2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-22 10:10:06 +00:00

Remove manually defined anchors pointing to statement definitions

This is hopefully end of duplication. This batch did not cause clashes
in Sphinx but it was pointless nonetheless as we have auto-generated
anchors for all statements.
This commit is contained in:
Petr Špaček 2022-10-04 11:00:54 +02:00
parent ea2d213f34
commit 137e0f4e0e
No known key found for this signature in database
GPG Key ID: ABD587CDF06581AE
7 changed files with 18 additions and 66 deletions

View File

@ -79,7 +79,7 @@ as required by the user.
}; };
The :any:`logging` and :namedconf:ref:`options` blocks The :any:`logging` and :namedconf:ref:`options` blocks
and :ref:`category<the_category_phrase>`, :any:`channel`, and :any:`category`, :any:`channel`,
:any:`directory`, :any:`file`, and :any:`severity` :any:`directory`, :any:`file`, and :any:`severity`
statements are all described further in the appropriate sections of this ARM. statements are all described further in the appropriate sections of this ARM.

View File

@ -563,4 +563,4 @@ and discard the rest.
For more detail on ordering responses, refer to the For more detail on ordering responses, refer to the
:ref:`rrset-order<rrset_ordering>` statement in the :ref:`rrset-order<rrset_ordering>` statement in the
:ref:`options<options_grammar>` block. :namedconf:ref:`options` block.

View File

@ -107,7 +107,7 @@ server.
not found, :iscman:`rndc` also looks in |rndc_key| (or whatever not found, :iscman:`rndc` also looks in |rndc_key| (or whatever
``sysconfdir`` was defined when the BIND build was configured). The ``sysconfdir`` was defined when the BIND build was configured). The
``rndc.key`` file is generated by running :option:`rndc-confgen -a` as ``rndc.key`` file is generated by running :option:`rndc-confgen -a` as
described in :ref:`controls_statement_definition_and_usage`. described in :any:`controls`.
The format of the configuration file is similar to that of The format of the configuration file is similar to that of
:iscman:`named.conf`, but is limited to only three blocks: the :rndcconf:ref:`options`, :iscman:`named.conf`, but is limited to only three blocks: the :rndcconf:ref:`options`,

View File

@ -112,7 +112,7 @@ that are about to expire and managing :ref:`key_rollovers`.
.. note:: .. note::
:any:`dnssec-policy` needs write access to the zone. Please see :any:`dnssec-policy` needs write access to the zone. Please see
:ref:`dnssec_policy` for more details about implications for zone storage. :any:`dnssec-policy` for more details about implications for zone storage.
The default policy creates one key that is used to sign the complete zone, The default policy creates one key that is used to sign the complete zone,
and uses ``NSEC`` to enable authenticated denial of existence (a secure way and uses ``NSEC`` to enable authenticated denial of existence (a secure way
@ -150,7 +150,7 @@ Also:
using zero extra iterations and no salt. NSEC3 opt-out is disabled, meaning using zero extra iterations and no salt. NSEC3 opt-out is disabled, meaning
insecure delegations also get an NSEC3 record. insecure delegations also get an NSEC3 record.
For more information about KASP configuration see :ref:`dnssec_policy_grammar`. For more information about KASP configuration see :any:`dnssec-policy`.
The :ref:`dnssec_advanced_discussions` section in the DNSSEC Guide discusses the The :ref:`dnssec_advanced_discussions` section in the DNSSEC Guide discusses the
various policy settings and may be useful for determining values for specific various policy settings and may be useful for determining values for specific

View File

@ -385,7 +385,7 @@ The following blocks are supported:
Declares control channels to be used by the :iscman:`rndc` utility. Declares control channels to be used by the :iscman:`rndc` utility.
:any:`dnssec-policy` :any:`dnssec-policy`
Describes a DNSSEC key and signing policy for zones. See :ref:`dnssec_policy_grammar` for details. Describes a DNSSEC key and signing policy for zones. See :any:`dnssec-policy` for details.
:namedconf:ref:`key` :namedconf:ref:`key`
Specifies key information for use in authentication and authorization using TSIG. Specifies key information for use in authentication and authorization using TSIG.
@ -463,16 +463,12 @@ The following ACLs are built-in:
``localnets`` ``localnets``
Matches any host on an IPv4 or IPv6 network for which the system has an interface. When addresses are added or removed, the ``localnets`` ACL element is updated to reflect the changes. Some systems do not provide a way to determine the prefix lengths of local IPv6 addresses; in such cases, ``localnets`` only matches the local IPv6 addresses, just like ``localhost``. Matches any host on an IPv4 or IPv6 network for which the system has an interface. When addresses are added or removed, the ``localnets`` ACL element is updated to reflect the changes. Some systems do not provide a way to determine the prefix lengths of local IPv6 addresses; in such cases, ``localnets`` only matches the local IPv6 addresses, just like ``localhost``.
.. _controls_grammar:
:any:`controls` Block Grammar :any:`controls` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: controls .. namedconf:statement:: controls
:tags: server :tags: server
:short: Specifies control channels to be used to manage the name server. :short: Specifies control channels to be used to manage the name server.
.. _controls_statement_definition_and_usage:
:any:`controls` Block Definition and Usage :any:`controls` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -543,27 +539,22 @@ To disable the command channel, use an empty :any:`controls` statement:
``controls { };``. ``controls { };``.
.. _key_grammar:
``key`` Block Grammar ``key`` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: key .. namedconf:statement:: key
:tags: security :tags: security
:short: Defines a shared secret key for use with :ref:`tsig` or the command channel. :short: Defines a shared secret key for use with :ref:`tsig` or the command channel.
.. _key_statement:
``key`` Block Definition and Usage ``key`` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The ``key`` statement defines a shared secret key for use with TSIG (see The ``key`` statement defines a shared secret key for use with TSIG (see
:ref:`tsig`) or the command channel (see :ref:`controls_statement_definition_and_usage`). :ref:`tsig`) or the command channel (see :any:`controls`).
The ``key`` statement can occur at the top level of the configuration The ``key`` statement can occur at the top level of the configuration
file or inside a :any:`view` statement. Keys defined in top-level ``key`` file or inside a :any:`view` statement. Keys defined in top-level ``key``
statements can be used in all views. Keys intended for use in a statements can be used in all views. Keys intended for use in a
:any:`controls` statement (see :ref:`controls_statement_definition_and_usage`) :any:`controls` statement must be defined at the top level.
must be defined at the top level.
The :term:`server_key`, also known as the key name, is a domain name that uniquely The :term:`server_key`, also known as the key name, is a domain name that uniquely
identifies the key. It can be used in a :namedconf:ref:`server` statement to cause identifies the key. It can be used in a :namedconf:ref:`server` statement to cause
@ -589,16 +580,12 @@ matching this name, algorithm, and secret.
The ``secret_string`` is the secret to be used by the The ``secret_string`` is the secret to be used by the
algorithm, and is treated as a Base64-encoded string. algorithm, and is treated as a Base64-encoded string.
.. _logging_grammar:
:any:`logging` Block Grammar :any:`logging` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: logging .. namedconf:statement:: logging
:tags: logging :tags: logging
:short: Configures logging options for the name server. :short: Configures logging options for the name server.
.. _logging_statement:
:any:`logging` Block Definition and Usage :any:`logging` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -815,7 +802,7 @@ Here is an example where all three ``print-`` options are on:
There are four predefined channels that are used for :iscman:`named`'s default There are four predefined channels that are used for :iscman:`named`'s default
logging, as follows. If :iscman:`named` is started with the :option:`-L <named -L>` option, then a fifth logging, as follows. If :iscman:`named` is started with the :option:`-L <named -L>` option, then a fifth
channel, ``default_logfile``, is added. How they are used is described in channel, ``default_logfile``, is added. How they are used is described in
:ref:`the_category_phrase`. :any:`category`.
:: ::
@ -872,8 +859,6 @@ Once a channel is defined, it cannot be redefined. The
built-in channels cannot be altered directly, but the default logging built-in channels cannot be altered directly, but the default logging
can be modified by pointing categories at defined channels. can be modified by pointing categories at defined channels.
.. _the_category_phrase:
The :any:`category` Phrase The :any:`category` Phrase
^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^
There are many categories, so desired logs can be sent anywhere There are many categories, so desired logs can be sent anywhere
@ -1015,16 +1000,12 @@ At ``debug`` level 4 or higher, the detailed context information logged at
``debug`` level 2 is logged for errors other than SERVFAIL and for negative ``debug`` level 2 is logged for errors other than SERVFAIL and for negative
responses such as NXDOMAIN. responses such as NXDOMAIN.
.. _parental_agents_grammar:
:any:`parental-agents` Block Grammar :any:`parental-agents` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: parental-agents .. namedconf:statement:: parental-agents
:tags: zone :tags: zone
:short: Defines a list of delegation agents to be used by primary and secondary zones. :short: Defines a list of delegation agents to be used by primary and secondary zones.
.. _parental_agents_statement:
:any:`parental-agents` Block Definition and Usage :any:`parental-agents` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -1033,16 +1014,12 @@ used by multiple primary and secondary zones.
A parental agent is the entity that is allowed to A parental agent is the entity that is allowed to
change a zone's delegation information (defined in :rfc:`7344`). change a zone's delegation information (defined in :rfc:`7344`).
.. _primaries_grammar:
:any:`primaries` Block Grammar :any:`primaries` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: primaries .. namedconf:statement:: primaries
:tags: zone :tags: zone
:short: Defines one or more primary servers for a zone. :short: Defines one or more primary servers for a zone.
.. _primaries_statement:
:any:`primaries` Block Definition and Usage :any:`primaries` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -1068,8 +1045,6 @@ where ``tls-configuration-name`` refers to a previously defined
observers but does not protect from man-in-the-middle attacks on observers but does not protect from man-in-the-middle attacks on
zone transfers. zone transfers.
.. _options_grammar:
``options`` Block Grammar ``options`` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: options .. namedconf:statement:: options
@ -2924,7 +2899,7 @@ Forwarding can also be configured on a per-domain basis, allowing for
the global forwarding options to be overridden in a variety of ways. the global forwarding options to be overridden in a variety of ways.
Particular domains can be set to use different forwarders, or have a Particular domains can be set to use different forwarders, or have a
different ``forward only/first`` behavior, or not forward at all; see different ``forward only/first`` behavior, or not forward at all; see
:ref:`zone_statement_grammar`. :any:`zone`.
.. _dual_stack: .. _dual_stack:
@ -4028,8 +4003,6 @@ Periodic Task Intervals
gone away. For convenience, TTL-style time-unit suffixes may be used to gone away. For convenience, TTL-style time-unit suffixes may be used to
specify the value. It also accepts ISO 8601 duration formats. specify the value. It also accepts ISO 8601 duration formats.
.. _the_sortlist_statement:
The :any:`sortlist` Statement The :any:`sortlist` Statement
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -4134,7 +4107,7 @@ RRset Ordering
The :any:`rrset-order` statement permits configuration of the ordering of The :any:`rrset-order` statement permits configuration of the ordering of
the records in a multiple-record response. See also: the records in a multiple-record response. See also:
:ref:`the_sortlist_statement`. :any:`sortlist`.
Each rule in an :any:`rrset-order` statement is defined as follows: Each rule in an :any:`rrset-order` statement is defined as follows:
@ -4691,7 +4664,7 @@ Built-in Server Information Zones
The server provides some helpful diagnostic information through a number The server provides some helpful diagnostic information through a number
of built-in zones under the pseudo-top-level-domain ``bind`` in the of built-in zones under the pseudo-top-level-domain ``bind`` in the
``CHAOS`` class. These zones are part of a built-in view ``CHAOS`` class. These zones are part of a built-in view
(see :ref:`view_statement_grammar`) of class ``CHAOS``, which is (see :any:`view`) of class ``CHAOS``, which is
separate from the default view of class ``IN``. Most global separate from the default view of class ``IN``. Most global
configuration options (:any:`allow-query`, etc.) apply to this view, configuration options (:any:`allow-query`, etc.) apply to this view,
but some are locally overridden: :namedconf:ref:`notify`, :any:`recursion`, and but some are locally overridden: :namedconf:ref:`notify`, :any:`recursion`, and
@ -5643,7 +5616,7 @@ NXDOMAIN Redirection
:iscman:`named` supports NXDOMAIN redirection via two methods: :iscman:`named` supports NXDOMAIN redirection via two methods:
- Redirect zone (:ref:`zone_statement_grammar`) - :any:`Redirect zone <type redirect>`
- Redirect namespace - Redirect namespace
With either method, when :iscman:`named` gets an NXDOMAIN response it examines a With either method, when :iscman:`named` gets an NXDOMAIN response it examines a
@ -5670,16 +5643,12 @@ zone; there are no delegations.
If both a redirect zone and a redirect namespace are configured, the If both a redirect zone and a redirect namespace are configured, the
redirect zone is tried first. redirect zone is tried first.
.. _server_statement_grammar:
``server`` Block Grammar ``server`` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: server .. namedconf:statement:: server
:tags: server :tags: server
:short: Defines characteristics to be associated with a remote name server. :short: Defines characteristics to be associated with a remote name server.
.. _server_statement_definition_and_usage:
``server`` Block Definition and Usage ``server`` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -5803,16 +5772,12 @@ and :namedconf:ref:`options` blocks:
- :namedconf:ref:`transfer-source` - :namedconf:ref:`transfer-source`
.. _statschannels:
:any:`statistics-channels` Block Grammar :any:`statistics-channels` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: statistics-channels .. namedconf:statement:: statistics-channels
:tags: logging :tags: logging
:short: Specifies the communication channels to be used by system administrators to access statistics information on the name server. :short: Specifies the communication channels to be used by system administrators to access statistics information on the name server.
.. _statistics_channels:
:any:`statistics-channels` Block Definition and Usage :any:`statistics-channels` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -6294,16 +6259,12 @@ that is used to initialize the key-maintenance process is stored in
can be found, the initializing key is also compiled directly into can be found, the initializing key is also compiled directly into
:iscman:`named`. :iscman:`named`.
.. _dnssec_policy_grammar:
:any:`dnssec-policy` Block Grammar :any:`dnssec-policy` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: dnssec-policy .. namedconf:statement:: dnssec-policy
:tags: dnssec :tags: dnssec
:short: Defines a key and signing policy (KASP) for zones. :short: Defines a key and signing policy (KASP) for zones.
.. _dnssec_policy:
:any:`dnssec-policy` Block Definition and Usage :any:`dnssec-policy` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -6628,8 +6589,6 @@ with the ``initial-key`` keyword.
The :any:`trusted-keys` statement has been deprecated in favor of The :any:`trusted-keys` statement has been deprecated in favor of
:any:`trust-anchors` with the ``static-key`` keyword. :any:`trust-anchors` with the ``static-key`` keyword.
.. _view_statement_grammar:
:any:`view` Block Grammar :any:`view` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: view .. namedconf:statement:: view
@ -6646,8 +6605,6 @@ The :any:`trusted-keys` statement has been deprecated in favor of
[ zone_statement ; ... ] [ zone_statement ; ... ]
} ; } ;
.. _view_statement:
:any:`view` Block Definition and Usage :any:`view` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -6746,8 +6703,6 @@ Here is an example of a typical split DNS setup implemented using
}; };
}; };
.. _zone_statement_grammar:
:any:`zone` Block Grammar :any:`zone` Block Grammar
~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~
.. namedconf:statement:: zone .. namedconf:statement:: zone
@ -6756,8 +6711,6 @@ Here is an example of a typical split DNS setup implemented using
:suppress_grammar: :suppress_grammar:
.. _zone_statement:
:any:`zone` Block Definition and Usage :any:`zone` Block Definition and Usage
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -6865,7 +6818,7 @@ Zone Types
Mirroring a zone other than root requires an explicit list of primary Mirroring a zone other than root requires an explicit list of primary
servers to be provided using the :any:`primaries` option (see servers to be provided using the :any:`primaries` option (see
:ref:`primaries_grammar` for details), and a key-signing key (KSK) :any:`primaries` for details), and a key-signing key (KSK)
for the specified zone to be explicitly configured as a trust anchor for the specified zone to be explicitly configured as a trust anchor
(see :any:`trust-anchors`). (see :any:`trust-anchors`).
@ -7810,7 +7763,7 @@ There are currently two user interfaces to get access to the statistics.
One is in plain-text format, dumped to the file specified by the One is in plain-text format, dumped to the file specified by the
:any:`statistics-file` configuration option; the other is remotely :any:`statistics-file` configuration option; the other is remotely
accessible via a statistics channel when the :any:`statistics-channels` accessible via a statistics channel when the :any:`statistics-channels`
statement is specified in the configuration file (see :ref:`statschannels`.) statement is specified in the configuration file.
.. _statsfile: .. _statsfile:

View File

@ -85,12 +85,11 @@ to make :iscman:`named` prepare such a file, set the ``SSLKEYLOGFILE``
environment variable to either: environment variable to either:
- the string ``config`` (``SSLKEYLOGFILE=config``); this requires - the string ``config`` (``SSLKEYLOGFILE=config``); this requires
defining a :any:`logging` :ref:`channel <logging_grammar>` which will defining a :any:`logging` :any:`channel` which will
handle messages belonging to the ``sslkeylog`` category, handle messages belonging to the ``sslkeylog`` category,
- the path to the key file to write (``SSLKEYLOGFILE=/path/to/file``); - the path to the key file to write (``SSLKEYLOGFILE=/path/to/file``);
this is equivalent to the following :any:`logging` :ref:`stanza this is equivalent to the following :any:`logging` configuration:
<logging_grammar>`:
:: ::

View File

@ -29,7 +29,7 @@ of RRs in a set is not significant and need not be preserved by name
servers, resolvers, or other parts of the DNS. However, sorting of servers, resolvers, or other parts of the DNS. However, sorting of
multiple RRs is permitted for optimization purposes: for example, to multiple RRs is permitted for optimization purposes: for example, to
specify that a particular nearby server be tried first. See specify that a particular nearby server be tried first. See
:ref:`the_sortlist_statement` and :ref:`rrset_ordering`. :any:`sortlist` and :ref:`rrset_ordering`.
The components of a Resource Record are: The components of a Resource Record are: