summaryrefslogtreecommitdiffstats
path: root/source/n/bind/rc.bind
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2020-03-02 19:05:10 +0000
committer Eric Hameleers <alien@slackware.com>2020-03-03 08:59:49 +0100
commit11403357f20e37f8613bb0ea1cdc51c34c51f8a6 (patch)
tree09017083592f25e160079721bc5b91493f4b80ed /source/n/bind/rc.bind
parentc10b5e1e04d4eae2e67963233548ed7053dd3be3 (diff)
downloadcurrent-11403357f20e37f8613bb0ea1cdc51c34c51f8a6.tar.gz
current-11403357f20e37f8613bb0ea1cdc51c34c51f8a6.tar.xz
Mon Mar 2 19:05:10 UTC 202020200302190510
a/dialog-1.3_20200228-x86_64-1.txz: Upgraded. l/Mako-1.1.2-x86_64-1.txz: Upgraded. l/imagemagick-7.0.9_27-x86_64-1.txz: Upgraded. l/libcap-2.33-x86_64-1.txz: Upgraded. n/bind-9.16.0-x86_64-2.txz: Rebuilt. rc.bind: ensure /var/run/named exists before starting named. Thanks to MarcT. rc.bind: when stopping named, only kill processes in the current namespace. x/libevdev-1.9.0-x86_64-1.txz: Upgraded. x/wayland-protocols-1.20-noarch-1.txz: Upgraded. xap/seamonkey-2.53.1-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.1 (* Security fix *) testing/packages/PAM/libcap-2.33-x86_64-1_pam.txz: Upgraded.
Diffstat (limited to 'source/n/bind/rc.bind')
-rw-r--r--source/n/bind/rc.bind15
1 files changed, 9 insertions, 6 deletions
diff --git a/source/n/bind/rc.bind b/source/n/bind/rc.bind
index 91ff8ce14..f7a687768 100644
--- a/source/n/bind/rc.bind
+++ b/source/n/bind/rc.bind
@@ -56,22 +56,25 @@ find_bind_user() {
# Seriously, don't run "rc.bind start" if BIND is already
# running or you'll get more than one copy running.
bind_start() {
+ # Make sure /var/run/named exists:
+ mkdir -p /var/run/named
# If we are running as a non-root user, we'll need to be sure that
- # /var/run/named exists, and /var/run/named is chowned properly to
- # that user. Your files in /var/named may need to be chowned as
- # well, but that will be up to the sysadmin to do.
+ # /var/run/named is chowned properly to that user. Your files in
+ # /var/named may need to be chowned as well, but that will be up to
+ # the sysadmin to do.
BIND_USER="$(find_bind_user)"
if [ ! "$BIND_USER" = "root" ]; then
- mkdir -p /var/run/named
chown -R $BIND_USER /var/run/named
else # prevent error if switching back to running as root:
chown -R root /var/run/named
fi
+ # Start named:
if [ -x /usr/sbin/named ]; then
echo "Starting BIND: /usr/sbin/named $NAMED_OPTIONS"
/usr/sbin/named $NAMED_OPTIONS
sleep 1
fi
+ # Make sure that named started:
if ! ps axc | grep -q named ; then
echo "WARNING: named did not start."
echo "Attempting to start named again: /usr/sbin/named $NAMED_OPTIONS"
@@ -100,8 +103,8 @@ bind_stop() {
# to have any ill effects:
sleep 1
if ps axc | grep -q named ; then
- echo "Using "killall named" on additional BIND processes..."
- /bin/killall named 2> /dev/null
+ echo "Stopping all named processes in this namespace: /bin/killall --ns \$\$ named"
+ /bin/killall --ns $$ named 2> /dev/null
fi
}