From d0e7ca1fa33783f8d3b62046fd5aad04e35e9845 Mon Sep 17 00:00:00 2001 From: rudson Date: Wed, 15 Nov 2006 22:31:15 +0000 Subject: movendo... git-svn-id: svn+slack://slack.fluxo.info/var/svn/slackbuilds@670 370017ae-e619-0410-ac65-c121f96126d4 --- libs/dev/cyrus-sasl/rc.saslauthd.new | 45 ++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 libs/dev/cyrus-sasl/rc.saslauthd.new (limited to 'libs/dev/cyrus-sasl/rc.saslauthd.new') diff --git a/libs/dev/cyrus-sasl/rc.saslauthd.new b/libs/dev/cyrus-sasl/rc.saslauthd.new new file mode 100644 index 00000000..8b69a710 --- /dev/null +++ b/libs/dev/cyrus-sasl/rc.saslauthd.new @@ -0,0 +1,45 @@ +#!/bin/sh +# rc.saslauthd: start/stop/restart saslauthd +# +# saslauthd is a daemon process that handles plaintext authentication +# requests on behalf of the SASL library. The CMU Cyrus SASL library +# is a general purpose authentication library for sever and client +# applications. It is mostly used to authenticate to mail servers. +# +# saslauthd should be started from the system boot scripts when going +# to multi-user mode. When running against a protected authentication +# database (e.g. the shadow mechanism), it must be run as the superuser. +# + +saslauthd_start() { + # If saslauthd is not running, start it: + if [ ! -r /var/state/saslauthd/saslauthd.pid ]; then + # Use shadow authentication by default on Slackware: + echo "Starting SASL authentication daemon: /usr/sbin/saslauthd -a shadow" + /usr/sbin/saslauthd -a shadow + fi +} + +saslauthd_stop() { + kill `cat /var/state/saslauthd/saslauthd.pid 2> /dev/null` 2> /dev/null + sleep 1 +} + +saslauthd_restart() { + saslauthd_stop + saslauthd_start +} + +case "$1" in +'start') + saslauthd_start + ;; +'stop') + saslauthd_stop + ;; +'restart') + saslauthd_restart + ;; +*) + echo "usage $0 start|stop|restart" +esac -- cgit v1.2.3