diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2020-03-02 19:05:10 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2020-03-03 08:59:49 +0100 |
commit | 11403357f20e37f8613bb0ea1cdc51c34c51f8a6 (patch) | |
tree | 09017083592f25e160079721bc5b91493f4b80ed /source/n | |
parent | c10b5e1e04d4eae2e67963233548ed7053dd3be3 (diff) | |
download | current-11403357f20e37f8613bb0ea1cdc51c34c51f8a6.tar.gz |
Mon Mar 2 19:05:10 UTC 202020200302190510
a/dialog-1.3_20200228-x86_64-1.txz: Upgraded.
l/Mako-1.1.2-x86_64-1.txz: Upgraded.
l/imagemagick-7.0.9_27-x86_64-1.txz: Upgraded.
l/libcap-2.33-x86_64-1.txz: Upgraded.
n/bind-9.16.0-x86_64-2.txz: Rebuilt.
rc.bind: ensure /var/run/named exists before starting named. Thanks to MarcT.
rc.bind: when stopping named, only kill processes in the current namespace.
x/libevdev-1.9.0-x86_64-1.txz: Upgraded.
x/wayland-protocols-1.20-noarch-1.txz: Upgraded.
xap/seamonkey-2.53.1-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.seamonkey-project.org/releases/seamonkey2.53.1
(* Security fix *)
testing/packages/PAM/libcap-2.33-x86_64-1_pam.txz: Upgraded.
Diffstat (limited to 'source/n')
-rwxr-xr-x | source/n/bind/bind.SlackBuild | 2 | ||||
-rw-r--r-- | source/n/bind/rc.bind | 15 |
2 files changed, 10 insertions, 7 deletions
diff --git a/source/n/bind/bind.SlackBuild b/source/n/bind/bind.SlackBuild index 865a3d70..593664e1 100755 --- a/source/n/bind/bind.SlackBuild +++ b/source/n/bind/bind.SlackBuild @@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=bind VERSION=${VERSION:-$(echo ${PKGNAM}-[0-9]*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} -BUILD=${BUILD:-1} +BUILD=${BUILD:-2} # Automatically determine the architecture we're building on: if [ -z "$ARCH" ]; then diff --git a/source/n/bind/rc.bind b/source/n/bind/rc.bind index 91ff8ce1..f7a68776 100644 --- a/source/n/bind/rc.bind +++ b/source/n/bind/rc.bind @@ -56,22 +56,25 @@ find_bind_user() { # Seriously, don't run "rc.bind start" if BIND is already # running or you'll get more than one copy running. bind_start() { + # Make sure /var/run/named exists: + mkdir -p /var/run/named # If we are running as a non-root user, we'll need to be sure that - # /var/run/named exists, and /var/run/named is chowned properly to - # that user. Your files in /var/named may need to be chowned as - # well, but that will be up to the sysadmin to do. + # /var/run/named is chowned properly to that user. Your files in + # /var/named may need to be chowned as well, but that will be up to + # the sysadmin to do. BIND_USER="$(find_bind_user)" if [ ! "$BIND_USER" = "root" ]; then - mkdir -p /var/run/named chown -R $BIND_USER /var/run/named else # prevent error if switching back to running as root: chown -R root /var/run/named fi + # Start named: if [ -x /usr/sbin/named ]; then echo "Starting BIND: /usr/sbin/named $NAMED_OPTIONS" /usr/sbin/named $NAMED_OPTIONS sleep 1 fi + # Make sure that named started: if ! ps axc | grep -q named ; then echo "WARNING: named did not start." echo "Attempting to start named again: /usr/sbin/named $NAMED_OPTIONS" @@ -100,8 +103,8 @@ bind_stop() { # to have any ill effects: sleep 1 if ps axc | grep -q named ; then - echo "Using "killall named" on additional BIND processes..." - /bin/killall named 2> /dev/null + echo "Stopping all named processes in this namespace: /bin/killall --ns \$\$ named" + /bin/killall --ns $$ named 2> /dev/null fi } |