#! /bin/sh
# Copyright (c) 1996 - 2005 SuSE GmbH Nuernberg, Germany.  All rights reserved.
#
# Author: Florian La Roche <florian@suse.de>, 1996
#         Werner Fink <werner@suse.de>, 1996,98
#         Burchard Steinbild <bs@suse.de>, 1997
#         Thorsten Kukuk <kukuk@suse.de>, 2000,01
#
# /etc/init.d/gssd
#
### BEGIN INIT INFO
# Provides: gssd
# Required-Start: $network $remote_fs $named portmap
# Required-Stop: $network portmap
# Should-Start: ypbind krb5kdc
# Should-Stop:
# Default-Start: 3 5
# Default-Stop: 0 1 2 6
# Description: Start the RPC GSS security daemon
### END INIT INFO

. /etc/sysconfig/nfs

# Shell functions sourced from /etc/rc.status:
#      rc_check         check and set local and overall rc status
#      rc_status        check and set local and overall rc status
#      rc_status -v     ditto but be verbose in local rc status
#      rc_status -v -r  ditto and clear the local rc status
#      rc_failed        set local and overall rc status to failed
#      rc_failed <num>  set local and overall rc status to <num><num>
#      rc_reset         clear local rc status (overall remains)
#      rc_exit          exit appropriate to overall rc status
. /etc/rc.status

# First reset status of this service
rc_reset

# Return values acc. to LSB for all commands but status:
# 0 - success
# 1 - generic or unspecified error
# 2 - invalid or excess argument(s)
# 3 - unimplemented feature (e.g. "reload")
# 4 - insufficient privilege
# 5 - program is not installed
# 6 - program is not configured
# 7 - program is not running
# 
# Note that starting an already running service, stopping
# or restarting a not-running service as well as the restart
# with force-reload (in case signalling is not supported) are
# considered a success.

function mount_rpc_pipefs {

    # See if the file system is there yet
    case `stat -c "%t" -f /var/lib/nfs/rpc_pipefs` in
    *67596969*)
    	return 0;;
    esac

    echo -n " (mounting rpc_pipefs)"
    mount -t rpc_pipefs rpc_pipefs /var/lib/nfs/rpc_pipefs
}

case $NFS_SECURITY_GSS in
  [Nn]*)	flavors="";;
  [Yy]*)	flavors=krb5;;
  *)		flavors="$NFS_SECURITY_GSS";;
esac

case "$1" in
    start)
      echo -n "Starting RPC GSS security daemon"
      if [ -n "$flavors" ]; then
	echo -n " ($flavors)"
        for flavor in $flavors; do
	  /sbin/modprobe rpcsec_gss_$flavor
        done

	mount_rpc_pipefs
        /usr/sbin/rpc.gssd
        rc_status -v
      else
        rc_status -u
      fi
      ;;
    stop)
      if checkproc /usr/sbin/rpc.gssd; then
	echo -n "Shutting down RPC GSS security daemon"
        killproc -TERM /usr/sbin/rpc.gssd
	rc_status -v
      fi
      ;;
    try-restart)
      ## Stop the service and if this succeeds (i.e. the 
      ## service was running before), start it again.
      $0 status >/dev/null &&  $0 restart

      # Remember status and be quiet
      rc_status
      ;;
    restart)
      ## Stop the service and regardless of whether it was
      ## running or not, start it again.
      $0 stop
      $0 start

      # Remember status and be quiet
      rc_status
      ;;
    reload|force-reload)
      if checkproc /usr/sbin/rpc.gssd; then
        $0 restart
      fi
      ;;
    status)
      echo -n "Checking for RPC GSS security daemon: "
      ## Check status with checkproc(8), if process is running
      ## checkproc will return with exit status 0.

      # Status has a slightly different for the status command:
      # 0 - service running
      # 1 - service dead, but /var/run/  pid  file exists
      # 2 - service dead, but /var/lock/ lock file exists
      # 3 - service not running

      # NOTE: checkproc returns LSB compliant status values.
      checkproc /usr/sbin/rpc.gssd
      rc_status -v
      ;;
    *)
      echo "Usage: $0 {start|stop|status|try-restart|restart|force-reload|reload}"
      exit 1
      ;;
esac

rc_exit
