From 3ae891bbbaa3f96365f4c9fbe49e5cee26183fbc Mon Sep 17 00:00:00 2001 From: rhatto Date: Mon, 31 Jul 2006 20:45:44 +0000 Subject: initial import git-svn-id: svn+slack://slack.fluxo.info/var/svn/slackbuilds@1 370017ae-e619-0410-ac65-c121f96126d4 --- cyrus-sasl/rc.saslauthd.new | 45 +++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 cyrus-sasl/rc.saslauthd.new (limited to 'cyrus-sasl/rc.saslauthd.new') diff --git a/cyrus-sasl/rc.saslauthd.new b/cyrus-sasl/rc.saslauthd.new new file mode 100644 index 00000000..8b69a710 --- /dev/null +++ b/cyrus-sasl/rc.saslauthd.new @@ -0,0 +1,45 @@ +#!/bin/sh +# rc.saslauthd: start/stop/restart saslauthd +# +# saslauthd is a daemon process that handles plaintext authentication +# requests on behalf of the SASL library. The CMU Cyrus SASL library +# is a general purpose authentication library for sever and client +# applications. It is mostly used to authenticate to mail servers. +# +# saslauthd should be started from the system boot scripts when going +# to multi-user mode. When running against a protected authentication +# database (e.g. the shadow mechanism), it must be run as the superuser. +# + +saslauthd_start() { + # If saslauthd is not running, start it: + if [ ! -r /var/state/saslauthd/saslauthd.pid ]; then + # Use shadow authentication by default on Slackware: + echo "Starting SASL authentication daemon: /usr/sbin/saslauthd -a shadow" + /usr/sbin/saslauthd -a shadow + fi +} + +saslauthd_stop() { + kill `cat /var/state/saslauthd/saslauthd.pid 2> /dev/null` 2> /dev/null + sleep 1 +} + +saslauthd_restart() { + saslauthd_stop + saslauthd_start +} + +case "$1" in +'start') + saslauthd_start + ;; +'stop') + saslauthd_stop + ;; +'restart') + saslauthd_restart + ;; +*) + echo "usage $0 start|stop|restart" +esac -- cgit v1.2.3