning << "Unable to open " << fname << std::endl; return false; } -@@ -453,7 +453,7 @@ bool ArgvMap::file(const char *fname, bool lax, bool i +@@ -453,7 +453,7 @@ bool ArgvMap::file(const char *fname, bo gatherIncludes(extraConfigs); for(const std::string& fn : extraConfigs) { if (!file(fn.c_str(), lax, true)) { - L << Logger::Error << fn << " could not be parsed" << std::endl; + g_log << Logger::Error << fn << " could not be parsed" << std::endl; throw ArgException(fn + " could not be parsed"); } } -@@ -471,18 +471,18 @@ void ArgvMap::gatherIncludes(std::vector +@@ -471,18 +471,18 @@ void ArgvMap::gatherIncludes(std::vector // stat if (stat(params["include-dir"].c_str(), &st)) { - L << Logger::Error << params["include-dir"] << " does not exist!" << std::endl; + g_log << Logger::Error << params["include-dir"] << " does not exist!" << std::endl; throw ArgException(params["include-dir"] + " does not exist!"); } // wonder if it's accessible directory if (!S_ISDIR(st.st_mode)) { - L << Logger::Error << params["include-dir"] << " is not a directory" << std::endl; + g_log << Logger::Error << params["include-dir"] << " is not a directory" << std::endl; throw ArgException(params["include-dir"] + " is not a directory"); } if (!(dir = opendir(params["include-dir"].c_str()))) { - L << Logger::Error << params["include-dir"] << " is not accessible" << std::endl; + g_log << Logger::Error << params["include-dir"] << " is not accessible" << std::endl; throw ArgException(params["include-dir"] + " is not accessible"); } -@@ -494,7 +494,7 @@ void ArgvMap::gatherIncludes(std::vector +@@ -494,7 +494,7 @@ void ArgvMap::gatherIncludes(std::vector namebuf << params["include-dir"].c_str() << "/" << ent->d_name; // FIXME: Use some path separator // ensure it's readable file if (stat(namebuf.str().c_str(), &st) || !S_ISREG(st.st_mode)) { - L << Logger::Error << namebuf.str() << " is not a file" << std::endl; + g_log << Logger::Error << namebuf.str() << " is not a file" << std::endl; closedir(dir); throw ArgException(namebuf.str() + " does not exist!"); } ---- dns.hh.orig 2017-12-11 10:38:52 UTC +--- dns.hh.orig 2018-11-06 14:56:58 UTC +++ dns.hh -@@ -241,7 +241,6 @@ inline uint16_t * getFlagsFromDNSHeader(struct dnshead +@@ -241,7 +241,6 @@ inline uint16_t * getFlagsFromDNSHeader( #define FLAGS_CD_OFFSET (12) #endif -#define L theL() extern time_t s_starttime; uint32_t hashQuestion(const char* packet, uint16_t len, uint32_t init); ---- gss_context.cc.orig 2017-12-11 10:38:52 UTC +--- gss_context.cc.orig 2018-11-06 14:56:58 UTC +++ gss_context.cc -@@ -456,17 +456,17 @@ bool gss_add_signature(const DNSName& context, const s +@@ -456,17 +456,17 @@ bool gss_add_signature(const DNSName& co string tmp_mac; GssContext gssctx(context); if (!gssctx.valid()) { - L<& ret, const QType& qtype) -@@ -310,7 +309,7 @@ RecursorLua4::RecursorLua4(const std::string& fname) +@@ -309,7 +308,7 @@ RecursorLua4::RecursorLua4(const std::st cas.insert(boost::get(in)); } } - catch(std::exception& e) { theL() <registerFunction("check",[](const cas_t& cas, const ComboAddress&ca) { -@@ -464,7 +463,7 @@ RecursorLua4::RecursorLua4(const std::string& fname) +@@ -463,7 +462,7 @@ RecursorLua4::RecursorLua4(const std::st } } catch(std::exception& e) { - theL() <writeFunction("pdnslog", [](const std::string& msg, boost::optional loglevel) { - theL() << (Logger::Urgency)loglevel.get_value_or(Logger::Warning) << msg< > in_t; vector > > pd{ -@@ -650,7 +649,7 @@ loop:; +@@ -649,7 +648,7 @@ loop:; dq->udpAnswer = GenUDPQueryResponse(dq->udpQueryDest, dq->udpQuery); auto cbFunc = d_lw->readVariable>(dq->udpCallback).get_value_or(0); if(!cbFunc) { - theL()<d_rcode = RCode::FormErr; g_stats.serverParseError++; #ifdef HAVE_PROTOBUF -@@ -287,7 +287,7 @@ int asyncresolve(const ComboAddress& ip, const DNSName +@@ -287,7 +287,7 @@ int asyncresolve(const ComboAddress& ip, return 1; // success - oddly enough } catch(...) { - L< size) { - L< *nearMissLimit) { - L< "<<*nearMissLimit<<") bogus answers for '"< "<<*nearMissLimit<<") bogus answers for '"< tcpClientCounts_t; @@ -587,10 +587,10 @@ TCPConnection::~TCPConnection() { try { if(closesocket(d_fd) < 0) - L<count(d_remote) && !(*t_tcpClientCounts)[d_remote]--) @@ -798,12 +798,12 @@ void startDoResolve(void *p) if(!g_quiet || tracedQuery) { - L<getTid()<<"/"<numProcesses()<<"] " << (dc->d_tcp ? "TCP " : "") << "question for '"<d_mdp.d_qname<<"|" + g_log<getTid()<<"/"<numProcesses()<<"] " << (dc->d_tcp ? "TCP " : "") << "question for '"<d_mdp.d_qname<<"|" <d_mdp.d_qtype)<<"' from "<getRemote(); if(!dc->d_ednssubnet.source.empty()) { - L<<" (ecs "<d_ednssubnet.source.toString()<<")"; + g_log<<" (ecs "<d_ednssubnet.source.toString()<<")"; } - L<getTid()); @@ -866,7 +866,7 @@ void startDoResolve(void *p) } catch(ImmediateServFailException &e) { if(g_logCommonErrors) - L<getRemote()<<" during resolve of '"<d_mdp.d_qname<<"' because: "<getRemote()<<" during resolve of '"<d_mdp.d_qname<<"' because: "<d_mdp.d_header.ad || DNSSECOK) && g_dnssecmode==DNSSECMode::Process))) { try { if(sr.doLog()) { - L<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" for "<d_remote.toStringWithPort()<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" for "<d_remote.toStringWithPort()<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" for "<d_remote.toStringWithPort()<<" validates correctly"<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" for "<d_remote.toStringWithPort()<<" validates correctly"<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" for "<d_remote.toStringWithPort()<<" validates as Insecure"<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" for "<d_remote.toStringWithPort()<<" validates as Insecure"<ad=0; } else if(state == Bogus) { if(g_dnssecLogBogus || sr.doLog() || g_dnssecmode == DNSSECMode::ValidateForLog) { - L<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" for "<d_remote.toStringWithPort()<<" validates as Bogus"<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" for "<d_remote.toStringWithPort()<<" validates as Bogus"<cd && (g_dnssecmode == DNSSECMode::ValidateAll || dc->d_mdp.d_header.ad || DNSSECOK)) { if(sr.doLog()) { - L<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" because recursor or query demands it for Bogus results"<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" because recursor or query demands it for Bogus results"<rcode=RCode::ServFail; goto sendit; } else { if(sr.doLog()) { - L<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" Bogus validation since neither config nor query demands this"<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<" Bogus validation since neither config nor query demands this"<getRemote()<<" during validation of '"<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<"' because: "<getRemote()<<" during validation of '"<d_mdp.d_qname<<"|"<d_mdp.d_qtype).getName()<<"' because: "<rcode=RCode::ServFail; goto sendit; } @@ -1132,7 +1132,7 @@ void startDoResolve(void *p) addCMsgSrcAddr(&msgh, cbuf, &dc->d_local, 0); } if(sendmsg(dc->d_socket, &msgh, 0) < 0 && g_logCommonErrors) - L<d_remote.toStringWithPort()<<" failed with: "<d_remote.toStringWithPort()<<" failed with: "<insertResponsePacket(dc->d_tag, dc->d_mdp.d_qname, dc->d_mdp.d_qtype, dc->d_query, + t_packetCache->insertResponsePacket(dc->d_tag, dc->d_mdp.d_qname, dc->d_mdp.d_qtype, dc->d_mdp.d_qclass, dc->d_query, string((const char*)&*packet.begin(), packet.size()), @@ -1157,11 +1157,11 @@ void startDoResolve(void *p) bool hadError=true; if(wret == 0) - L<getRemote()<getRemote()<getRemote()<<": "<< strerror(errno) <getRemote()<<": "<< strerror(errno) <getRemote()<<" for "<d_mdp.d_qname<<" (size="<< (2 + packet.size()) <<", sent "<getRemote()<<" for "<d_mdp.d_qname<<" (size="<< (2 + packet.size()) <<", sent "<getTid()<<"/"<numProcesses()<<"] answer to "<<(dc->d_mdp.d_header.rd?"":"non-rd ")<<"question '"<d_mdp.d_qname<<"|"<d_mdp.d_qtype); - L<<"': "<ancount)<<" answers, "<arcount)<<" additional, took "<getTid()<<"/"<numProcesses()<<"] answer to "<<(dc->d_mdp.d_header.rd?"":"non-rd ")<<"question '"<d_mdp.d_qname<<"|"<d_mdp.d_qtype); + g_log<<"': "<ancount)<<" answers, "<arcount)<<" additional, took "<d_mdp.d_qname<<", "<d_mdp.d_qname<<", "<getMaxStackUsage(), g_stats.maxMThreadStackUsage); -@@ -1322,7 +1322,7 @@ void handleRunningTCPQuestion(int fd, FDMultiplexer::f +@@ -1322,7 +1322,7 @@ void handleRunningTCPQuestion(int fd, FD } if(!bytes || bytes < 0) { if(g_logCommonErrors) - L<d_remote.toString() <<" disconnected after first byte"<d_remote.toString() <<" disconnected after first byte"<removeReadFD(fd); return; } -@@ -1330,7 +1330,7 @@ void handleRunningTCPQuestion(int fd, FDMultiplexer::f +@@ -1330,7 +1330,7 @@ void handleRunningTCPQuestion(int fd, FD else if(conn->state==TCPConnection::GETQUESTION) { ssize_t bytes=recv(conn->getFD(), conn->data + conn->bytesread, conn->qlen - conn->bytesread, 0); if(!bytes || bytes < 0 || bytes > std::numeric_limits::max()) { - L<d_remote.toString() <<" disconnected while reading question body"<d_remote.toString() <<" disconnected while reading question body"<removeReadFD(fd); return; } -@@ -1345,7 +1345,7 @@ void handleRunningTCPQuestion(int fd, FDMultiplexer::f +@@ -1345,7 +1345,7 @@ void handleRunningTCPQuestion(int fd, FD catch(MOADNSException &mde) { g_stats.clientParseError++; if(g_logCommonErrors) - L<d_remote.toString() <d_remote.toString() <d_tcpConnection = conn; // carry the torch -@@ -1381,14 +1381,14 @@ void handleRunningTCPQuestion(int fd, FDMultiplexer::f +@@ -1381,14 +1381,14 @@ void handleRunningTCPQuestion(int fd, FD } catch(std::exception& e) { if(g_logCommonErrors) - L<d_mdp.d_header.qr) { delete dc; g_stats.ignoredCount++; - L<d_remote.toString() <<" on server socket!"<d_remote.toString() <<" on server socket!"<d_mdp.d_header.opcode) { delete dc; g_stats.ignoredCount++; - L<d_remote.toString() <<" on server socket!"<d_remote.toString() <<" on server socket!"<push_back(addr); if(t_allowFrom && !t_allowFrom->match(&addr)) { if(!g_quiet) - L<getTid()<<"] dropping TCP query from "<getTid()<<"] dropping TCP query from "<= sizeof(struct dnsheader)) { struct dnsheader tmpdh; -@@ -1606,14 +1606,14 @@ string* doProcessUDPQuestion(const std::string& questi +@@ -1606,14 +1606,14 @@ string* doProcessUDPQuestion(const std:: } } catch(std::exception& e) { - L<get()) { if((*t_pdl)->ipfilter(fromaddr, destaddr, *dh)) { if(!g_quiet) - L<getTid()<<"/"<numProcesses()<<"] DROPPED question from "<getTid()<<"/"<numProcesses()<<"] DROPPED question from "<numProcesses() > g_maxMThreads) { if(!g_quiet) - L<getTid()<<"/"<numProcesses()<<"] DROPPED question from "<getTid()<<"/"<numProcesses()<<"] DROPPED question from "<match(&fromaddr)) { if(!g_quiet) - L<getTid()<<"] dropping UDP query from "<getTid()<<"] dropping UDP query from "<getTid()<<"] dropping UDP query from "<getTid()<<"] dropping UDP query from "<qr) { g_stats.ignoredCount++; if(g_logCommonErrors) - L<opcode) { g_stats.ignoredCount++; if(g_logCommonErrors) - L<opcode<<" from "<opcode<<" from "<= 0) { if(i==locals.begin()) - L<(pleaseGetCacheMisses); if(g_stats.qcounter && (cacheHits + cacheMisses) && SyncRes::s_queries && SyncRes::s_outqueries) { - L<(pleaseGetCacheSize)<< " cache entries, "<< broadcastAccFunction(pleaseGetNegCacheSize)<<" negative entries, "<< (int)((cacheHits*100.0)/(cacheHits+cacheMisses))<<"% cache hits"<(pleaseGetThrottleSize) <<", ns speeds: " << broadcastAccFunction(pleaseGetNsSpeedsSize)<(pleaseGetConcurrentQueries)<<" queries running, "<(pleaseGetPacketCacheSize) << + g_log<(pleaseGetPacketCacheSize) << " packet cache entries, "<<(int)(100.0*broadcastAccFunction(pleaseGetPacketCacheHits)/SyncRes::s_queries) << "% packet cache hits"<wantAnswer) { if(write(g_pipes[t_id].writeFromThread, &resp, sizeof(resp)) != sizeof(resp)) { -@@ -2245,10 +2245,10 @@ void handleRCC(int fd, FDMultiplexer::funcparam_t& var +@@ -2245,10 +2245,10 @@ void handleRCC(int fd, FDMultiplexer::fu command(); } catch(std::exception& e) { - L<" : pident.domain.toString())<<", "<d_waiters.size()<<" waiters"<" : pident.domain.toString())<<", "<d_waiters.size()<<" waiters"<= 0) { @@ -2425,13 +2425,13 @@ FDMultiplexer* getMultiplexer() return ret; } catch(FDMultiplexerException &fe) { - L<reset(); - L<= wantFDs) { setFilenumLimit(wantFDs); - L<addMask(line); } - L<size() <<" allow-from ranges from file '"<<::arg()["allow-from-file"]<<"' - overriding 'allow-from' setting"<size() <<" allow-from ranges from file '"<<::arg()["allow-from-file"]<<"' - overriding 'allow-from' setting"< ips; stringtok(ips, ::arg()["allow-from"], ", "); - L<::const_iterator i = ips.begin(); i!= ips.end(); ++i) { allowFrom->addMask(*i); if(i!=ips.begin()) - L<= 0) - theL().setFacility(val); + g_log.setFacility(val); else - L< addrs; if(!::arg()["query-local-address6"].empty()) { SyncRes::s_doIPv6=true; - L<::const_iterator i = ips.begin(); i!= ips.end(); ++i) { g_dontQuery->addMask(*i); if(i!=ips.begin()) - L<(); try { if(!::arg()["lua-dns-script"].empty()) { *t_pdl = shared_ptr(new RecursorLua4(::arg()["lua-dns-script"])); - L<getName() << "' multiplexer"<getName() << "' multiplexer"<addReadFD(g_pipes[t_id].readToThread, handlePipeRequest); @@ -2986,7 +2986,7 @@ try for(expired_t::iterator i=expired.begin() ; i != expired.end(); ++i) { shared_ptr conn=any_cast >(i->second); if(g_logCommonErrors) - L<d_remote.toString() <d_remote.toString() <removeReadFD(i->first); } } @@ -3026,15 +3026,15 @@ try } } catch(PDNSException &ae) { - L<(boost::get(constGet(have, "zoneSizeHint")))); } } - theL()<toString()<toString()<toString()<toString()<(dynamic_cast(DSRecordContent::make(what))); + auto ds=std::dynamic_pointer_cast(DSRecordContent::make(what)); lci.dsAnchors[who].insert(*ds); }); broadcastAccFunction(boost::bind(pleaseWipePacketCache, who, true)); - L< #include "dnsrecords.hh" #include -#undef L #include #include #include @@ -40,7 +39,6 @@ #include "iputils.hh" #undef max -#define L theL() #include "namespaces.hh" using namespace ::boost::multi_index; ---- reczones.cc.orig 2017-12-11 10:38:52 UTC +--- reczones.cc.orig 2018-11-06 14:56:58 UTC +++ reczones.cc -@@ -124,10 +124,10 @@ static void makeNameToIPZone(SyncRes::domainmap_t* new +@@ -124,10 +124,10 @@ static void makeNameToIPZone(SyncRes::do ad.d_records.insert(dr); if(newMap->count(dr.d_name)) { - L<count(dr.d_name)) { - L<::const_iterator iter = servers.begin(); iter != servers.end(); ++iter) { if(verbose && iter != servers.begin()) - L<<", "; + g_log<<", "; ComboAddress addr=parseIPAndPort(*iter, 53); if(verbose) - L<domainmap; try { - L<domainmap->begin(); i != t_sstorage->domainmap->end(); ++i) { for(SyncRes::AuthDomain::records_t::const_iterator j = i->second.d_records.begin(); j != i->second.d_records.end(); ++j) @@ -304,13 +304,13 @@ string reloadAuthAndForwards() return "ok\n"; } catch(std::exception& e) { - L<(dr)->d_st.serial<(dr)->d_st.serial<, vector > > deltas; ComboAddress local(localAddress); -@@ -335,12 +335,12 @@ void RPZIXFRTracker(const ComboAddress& master, const +@@ -335,12 +335,12 @@ void RPZIXFRTracker(const ComboAddress& try { deltas = getIXFRDeltas(master, zone, dr, tt, &local, maxReceivedBytes); } catch(std::runtime_error& e ){ - L<d_st.serial<(rr); - // L<d_st.serial<d_st.serial<d_st.serial<d_st.serial<size() - before<<" forwarding instructions from file '"<<::arg()["forward-zones-file"]<<"'"<size() - before<<" forwarding instructions from file '"<<::arg()["forward-zones-file"]<<"'"< loadRPZFromServer(const ComboAddress& master, const DNSName& zone, DNSFilterEngine& target, boost::optional defpol, size_t place, const TSIGTriplet& tt, size_t maxReceivedBytes, const ComboAddress& localAddress) { - L< loadRPZFromServer(const C +@@ -189,11 +189,11 @@ shared_ptr loadRPZFrom nrecords++; } if(last != time(0)) { - L<getZoneRepresentation()<getZoneRepresentation()<pw_name, gid)<0) { - theL()<gr_gid; -@@ -205,7 +205,7 @@ int Utility::makeUidNumeric(const string &username) +@@ -205,7 +205,7 @@ int Utility::makeUidNumeric(const string if(!(newuid=atoi(username.c_str()))) { struct passwd *pw=getpwnam(username.c_str()); if(!pw) { - theL()<pw_uid; ---- validate-recursor.cc.orig 2017-12-11 10:38:52 UTC +--- validate-recursor.cc.orig 2018-11-06 14:56:58 UTC +++ validate-recursor.cc @@ -6,7 +6,7 @@ DNSSECMode g_dnssecmode{DNSSECMode::ProcessNoValidate}; bool g_dnssecLogBogus; -#define LOG(x) if(g_dnssecLOG) { L <body.empty()) { - L<body, err); if (doc.is_null()) { - L<headers["access-control-allow-origin"] = "*"; if (api_key.empty()) { - L<url.path << "\": Authentication failed, API Key missing in config" << endl; + g_log<url.path << "\": Authentication failed, API Key missing in config" << endl; throw HttpUnauthorizedException("X-API-Key"); } bool auth_ok = req->compareHeader("x-api-key", api_key) || req->getvars["api-key"]==api_key; if (!auth_ok) { - L<url.path << "\": Authentication by API Key failed" << endl; + g_log<url.path << "\": Authentication by API Key failed" << endl; throw HttpUnauthorizedException("X-API-Key"); } -@@ -185,7 +185,7 @@ static void webWrapper(WebServer::HandlerFunction hand +@@ -185,7 +185,7 @@ static void webWrapper(WebServer::Handle if (!web_password.empty()) { bool auth_ok = req->compareAuthorization(web_password); if (!auth_ok) { - L<url.path << "\": Web Authentication failed" << endl; + g_log<url.path << "\": Web Authentication failed" << endl; throw HttpUnauthorizedException("Basic"); } } -@@ -216,11 +216,11 @@ void WebServer::handleRequest(HttpRequest& req, HttpRe +@@ -216,11 +216,11 @@ void WebServer::handleRequest(HttpReques try { if (!req.complete) { - L<writenWithTimeout(reply.c_str(), reply.size(), timeout); } catch(PDNSException &e) { - L<d_local.toStringWithPort()<d_local.toStringWithPort()<client->getRemote(remote)) - L<client; // close socket delete data; } } } catch(PDNSException &e) { - L<