(Ab)using rcng's features to keep rc.d-style services running
should they fail.
doconnor at gsoft.com.au
Wed Oct 7 02:53:25 UTC 2009
On Wed, 7 Oct 2009, Xin LI wrote:
> Wesley Shields wrote:
> > On Sun, Oct 04, 2009 at 12:30:55PM -0700, Doug Barton wrote:
> >> Alex Trull wrote:
> >>> Hi all,
> >>> I realised that because portupgrade/portmaster don't always
> >>> cleanly restart processes that have died due to being
> >>> upgraded (mysqld, often!) that this was something I wanted
> >>> to fix.
> >> I can't speak to portupgrade, however for portmaster there is no
> >> such facility whatsoever. The admin is expected to disable things
> >> prior to an upgrade and re-enable them when the upgrade is done. I
> >> don't feel that this is an overwhelming burden. :)
> > There is the @stopdaemon directive in plists (which gets translated
> > into @unexec to forcestop the script). Some ports use it and some
> > do not. Personally I think ports doing this automatically are quite
> > annoying, and would love to rip them all out from the ports.
> > Something like portmaster growing support for it would be welcome
> > provided it does not happen by default.
> I think this feature should be user-controllable (or, the 'make
> install' should be 'restart'ing the rc.d script at very least).
It won't actually start anything you haven't enabled in rc.conf though
since all ports install rc.d scripts which require FOO_enable to be
That said a knob like RESTART_SERVICES or similar would be nice.
Daniel O'Connor software and network engineer
for Genesis Software - http://www.gsoft.com.au
"The nice thing about standards is that there
are so many of them to choose from."
-- Andrew Tanenbaum
GPG Fingerprint - 5596 B766 97C0 0E94 4347 295E E593 DC20 7B3F CE8C
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 188 bytes
Desc: This is a digitally signed message part.
Url : http://lists.freebsd.org/pipermail/freebsd-hackers/attachments/20091007/84111f61/attachment.pgp
More information about the freebsd-hackers