diff options
author | Mantas Mikulėnas | 2022-09-12 07:26:43 +0300 |
---|---|---|
committer | Mantas Mikulėnas | 2022-09-12 07:28:49 +0300 |
commit | 0e970db4d1986f3af0a3dfcd874d2afb648052d3 (patch) | |
tree | e9de57fadb4ac85dafeb4d3a0e4a9c50fa09167c | |
parent | 291fe7a58a33e9d5019a25573e3acbaee5213ca1 (diff) | |
download | aur-0e970db4d1986f3af0a3dfcd874d2afb648052d3.tar.gz |
always restart on SIGALRM
k5start uses SIGALRM internally, so a common hack is to send it one from
the outside (via `pkill -ALRM k5start` from NetworkManager, for example)
to force renewals. However, sometimes that occurs when k5start *doesn't*
have its SIGALRM handler set up, so the result is that the service just
crashes. (It's not a good hack.)
-rw-r--r-- | .SRCINFO | 6 | ||||
-rw-r--r-- | PKGBUILD | 6 | ||||
-rw-r--r-- | krenew.service | 1 | ||||
-rw-r--r-- | kstart.service | 2 |
4 files changed, 9 insertions, 6 deletions
@@ -1,7 +1,7 @@ pkgbase = kstart pkgdesc = Kerberos kinit supporting AFS and ticket refreshing pkgver = 4.3 - pkgrel = 7 + pkgrel = 8 url = https://www.eyrie.org/~eagle/software/kstart/ arch = i686 arch = x86_64 @@ -15,8 +15,8 @@ pkgbase = kstart validpgpkeys = E784364E8DDE7BB370FBD9EAD15D313882004173 sha256sums = 9527702a48789084e314e5c08d4115129467ca7ef25983d7214c9439d31ef2a6 sha256sums = SKIP - sha256sums = a496742d7cb2f00e8714d2b36da6adc09efd8a62e4892572b69b458b6e790a4e - sha256sums = 2730d02cc606c3019540fa907696bfa20b375ff3e1fb273cdb80c7c480b9081b + sha256sums = 8cfb9591164038d05f37e52d95236969992b8ca7c74c4cfe59617119f96b3efd + sha256sums = df137ddc008f547aef9593e467d423f138030be545f74df034a74bbd97fbfc69 sha256sums = 514010cea54d80d1d41fe1885dbdd49225e52192be466e88979f91bac37c8022 pkgname = kstart @@ -1,7 +1,7 @@ # Maintainer: Mantas Mikulėnas <grawity@gmail.com> pkgname=kstart pkgver=4.3 -pkgrel=7 +pkgrel=8 pkgdesc="Kerberos kinit supporting AFS and ticket refreshing" arch=(i686 x86_64) url="https://www.eyrie.org/~eagle/software/kstart/" @@ -14,8 +14,8 @@ source=("https://archives.eyrie.org/software/kerberos/$pkgname-$pkgver.tar.gz" "nm-dispatcher.sh") sha256sums=('9527702a48789084e314e5c08d4115129467ca7ef25983d7214c9439d31ef2a6' 'SKIP' - 'a496742d7cb2f00e8714d2b36da6adc09efd8a62e4892572b69b458b6e790a4e' - '2730d02cc606c3019540fa907696bfa20b375ff3e1fb273cdb80c7c480b9081b' + '8cfb9591164038d05f37e52d95236969992b8ca7c74c4cfe59617119f96b3efd' + 'df137ddc008f547aef9593e467d423f138030be545f74df034a74bbd97fbfc69' '514010cea54d80d1d41fe1885dbdd49225e52192be466e88979f91bac37c8022') validpgpkeys=('E784364E8DDE7BB370FBD9EAD15D313882004173') diff --git a/krenew.service b/krenew.service index 83f14f02e5f0..342088a3eed1 100644 --- a/krenew.service +++ b/krenew.service @@ -14,6 +14,7 @@ ExecStart=/usr/bin/krenew -K30 -a -H30 -i -t -b -L # -v Be verbose ExecReload=/bin/kill -s ALRM $MAINPID StandardOutput=null +RestartForceExitStatus=SIGALRM # Program that will be run after every successful renewal. # (Defaults to /usr/bin/aklog, which is the OpenAFS token acquisition tool.) diff --git a/kstart.service b/kstart.service index a5c2ffd4b0a7..a7e4e725bd58 100644 --- a/kstart.service +++ b/kstart.service @@ -15,6 +15,8 @@ ExecStart=/usr/bin/k5start -K30 -a -H30 -f $KEYTAB -U -t -b -L # -v Be verbose ExecReload=/bin/kill -s ALRM $MAINPID StandardOutput=null +Restart=on-failure +RestartForceExitStatus=SIGALRM # Keytab to use for acquiring credentials when none are available. # (Mandatory; use krenew.service if you don't want this functionality.) |