slackware-current/source/n/cyrus-sasl/rc.saslauthd
Patrick J Volkerding 153bd14cd0 Mon Nov 30 20:03:36 UTC 2020
a/kernel-firmware-20201130_7455a36-noarch-1.txz:  Upgraded.
ap/sudo-1.9.4-x86_64-1.txz:  Upgraded.
d/python-pip-20.3-x86_64-1.txz:  Upgraded.
d/rinutils-0.8.0-x86_64-1.txz:  Upgraded.
l/imagemagick-7.0.10_45-x86_64-1.txz:  Upgraded.
n/cyrus-sasl-2.1.27-x86_64-5.txz:  Rebuilt.
  rc.saslauthd: start with -a pam -c
  Rebuilt with --with-ldap and include LDAP_SASLAUTHD documentation.
  Thanks to voegelas.
2020-12-01 08:59:51 +01:00

45 lines
1.1 KiB
Bash

#!/bin/sh
# rc.saslauthd: start/stop/restart saslauthd
#
# saslauthd is a daemon process that handles plaintext authentication
# requests on behalf of the SASL library. The CMU Cyrus SASL library
# is a general purpose authentication library for server and client
# applications. It is mostly used to authenticate to mail servers.
#
# saslauthd should be started from the system boot scripts when going
# to multi-user mode. When running against a protected authentication
# database (e.g. the shadow mechanism), it must be run as the superuser.
#
saslauthd_start() {
# If saslauthd is not running, start it:
if [ ! -r /var/state/saslauthd/saslauthd.pid ]; then
# Use PAM authentication with credential caching:
echo "Starting SASL authentication daemon: /usr/sbin/saslauthd -a pam -c"
/usr/sbin/saslauthd -a pam -c
fi
}
saslauthd_stop() {
kill `cat /var/state/saslauthd/saslauthd.pid 2> /dev/null` 2> /dev/null
sleep 1
}
saslauthd_restart() {
saslauthd_stop
saslauthd_start
}
case "$1" in
'start')
saslauthd_start
;;
'stop')
saslauthd_stop
;;
'restart')
saslauthd_restart
;;
*)
echo "usage $0 start|stop|restart"
esac