mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-23 10:39:16 +00:00
Use compile-time paths in the manual pages
Replace the hard-coded paths for various BIND 9 files (configuration, pid, etc.) in the man pages and ARM with compile-time values using the sphinx-build replace system. This is more complicated, because the restructured text specification doesn't allow |substitions| inside ``code-blocks``, so for each specific file we had to create own substition which is sub-optimal, but it is only way how to do this without adding Sphinx extension.
This commit is contained in:
parent
59c3b17ad0
commit
b42681c4e9
@ -9,6 +9,16 @@ AM_V_SPHINX_0 = @echo " SPHINX $@";
|
|||||||
|
|
||||||
SPHINXBUILDDIR = $(builddir)/_build
|
SPHINXBUILDDIR = $(builddir)/_build
|
||||||
|
|
||||||
|
LF = \n
|
||||||
|
RNDC_CONF = .. |rndc_conf| replace:: ``$(sysconfdir)/rndc.conf``
|
||||||
|
RNDC_KEY = .. |rndc_key| replace:: ``$(sysconfdir)/rndc.key``
|
||||||
|
NAMED_CONF = .. |named_conf| replace:: ``$(sysconfdir)/named.conf``
|
||||||
|
BIND_KEYS = .. |bind_keys| replace:: ``$(sysconfdir)/bind.keys``
|
||||||
|
NAMED_PID = .. |named_pid| replace:: ``$(runstatedir)/named.pid``
|
||||||
|
SESSION_KEY = .. |session_key| replace:: ``$(runstatedir)/session.key``
|
||||||
|
|
||||||
|
export RST_EPILOG = $(RNDC_CONF)$(LF)$(RNDC_KEY)$(LF)$(NAMED_CONF)$(LF)$(BIND_KEYS)$(LF)$(NAMED_PID)$(LF)$(SESSION_KEY)
|
||||||
|
|
||||||
common_SPHINXOPTS = \
|
common_SPHINXOPTS = \
|
||||||
-W \
|
-W \
|
||||||
-c $(srcdir) \
|
-c $(srcdir) \
|
||||||
@ -20,14 +30,26 @@ common_SPHINXOPTS = \
|
|||||||
ALLSPHINXOPTS = \
|
ALLSPHINXOPTS = \
|
||||||
$(common_SPHINXOPTS) \
|
$(common_SPHINXOPTS) \
|
||||||
-D today="$(RELEASE_DATE)" \
|
-D today="$(RELEASE_DATE)" \
|
||||||
|
-D rst_epilog="$$(printf "$${RST_EPILOG}")" \
|
||||||
$(SPHINXOPTS) \
|
$(SPHINXOPTS) \
|
||||||
$(srcdir)
|
$(srcdir)
|
||||||
|
|
||||||
|
_ = @
|
||||||
|
man_RNDC_CONF = .. |rndc_conf| replace:: ``$(_)sysconfdir$(_)/rndc.conf``
|
||||||
|
man_RNDC_KEY = .. |rndc_key| replace:: ``$(_)sysconfdir$(_)/rndc.key``
|
||||||
|
man_NAMED_CONF = .. |named_conf| replace:: ``$(_)sysconfdir$(_)/named.conf``
|
||||||
|
man_BIND_KEYS = .. |bind_keys| replace:: ``$(_)sysconfdir$(_)/bind.keys``
|
||||||
|
man_NAMED_PID = .. |named_pid| replace:: ``$(_)runstatedir$(_)/named.pid``
|
||||||
|
man_SESSION_KEY = .. |session_key| replace:: ``$(_)runstatedir$(_)/session.key``
|
||||||
|
|
||||||
|
export man_RST_EPILOG = $(man_RNDC_CONF)$(LF)$(man_RNDC_KEY)$(LF)$(man_NAMED_CONF)$(LF)$(man_BIND_KEYS)$(LF)$(man_NAMED_PID)$(LF)$(man_SESSION_KEY)
|
||||||
|
|
||||||
man_SPHINXOPTS = \
|
man_SPHINXOPTS = \
|
||||||
$(common_SPHINXOPTS) \
|
$(common_SPHINXOPTS) \
|
||||||
-D version="@""PACKAGE_VERSION@"\
|
-D version="@""PACKAGE_VERSION@" \
|
||||||
-D today="@""RELEASE_DATE@" \
|
-D today="@""RELEASE_DATE@" \
|
||||||
-D release="@""PACKAGE_VERSION@"\
|
-D release="@""PACKAGE_VERSION@" \
|
||||||
|
-D rst_epilog="$$(printf "$${man_RST_EPILOG}")" \
|
||||||
$(SPHINXOPTS) \
|
$(SPHINXOPTS) \
|
||||||
$(srcdir)
|
$(srcdir)
|
||||||
|
|
||||||
|
@ -27,7 +27,7 @@ Description
|
|||||||
``named-checkconf`` checks the syntax, but not the semantics, of a
|
``named-checkconf`` checks the syntax, but not the semantics, of a
|
||||||
``named`` configuration file. The file, along with all files included by it, is parsed and checked for syntax
|
``named`` configuration file. The file, along with all files included by it, is parsed and checked for syntax
|
||||||
errors. If no file is specified,
|
errors. If no file is specified,
|
||||||
``/etc/named.conf`` is read by default.
|
|named_conf| is read by default.
|
||||||
|
|
||||||
Note: files that ``named`` reads in separate parser contexts, such as
|
Note: files that ``named`` reads in separate parser contexts, such as
|
||||||
``rndc.key`` and ``bind.keys``, are not automatically read by
|
``rndc.key`` and ``bind.keys``, are not automatically read by
|
||||||
@ -81,7 +81,7 @@ Options
|
|||||||
|
|
||||||
``filename``
|
``filename``
|
||||||
This indicates the name of the configuration file to be checked. If not specified,
|
This indicates the name of the configuration file to be checked. If not specified,
|
||||||
it defaults to ``/etc/named.conf``.
|
it defaults to |named_conf|.
|
||||||
|
|
||||||
Return Values
|
Return Values
|
||||||
~~~~~~~~~~~~~
|
~~~~~~~~~~~~~
|
||||||
|
@ -35,9 +35,8 @@ Options
|
|||||||
~~~~~~~
|
~~~~~~~
|
||||||
|
|
||||||
``-a``
|
``-a``
|
||||||
This option sets automatic ``rndc`` configuration, which creates a file ``rndc.key``
|
This option sets automatic ``rndc`` configuration, which creates a file
|
||||||
in ``/etc`` (or a different ``sysconfdir`` specified when BIND
|
|rndc_key| that is read by both ``rndc`` and ``named`` on startup.
|
||||||
was built) that is read by both ``rndc`` and ``named`` on startup.
|
|
||||||
The ``rndc.key`` file defines a default command channel and
|
The ``rndc.key`` file defines a default command channel and
|
||||||
authentication key allowing ``rndc`` to communicate with ``named`` on
|
authentication key allowing ``rndc`` to communicate with ``named`` on
|
||||||
the local host with no further configuration.
|
the local host with no further configuration.
|
||||||
|
@ -97,7 +97,7 @@ Options
|
|||||||
|
|
||||||
``-a anchor-file``
|
``-a anchor-file``
|
||||||
This option specifies a file from which to read DNSSEC trust anchors. The default
|
This option specifies a file from which to read DNSSEC trust anchors. The default
|
||||||
is ``/etc/bind.keys``, which is included with BIND 9 and contains one
|
is |bind_keys|, which is included with BIND 9 and contains one
|
||||||
or more trust anchors for the root zone (".").
|
or more trust anchors for the root zone (".").
|
||||||
|
|
||||||
Keys that do not match the root zone name are ignored. An alternate
|
Keys that do not match the root zone name are ignored. An alternate
|
||||||
@ -107,8 +107,8 @@ Options
|
|||||||
``initial-key``, and ``static-key`` identically. That is, for a managed key,
|
``initial-key``, and ``static-key`` identically. That is, for a managed key,
|
||||||
it is the *initial* key that is trusted; :rfc:`5011` key management is not
|
it is the *initial* key that is trusted; :rfc:`5011` key management is not
|
||||||
supported. ``delv`` does not consult the managed-keys database maintained by
|
supported. ``delv`` does not consult the managed-keys database maintained by
|
||||||
``named``, which means that if either of the keys in ``/etc/bind.keys`` is
|
``named``, which means that if either of the keys in |bind_keys| is
|
||||||
revoked and rolled over, ``/etc/bind.keys`` must be updated to
|
revoked and rolled over, |bind_keys| must be updated to
|
||||||
use DNSSEC validation in ``delv``.
|
use DNSSEC validation in ``delv``.
|
||||||
|
|
||||||
``-b address``
|
``-b address``
|
||||||
@ -316,7 +316,7 @@ assign values to options like the timeout interval. They have the form
|
|||||||
Files
|
Files
|
||||||
~~~~~
|
~~~~~
|
||||||
|
|
||||||
``/etc/bind.keys``
|
|bind_keys|
|
||||||
|
|
||||||
``/etc/resolv.conf``
|
``/etc/resolv.conf``
|
||||||
|
|
||||||
|
@ -1133,7 +1133,7 @@ ZONE
|
|||||||
Files
|
Files
|
||||||
~~~~~
|
~~~~~
|
||||||
|
|
||||||
``/etc/named.conf``
|
|named_conf|
|
||||||
|
|
||||||
See Also
|
See Also
|
||||||
~~~~~~~~
|
~~~~~~~~
|
||||||
|
@ -29,7 +29,7 @@ distribution from ISC. For more information on the DNS, see :rfc:`1033`,
|
|||||||
:rfc:`1034`, and :rfc:`1035`.
|
:rfc:`1034`, and :rfc:`1035`.
|
||||||
|
|
||||||
When invoked without arguments, ``named`` reads the default
|
When invoked without arguments, ``named`` reads the default
|
||||||
configuration file ``/etc/named.conf``, reads any initial data, and
|
configuration file |named_conf|, reads any initial data, and
|
||||||
listens for queries.
|
listens for queries.
|
||||||
|
|
||||||
Options
|
Options
|
||||||
@ -45,7 +45,7 @@ Options
|
|||||||
|
|
||||||
``-c config-file``
|
``-c config-file``
|
||||||
This option tells ``named`` to use ``config-file`` as its configuration file instead of the default,
|
This option tells ``named`` to use ``config-file`` as its configuration file instead of the default,
|
||||||
``/etc/named.conf``. To ensure that the configuration file
|
|named_conf|. To ensure that the configuration file
|
||||||
can be reloaded after the server has changed its working directory
|
can be reloaded after the server has changed its working directory
|
||||||
due to to a possible ``directory`` option in the configuration file,
|
due to to a possible ``directory`` option in the configuration file,
|
||||||
``config-file`` should be an absolute pathname.
|
``config-file`` should be an absolute pathname.
|
||||||
@ -206,10 +206,10 @@ in the script used to start the ``named`` process.
|
|||||||
Files
|
Files
|
||||||
~~~~~
|
~~~~~
|
||||||
|
|
||||||
``/etc/named.conf``
|
|named_conf|
|
||||||
The default configuration file.
|
The default configuration file.
|
||||||
|
|
||||||
``/var/run/named/named.pid``
|
|named_pid|
|
||||||
The default process-id file.
|
The default process-id file.
|
||||||
|
|
||||||
See Also
|
See Also
|
||||||
|
@ -46,7 +46,7 @@ described in :rfc:`3645`.
|
|||||||
|
|
||||||
TSIG relies on a shared secret that should only be known to ``nsupdate``
|
TSIG relies on a shared secret that should only be known to ``nsupdate``
|
||||||
and the name server. For instance, suitable ``key`` and ``server``
|
and the name server. For instance, suitable ``key`` and ``server``
|
||||||
statements are added to ``/etc/named.conf`` so that the name server
|
statements are added to |named_conf| so that the name server
|
||||||
can associate the appropriate secret key and algorithm with the IP
|
can associate the appropriate secret key and algorithm with the IP
|
||||||
address of the client application that is using TSIG
|
address of the client application that is using TSIG
|
||||||
authentication. ``ddns-confgen`` can generate suitable
|
authentication. ``ddns-confgen`` can generate suitable
|
||||||
@ -97,7 +97,7 @@ Options
|
|||||||
This option sets local-host only mode, which sets the server address to localhost
|
This option sets local-host only mode, which sets the server address to localhost
|
||||||
(disabling the ``server`` so that the server address cannot be
|
(disabling the ``server`` so that the server address cannot be
|
||||||
overridden). Connections to the local server use a TSIG key
|
overridden). Connections to the local server use a TSIG key
|
||||||
found in ``/var/run/named/session.key``, which is automatically
|
found in |session_key|, which is automatically
|
||||||
generated by ``named`` if any local ``primary`` zone has set
|
generated by ``named`` if any local ``primary`` zone has set
|
||||||
``update-policy`` to ``local``. The location of this key file can be
|
``update-policy`` to ``local``. The location of this key file can be
|
||||||
overridden with the ``-k`` option.
|
overridden with the ``-k`` option.
|
||||||
@ -335,7 +335,7 @@ Files
|
|||||||
``/etc/resolv.conf``
|
``/etc/resolv.conf``
|
||||||
Used to identify the default name server
|
Used to identify the default name server
|
||||||
|
|
||||||
``/var/run/named/session.key``
|
|session_key|
|
||||||
Sets the default TSIG key for use in local-only mode
|
Sets the default TSIG key for use in local-only mode
|
||||||
|
|
||||||
``K{name}.+157.+{random}.key``
|
``K{name}.+157.+{random}.key``
|
||||||
|
@ -31,7 +31,7 @@ For example:
|
|||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
plugin query "/usr/local/lib/filter-a.so" {
|
plugin query "filter-a.so" {
|
||||||
filter-a-on-v6 yes;
|
filter-a-on-v6 yes;
|
||||||
filter-a-on-v4 yes;
|
filter-a-on-v4 yes;
|
||||||
filter-a { 192.0.2.1; 2001:db8:2::1; };
|
filter-a { 192.0.2.1; 2001:db8:2::1; };
|
||||||
|
@ -35,7 +35,7 @@ enabled with the ``filter-aaaa`` ACL and the ``filter-aaaa-on-v4`` and
|
|||||||
|
|
||||||
::
|
::
|
||||||
|
|
||||||
plugin query "/usr/local/lib/filter-aaaa.so" {
|
plugin query "filter-aaaa.so" {
|
||||||
filter-aaaa-on-v4 yes;
|
filter-aaaa-on-v4 yes;
|
||||||
filter-aaaa-on-v6 yes;
|
filter-aaaa-on-v6 yes;
|
||||||
filter-aaaa { 192.0.2.1; 2001:db8:2::1; };
|
filter-aaaa { 192.0.2.1; 2001:db8:2::1; };
|
||||||
|
@ -59,11 +59,11 @@ Options
|
|||||||
|
|
||||||
``-c config-file``
|
``-c config-file``
|
||||||
This option indicates ``config-file`` as the configuration file instead of the default,
|
This option indicates ``config-file`` as the configuration file instead of the default,
|
||||||
``/etc/rndc.conf``.
|
|rndc_conf|.
|
||||||
|
|
||||||
``-k key-file``
|
``-k key-file``
|
||||||
This option indicates ``key-file`` as the key file instead of the default,
|
This option indicates ``key-file`` as the key file instead of the default,
|
||||||
``/etc/rndc.key``. The key in ``/etc/rndc.key`` is used to
|
|rndc_key|. The key in |rndc_key| is used to
|
||||||
authenticate commands sent to the server if the config-file does not
|
authenticate commands sent to the server if the config-file does not
|
||||||
exist.
|
exist.
|
||||||
|
|
||||||
|
@ -178,3 +178,17 @@ latex_documents = [
|
|||||||
]
|
]
|
||||||
|
|
||||||
latex_logo = "isc-logo.pdf"
|
latex_logo = "isc-logo.pdf"
|
||||||
|
|
||||||
|
#
|
||||||
|
# The rst_epilog will be completely overwritten from the Makefile,
|
||||||
|
# the definition here is provided purely for situations when
|
||||||
|
# sphinx-build is run by hand.
|
||||||
|
#
|
||||||
|
rst_epilog = """
|
||||||
|
.. |rndc_conf| replace: ``/etc/rndc.conf``
|
||||||
|
.. |rndc_key| replace: ``/etc/rndc.key``
|
||||||
|
.. |named_conf| replace: ``/etc/named.conf``
|
||||||
|
.. |bind_keys| replace: ``/etc/bind.keys``
|
||||||
|
.. |named_pid| replace: ``/run/named.pid``
|
||||||
|
.. |session_key| replace: ``/run/session.key``
|
||||||
|
"""
|
||||||
|
@ -39,9 +39,6 @@ rules.
|
|||||||
// Two corporate subnets we wish to allow queries from.
|
// Two corporate subnets we wish to allow queries from.
|
||||||
acl corpnets { 192.168.4.0/24; 192.168.7.0/24; };
|
acl corpnets { 192.168.4.0/24; 192.168.7.0/24; };
|
||||||
options {
|
options {
|
||||||
// Working directory
|
|
||||||
directory "/etc/namedb";
|
|
||||||
|
|
||||||
allow-query { corpnets; };
|
allow-query { corpnets; };
|
||||||
};
|
};
|
||||||
// Provide a reverse mapping for the loopback
|
// Provide a reverse mapping for the loopback
|
||||||
@ -64,8 +61,6 @@ the primary server for ``example.com`` and a secondary server for the subdomain
|
|||||||
::
|
::
|
||||||
|
|
||||||
options {
|
options {
|
||||||
// Working directory
|
|
||||||
directory "/etc/namedb";
|
|
||||||
// Do not allow access to cache
|
// Do not allow access to cache
|
||||||
allow-query-cache { none; };
|
allow-query-cache { none; };
|
||||||
// This is the default
|
// This is the default
|
||||||
@ -242,9 +237,9 @@ server.
|
|||||||
the server is authenticated with digital signatures that rely on a
|
the server is authenticated with digital signatures that rely on a
|
||||||
shared secret, and there is no way to provide that secret other than
|
shared secret, and there is no way to provide that secret other than
|
||||||
with a configuration file. The default location for the ``rndc``
|
with a configuration file. The default location for the ``rndc``
|
||||||
configuration file is ``/etc/rndc.conf``, but an alternate location
|
configuration file is |rndc_conf|, but an alternate location
|
||||||
can be specified with the ``-c`` option. If the configuration file is
|
can be specified with the ``-c`` option. If the configuration file is
|
||||||
not found, ``rndc`` also looks in ``/etc/rndc.key`` (or whatever
|
not found, ``rndc`` also looks in |rndc_key| (or whatever
|
||||||
``sysconfdir`` was defined when the BIND build was configured). The
|
``sysconfdir`` was defined when the BIND build was configured). The
|
||||||
``rndc.key`` file is generated by running ``rndc-confgen -a`` as
|
``rndc.key`` file is generated by running ``rndc-confgen -a`` as
|
||||||
described in :ref:`controls_statement_definition_and_usage`.
|
described in :ref:`controls_statement_definition_and_usage`.
|
||||||
@ -297,7 +292,7 @@ server.
|
|||||||
default-key rndc_key;
|
default-key rndc_key;
|
||||||
};
|
};
|
||||||
|
|
||||||
This file, if installed as ``/etc/rndc.conf``, allows the
|
This file, if installed as |rndc_conf|, allows the
|
||||||
command:
|
command:
|
||||||
|
|
||||||
``$ rndc reload``
|
``$ rndc reload``
|
||||||
|
@ -404,9 +404,8 @@ If no ``controls`` statement is present, ``named`` sets up a default
|
|||||||
control channel listening on the loopback address 127.0.0.1 and its IPv6
|
control channel listening on the loopback address 127.0.0.1 and its IPv6
|
||||||
counterpart, ::1. In this case, and also when the ``controls`` statement
|
counterpart, ::1. In this case, and also when the ``controls`` statement
|
||||||
is present but does not have a ``keys`` clause, ``named`` attempts
|
is present but does not have a ``keys`` clause, ``named`` attempts
|
||||||
to load the command channel key from the file ``rndc.key`` in ``/etc``
|
to load the command channel key from the file |rndc_key|.
|
||||||
(or whatever ``sysconfdir`` was specified when BIND was built). To
|
To create an ``rndc.key`` file, run ``rndc-confgen -a``.
|
||||||
create an ``rndc.key`` file, run ``rndc-confgen -a``.
|
|
||||||
|
|
||||||
To disable the command channel, use an empty ``controls`` statement:
|
To disable the command channel, use an empty ``controls`` statement:
|
||||||
``controls { };``.
|
``controls { };``.
|
||||||
@ -1247,7 +1246,7 @@ default is used.
|
|||||||
|
|
||||||
``pid-file``
|
``pid-file``
|
||||||
This is the pathname of the file the server writes its process ID in. If not
|
This is the pathname of the file the server writes its process ID in. If not
|
||||||
specified, the default is ``/var/run/named/named.pid``. The PID file
|
specified, the default is |named_pid|. The PID file
|
||||||
is used by programs that send signals to the running name
|
is used by programs that send signals to the running name
|
||||||
server. Specifying ``pid-file none`` disables the use of a PID file;
|
server. Specifying ``pid-file none`` disables the use of a PID file;
|
||||||
no file is written and any existing one is removed. Note
|
no file is written and any existing one is removed. Note
|
||||||
@ -1268,7 +1267,7 @@ default is used.
|
|||||||
``bindkeys-file``
|
``bindkeys-file``
|
||||||
This is the pathname of a file to override the built-in trusted keys provided
|
This is the pathname of a file to override the built-in trusted keys provided
|
||||||
by ``named``. See the discussion of ``dnssec-validation`` for
|
by ``named``. See the discussion of ``dnssec-validation`` for
|
||||||
details. If not specified, the default is ``/etc/bind.keys``.
|
details. If not specified, the default is |bind_keys|.
|
||||||
|
|
||||||
``secroots-file``
|
``secroots-file``
|
||||||
This is the pathname of the file the server dumps security roots to, when
|
This is the pathname of the file the server dumps security roots to, when
|
||||||
@ -1278,7 +1277,7 @@ default is used.
|
|||||||
``session-keyfile``
|
``session-keyfile``
|
||||||
This is the pathname of the file into which to write a TSIG session key
|
This is the pathname of the file into which to write a TSIG session key
|
||||||
generated by ``named`` for use by ``nsupdate -l``. If not specified,
|
generated by ``named`` for use by ``nsupdate -l``. If not specified,
|
||||||
the default is ``/var/run/named/session.key``. (See :ref:`dynamic_update_policies`,
|
the default is |session_key|. (See :ref:`dynamic_update_policies`,
|
||||||
and in particular the discussion of the ``update-policy`` statement's
|
and in particular the discussion of the ``update-policy`` statement's
|
||||||
``local`` option, for more information about this feature.)
|
``local`` option, for more information about this feature.)
|
||||||
|
|
||||||
@ -6032,7 +6031,7 @@ A pre-defined ``update-policy`` rule can be switched on with the command
|
|||||||
generates a TSIG session key when starting and stores it in a file;
|
generates a TSIG session key when starting and stores it in a file;
|
||||||
this key can then be used by local clients to update the zone while
|
this key can then be used by local clients to update the zone while
|
||||||
``named`` is running. By default, the session key is stored in the file
|
``named`` is running. By default, the session key is stored in the file
|
||||||
``/var/run/named/session.key``, the key name is "local-ddns", and the
|
|session_key|, the key name is "local-ddns", and the
|
||||||
key algorithm is HMAC-SHA256. These values are configurable with the
|
key algorithm is HMAC-SHA256. These values are configurable with the
|
||||||
``session-keyfile``, ``session-keyname``, and ``session-keyalg`` options,
|
``session-keyfile``, ``session-keyname``, and ``session-keyalg`` options,
|
||||||
respectively. A client running on the local system, if run with
|
respectively. A client running on the local system, if run with
|
||||||
|
@ -132,6 +132,9 @@ man_SUBST = \
|
|||||||
$(AM_V_SED)$(SED) \
|
$(AM_V_SED)$(SED) \
|
||||||
-e 's,[@]PACKAGE_VERSION@,$(PACKAGE_VERSION),' \
|
-e 's,[@]PACKAGE_VERSION@,$(PACKAGE_VERSION),' \
|
||||||
-e 's,[@]RELEASE_DATE@,$(RELEASE_DATE),' \
|
-e 's,[@]RELEASE_DATE@,$(RELEASE_DATE),' \
|
||||||
|
-e 's,[@]libdir[@],$(libdir),g' \
|
||||||
|
-e 's,[@]runstatedir[@],$(runstatedir),g' \
|
||||||
|
-e 's,[@]sysconfdir[@],$(sysconfdir),g' \
|
||||||
$(srcdir)/$@in >$@
|
$(srcdir)/$@in >$@
|
||||||
|
|
||||||
.1in.1:
|
.1in.1:
|
||||||
@ -170,6 +173,7 @@ if HAVE_SPHINX_BUILD
|
|||||||
manpages.stamp: $(MANPAGES_RST)
|
manpages.stamp: $(MANPAGES_RST)
|
||||||
@rm -f manpages.tmp
|
@rm -f manpages.tmp
|
||||||
@touch manpages.tmp
|
@touch manpages.tmp
|
||||||
|
echo "${man_RST_EPILOG}"
|
||||||
$(AM_V_SPHINX)$(SPHINX_BUILD) -b man -d $(SPHINXBUILDDIR)/.doctrees/man $(man_SPHINXOPTS) $(SPHINXBUILDDIR)/man
|
$(AM_V_SPHINX)$(SPHINX_BUILD) -b man -d $(SPHINXBUILDDIR)/.doctrees/man $(man_SPHINXOPTS) $(SPHINXBUILDDIR)/man
|
||||||
for f in $(SPHINXBUILDDIR)/man/*; do \
|
for f in $(SPHINXBUILDDIR)/man/*; do \
|
||||||
cp -a "$$f" "$(srcdir)/$$(basename $$f)in"; \
|
cp -a "$$f" "$(srcdir)/$$(basename $$f)in"; \
|
||||||
|
@ -102,3 +102,17 @@ man_pages = [
|
|||||||
('rndc', 'rndc', 'name server control utility', author, 8),
|
('rndc', 'rndc', 'name server control utility', author, 8),
|
||||||
('tsig-keygen', 'tsig-keygen', 'TSIG key generation tool', author, 8),
|
('tsig-keygen', 'tsig-keygen', 'TSIG key generation tool', author, 8),
|
||||||
]
|
]
|
||||||
|
|
||||||
|
#
|
||||||
|
# The rst_epilog will be completely overwritten from the Makefile,
|
||||||
|
# the definition here is provided purely for situations when
|
||||||
|
# sphinx-build is run by hand.
|
||||||
|
#
|
||||||
|
rst_epilog = """
|
||||||
|
.. |rndc_conf| replace: ``@sysconfdir@/rndc.conf``
|
||||||
|
.. |rndc_key| replace: ``@sysconfdir@/rndc.key``
|
||||||
|
.. |named_conf| replace: ``@sysconfdir@/named.conf``
|
||||||
|
.. |bind_keys| replace: ``@sysconfdir@/bind.keys``
|
||||||
|
.. |named_pid| replace: ``@runstatedir@/named.pid``
|
||||||
|
.. |session_key| replace: ``@runstatedir@/session.key``
|
||||||
|
"""
|
||||||
|
@ -113,7 +113,7 @@ supplied, \fBdelv\fP performs a lookup for an A record.
|
|||||||
.TP
|
.TP
|
||||||
.B \fB\-a anchor\-file\fP
|
.B \fB\-a anchor\-file\fP
|
||||||
This option specifies a file from which to read DNSSEC trust anchors. The default
|
This option specifies a file from which to read DNSSEC trust anchors. The default
|
||||||
is \fB/etc/bind.keys\fP, which is included with BIND 9 and contains one
|
is \fB@sysconfdir@/bind.keys\fP, which is included with BIND 9 and contains one
|
||||||
or more trust anchors for the root zone (".").
|
or more trust anchors for the root zone (".").
|
||||||
.sp
|
.sp
|
||||||
Keys that do not match the root zone name are ignored. An alternate
|
Keys that do not match the root zone name are ignored. An alternate
|
||||||
@ -123,8 +123,8 @@ Note: When reading the trust anchor file, \fBdelv\fP treats \fBtrust\-anchors\fP
|
|||||||
\fBinitial\-key\fP, and \fBstatic\-key\fP identically. That is, for a managed key,
|
\fBinitial\-key\fP, and \fBstatic\-key\fP identically. That is, for a managed key,
|
||||||
it is the \fIinitial\fP key that is trusted; \fI\%RFC 5011\fP key management is not
|
it is the \fIinitial\fP key that is trusted; \fI\%RFC 5011\fP key management is not
|
||||||
supported. \fBdelv\fP does not consult the managed\-keys database maintained by
|
supported. \fBdelv\fP does not consult the managed\-keys database maintained by
|
||||||
\fBnamed\fP, which means that if either of the keys in \fB/etc/bind.keys\fP is
|
\fBnamed\fP, which means that if either of the keys in \fB@sysconfdir@/bind.keys\fP is
|
||||||
revoked and rolled over, \fB/etc/bind.keys\fP must be updated to
|
revoked and rolled over, \fB@sysconfdir@/bind.keys\fP must be updated to
|
||||||
use DNSSEC validation in \fBdelv\fP\&.
|
use DNSSEC validation in \fBdelv\fP\&.
|
||||||
.TP
|
.TP
|
||||||
.B \fB\-b address\fP
|
.B \fB\-b address\fP
|
||||||
@ -331,7 +331,7 @@ This option prints response data in YAML format.
|
|||||||
.UNINDENT
|
.UNINDENT
|
||||||
.SH FILES
|
.SH FILES
|
||||||
.sp
|
.sp
|
||||||
\fB/etc/bind.keys\fP
|
\fB@sysconfdir@/bind.keys\fP
|
||||||
.sp
|
.sp
|
||||||
\fB/etc/resolv.conf\fP
|
\fB/etc/resolv.conf\fP
|
||||||
.SH SEE ALSO
|
.SH SEE ALSO
|
||||||
|
@ -44,7 +44,7 @@ For example:
|
|||||||
.sp
|
.sp
|
||||||
.nf
|
.nf
|
||||||
.ft C
|
.ft C
|
||||||
plugin query "/usr/local/lib/filter\-a.so" {
|
plugin query "filter\-a.so" {
|
||||||
filter\-a\-on\-v6 yes;
|
filter\-a\-on\-v6 yes;
|
||||||
filter\-a\-on\-v4 yes;
|
filter\-a\-on\-v4 yes;
|
||||||
filter\-a { 192.0.2.1; 2001:db8:2::1; };
|
filter\-a { 192.0.2.1; 2001:db8:2::1; };
|
||||||
|
@ -48,7 +48,7 @@ enabled with the \fBfilter\-aaaa\fP ACL and the \fBfilter\-aaaa\-on\-v4\fP and
|
|||||||
.sp
|
.sp
|
||||||
.nf
|
.nf
|
||||||
.ft C
|
.ft C
|
||||||
plugin query "/usr/local/lib/filter\-aaaa.so" {
|
plugin query "filter\-aaaa.so" {
|
||||||
filter\-aaaa\-on\-v4 yes;
|
filter\-aaaa\-on\-v4 yes;
|
||||||
filter\-aaaa\-on\-v6 yes;
|
filter\-aaaa\-on\-v6 yes;
|
||||||
filter\-aaaa { 192.0.2.1; 2001:db8:2::1; };
|
filter\-aaaa { 192.0.2.1; 2001:db8:2::1; };
|
||||||
|
@ -38,7 +38,7 @@ named-checkconf \- named configuration file syntax checking tool
|
|||||||
\fBnamed\-checkconf\fP checks the syntax, but not the semantics, of a
|
\fBnamed\-checkconf\fP checks the syntax, but not the semantics, of a
|
||||||
\fBnamed\fP configuration file. The file, along with all files included by it, is parsed and checked for syntax
|
\fBnamed\fP configuration file. The file, along with all files included by it, is parsed and checked for syntax
|
||||||
errors. If no file is specified,
|
errors. If no file is specified,
|
||||||
\fB/etc/named.conf\fP is read by default.
|
\fB@sysconfdir@/named.conf\fP is read by default.
|
||||||
.sp
|
.sp
|
||||||
Note: files that \fBnamed\fP reads in separate parser contexts, such as
|
Note: files that \fBnamed\fP reads in separate parser contexts, such as
|
||||||
\fBrndc.key\fP and \fBbind.keys\fP, are not automatically read by
|
\fBrndc.key\fP and \fBbind.keys\fP, are not automatically read by
|
||||||
@ -91,7 +91,7 @@ This option performs a test load of all zones of type \fBprimary\fP found in \fB
|
|||||||
.TP
|
.TP
|
||||||
.B \fBfilename\fP
|
.B \fBfilename\fP
|
||||||
This indicates the name of the configuration file to be checked. If not specified,
|
This indicates the name of the configuration file to be checked. If not specified,
|
||||||
it defaults to \fB/etc/named.conf\fP\&.
|
it defaults to \fB@sysconfdir@/named.conf\fP\&.
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.SH RETURN VALUES
|
.SH RETURN VALUES
|
||||||
.sp
|
.sp
|
||||||
|
@ -40,7 +40,7 @@ distribution from ISC. For more information on the DNS, see \fI\%RFC 1033\fP,
|
|||||||
\fI\%RFC 1034\fP, and \fI\%RFC 1035\fP\&.
|
\fI\%RFC 1034\fP, and \fI\%RFC 1035\fP\&.
|
||||||
.sp
|
.sp
|
||||||
When invoked without arguments, \fBnamed\fP reads the default
|
When invoked without arguments, \fBnamed\fP reads the default
|
||||||
configuration file \fB/etc/named.conf\fP, reads any initial data, and
|
configuration file \fB@sysconfdir@/named.conf\fP, reads any initial data, and
|
||||||
listens for queries.
|
listens for queries.
|
||||||
.SH OPTIONS
|
.SH OPTIONS
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
@ -55,7 +55,7 @@ This option tells \fBnamed\fP to use only IPv6, even if the host machine is capa
|
|||||||
.TP
|
.TP
|
||||||
.B \fB\-c config\-file\fP
|
.B \fB\-c config\-file\fP
|
||||||
This option tells \fBnamed\fP to use \fBconfig\-file\fP as its configuration file instead of the default,
|
This option tells \fBnamed\fP to use \fBconfig\-file\fP as its configuration file instead of the default,
|
||||||
\fB/etc/named.conf\fP\&. To ensure that the configuration file
|
\fB@sysconfdir@/named.conf\fP\&. To ensure that the configuration file
|
||||||
can be reloaded after the server has changed its working directory
|
can be reloaded after the server has changed its working directory
|
||||||
due to to a possible \fBdirectory\fP option in the configuration file,
|
due to to a possible \fBdirectory\fP option in the configuration file,
|
||||||
\fBconfig\-file\fP should be an absolute pathname.
|
\fBconfig\-file\fP should be an absolute pathname.
|
||||||
@ -234,10 +234,10 @@ in the script used to start the \fBnamed\fP process.
|
|||||||
.SH FILES
|
.SH FILES
|
||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
.B \fB/etc/named.conf\fP
|
.B \fB@sysconfdir@/named.conf\fP
|
||||||
The default configuration file.
|
The default configuration file.
|
||||||
.TP
|
.TP
|
||||||
.B \fB/var/run/named/named.pid\fP
|
.B \fB@runstatedir@/named.pid\fP
|
||||||
The default process\-id file.
|
The default process\-id file.
|
||||||
.UNINDENT
|
.UNINDENT
|
||||||
.SH SEE ALSO
|
.SH SEE ALSO
|
||||||
|
@ -1231,7 +1231,7 @@ zone string [ class ] {
|
|||||||
.UNINDENT
|
.UNINDENT
|
||||||
.SH FILES
|
.SH FILES
|
||||||
.sp
|
.sp
|
||||||
\fB/etc/named.conf\fP
|
\fB@sysconfdir@/named.conf\fP
|
||||||
.SH SEE ALSO
|
.SH SEE ALSO
|
||||||
.sp
|
.sp
|
||||||
\fBnamed(8)\fP, \fBnamed\-checkconf(8)\fP, \fBrndc(8)\fP, \fBrndc\-confgen(8)\fP, \fBtsig\-keygen(8)\fP, BIND 9 Administrator Reference Manual.
|
\fBnamed(8)\fP, \fBnamed\-checkconf(8)\fP, \fBrndc(8)\fP, \fBrndc\-confgen(8)\fP, \fBtsig\-keygen(8)\fP, BIND 9 Administrator Reference Manual.
|
||||||
|
@ -57,7 +57,7 @@ described in \fI\%RFC 3645\fP\&.
|
|||||||
.sp
|
.sp
|
||||||
TSIG relies on a shared secret that should only be known to \fBnsupdate\fP
|
TSIG relies on a shared secret that should only be known to \fBnsupdate\fP
|
||||||
and the name server. For instance, suitable \fBkey\fP and \fBserver\fP
|
and the name server. For instance, suitable \fBkey\fP and \fBserver\fP
|
||||||
statements are added to \fB/etc/named.conf\fP so that the name server
|
statements are added to \fB@sysconfdir@/named.conf\fP so that the name server
|
||||||
can associate the appropriate secret key and algorithm with the IP
|
can associate the appropriate secret key and algorithm with the IP
|
||||||
address of the client application that is using TSIG
|
address of the client application that is using TSIG
|
||||||
authentication. \fBddns\-confgen\fP can generate suitable
|
authentication. \fBddns\-confgen\fP can generate suitable
|
||||||
@ -107,7 +107,7 @@ the key specified is not an HMAC\-MD5 key.
|
|||||||
This option sets local\-host only mode, which sets the server address to localhost
|
This option sets local\-host only mode, which sets the server address to localhost
|
||||||
(disabling the \fBserver\fP so that the server address cannot be
|
(disabling the \fBserver\fP so that the server address cannot be
|
||||||
overridden). Connections to the local server use a TSIG key
|
overridden). Connections to the local server use a TSIG key
|
||||||
found in \fB/var/run/named/session.key\fP, which is automatically
|
found in \fB@runstatedir@/session.key\fP, which is automatically
|
||||||
generated by \fBnamed\fP if any local \fBprimary\fP zone has set
|
generated by \fBnamed\fP if any local \fBprimary\fP zone has set
|
||||||
\fBupdate\-policy\fP to \fBlocal\fP\&. The location of this key file can be
|
\fBupdate\-policy\fP to \fBlocal\fP\&. The location of this key file can be
|
||||||
overridden with the \fB\-k\fP option.
|
overridden with the \fB\-k\fP option.
|
||||||
@ -355,7 +355,7 @@ DNSKEY, and NSEC records.)
|
|||||||
.B \fB/etc/resolv.conf\fP
|
.B \fB/etc/resolv.conf\fP
|
||||||
Used to identify the default name server
|
Used to identify the default name server
|
||||||
.TP
|
.TP
|
||||||
.B \fB/var/run/named/session.key\fP
|
.B \fB@runstatedir@/session.key\fP
|
||||||
Sets the default TSIG key for use in local\-only mode
|
Sets the default TSIG key for use in local\-only mode
|
||||||
.TP
|
.TP
|
||||||
.B \fBK{name}.+157.+{random}.key\fP
|
.B \fBK{name}.+157.+{random}.key\fP
|
||||||
|
@ -45,9 +45,8 @@ by hand. Alternatively, it can be run with the \fB\-a\fP option to set up a
|
|||||||
.INDENT 0.0
|
.INDENT 0.0
|
||||||
.TP
|
.TP
|
||||||
.B \fB\-a\fP
|
.B \fB\-a\fP
|
||||||
This option sets automatic \fBrndc\fP configuration, which creates a file \fBrndc.key\fP
|
This option sets automatic \fBrndc\fP configuration, which creates a file
|
||||||
in \fB/etc\fP (or a different \fBsysconfdir\fP specified when BIND
|
\fB@sysconfdir@/rndc.key\fP that is read by both \fBrndc\fP and \fBnamed\fP on startup.
|
||||||
was built) that is read by both \fBrndc\fP and \fBnamed\fP on startup.
|
|
||||||
The \fBrndc.key\fP file defines a default command channel and
|
The \fBrndc.key\fP file defines a default command channel and
|
||||||
authentication key allowing \fBrndc\fP to communicate with \fBnamed\fP on
|
authentication key allowing \fBrndc\fP to communicate with \fBnamed\fP on
|
||||||
the local host with no further configuration.
|
the local host with no further configuration.
|
||||||
|
@ -69,11 +69,11 @@ IPv4 and IPv6 source addresses.
|
|||||||
.TP
|
.TP
|
||||||
.B \fB\-c config\-file\fP
|
.B \fB\-c config\-file\fP
|
||||||
This option indicates \fBconfig\-file\fP as the configuration file instead of the default,
|
This option indicates \fBconfig\-file\fP as the configuration file instead of the default,
|
||||||
\fB/etc/rndc.conf\fP\&.
|
\fB@sysconfdir@/rndc.conf\fP\&.
|
||||||
.TP
|
.TP
|
||||||
.B \fB\-k key\-file\fP
|
.B \fB\-k key\-file\fP
|
||||||
This option indicates \fBkey\-file\fP as the key file instead of the default,
|
This option indicates \fBkey\-file\fP as the key file instead of the default,
|
||||||
\fB/etc/rndc.key\fP\&. The key in \fB/etc/rndc.key\fP is used to
|
\fB@sysconfdir@/rndc.key\fP\&. The key in \fB@sysconfdir@/rndc.key\fP is used to
|
||||||
authenticate commands sent to the server if the config\-file does not
|
authenticate commands sent to the server if the config\-file does not
|
||||||
exist.
|
exist.
|
||||||
.TP
|
.TP
|
||||||
|
@ -125,7 +125,7 @@ print <<END;
|
|||||||
Files
|
Files
|
||||||
~~~~~
|
~~~~~
|
||||||
|
|
||||||
``/etc/named.conf``
|
|named_conf|
|
||||||
|
|
||||||
See Also
|
See Also
|
||||||
~~~~~~~~
|
~~~~~~~~
|
||||||
|
Loading…
x
Reference in New Issue
Block a user