mirror of
git://slackware.nl/current.git
synced 2024-12-26 09:58:59 +01:00
153bd14cd0
a/kernel-firmware-20201130_7455a36-noarch-1.txz: Upgraded. ap/sudo-1.9.4-x86_64-1.txz: Upgraded. d/python-pip-20.3-x86_64-1.txz: Upgraded. d/rinutils-0.8.0-x86_64-1.txz: Upgraded. l/imagemagick-7.0.10_45-x86_64-1.txz: Upgraded. n/cyrus-sasl-2.1.27-x86_64-5.txz: Rebuilt. rc.saslauthd: start with -a pam -c Rebuilt with --with-ldap and include LDAP_SASLAUTHD documentation. Thanks to voegelas.
45 lines
1.1 KiB
Bash
45 lines
1.1 KiB
Bash
#!/bin/sh
|
|
# rc.saslauthd: start/stop/restart saslauthd
|
|
#
|
|
# saslauthd is a daemon process that handles plaintext authentication
|
|
# requests on behalf of the SASL library. The CMU Cyrus SASL library
|
|
# is a general purpose authentication library for server and client
|
|
# applications. It is mostly used to authenticate to mail servers.
|
|
#
|
|
# saslauthd should be started from the system boot scripts when going
|
|
# to multi-user mode. When running against a protected authentication
|
|
# database (e.g. the shadow mechanism), it must be run as the superuser.
|
|
#
|
|
|
|
saslauthd_start() {
|
|
# If saslauthd is not running, start it:
|
|
if [ ! -r /var/state/saslauthd/saslauthd.pid ]; then
|
|
# Use PAM authentication with credential caching:
|
|
echo "Starting SASL authentication daemon: /usr/sbin/saslauthd -a pam -c"
|
|
/usr/sbin/saslauthd -a pam -c
|
|
fi
|
|
}
|
|
|
|
saslauthd_stop() {
|
|
kill `cat /var/state/saslauthd/saslauthd.pid 2> /dev/null` 2> /dev/null
|
|
sleep 1
|
|
}
|
|
|
|
saslauthd_restart() {
|
|
saslauthd_stop
|
|
saslauthd_start
|
|
}
|
|
|
|
case "$1" in
|
|
'start')
|
|
saslauthd_start
|
|
;;
|
|
'stop')
|
|
saslauthd_stop
|
|
;;
|
|
'restart')
|
|
saslauthd_restart
|
|
;;
|
|
*)
|
|
echo "usage $0 start|stop|restart"
|
|
esac
|