Gentoo Archives: gentoo-dev

From: Blake Watters <sbw@×××××××××××.edu>
To: gentoo-dev@g.o
Subject: Re: [gentoo-dev] questions about /var/run and pids
Date: Thu, 05 Sep 2002 14:16:57
Message-Id: 20020905151659.088a47bd.sbw@metalab.unc.edu
In Reply to: [gentoo-dev] questions about /var/run and pids by Dominik Westner
1 It seems that you should also be able to create a subdirectory in /var/run for your program from the ebuild, chown it, and then let the daemon write to the directory directly if you really need to.
2
3 Blake
4 On Thu, 5 Sep 2002 08:52:28 +0200
5 Dominik Westner <lists@×××××××××××.com> wrote:
6
7 > Hi all,
8 >
9 > when creating some ebuilds I quite often run into the following problem:
10 >
11 > I have a daemon program which should run under a specific user.
12 > Additionally I think a good daemon should always write their pid in
13 > /var/run.
14 >
15 > Problem: /var/run is only writable by root. Therefore only daemons
16 > which run as root can put their pid into /var/run.
17 >
18 > I think a better approach would be to have /var/run owned and being
19 > writeable by group 'daemon'.
20 > Every daemon program could then belong to the daemon group and write
21 > its pid into /var/run.
22 >
23 > Or do I simply miss something?
24 >
25 > Dominik
26 >
27 > _______________________________________________
28 > gentoo-dev mailing list
29 > gentoo-dev@g.o
30 > http://lists.gentoo.org/mailman/listinfo/gentoo-dev
31
32
33 --
34 Blake Watters
35 Office: (919) 962-5646
36 Cell: (919) 260-3783
37 AIM: initgraf
38
39 -----BEGIN PGP PUBLIC KEY BLOCK-----
40 Version: GnuPG v1.0.7 (GNU/Linux)
41
42 mQGiBD0siXQRBADkwqy31wquBdOptwwaXSCUxDhk2fOw5iLb0SkW8J4GOAZSqaOb
43 VE9wFIThHH39GMD6n7yu+NZ2sxSvHCQQYHu1ggPmtV+5xAEuzEQB+Zy8i3wqRUed
44 rPZWAsMkV89j8vcJ6Mx6p/pqQHYMiVlnDhUwA4XutxypeLF9rlVtTUCTrwCgtDXV
45 MmH050etIWonhn+UYWhgWY8EANshBhzNrwCG7irDf8gSYPsMdW0ooGq218jTdKUl
46 Ny7mnVZ2OhuQjte/aRrYIxP/4G7BEoSeI6p3t4L5LFDKelUB5Tn4JTDmZCGigFGD
47 fLmma36uDrq+c4TXpKHbBc8wFRILqJja154I4UrAbHSNYdu4EZk+KBt+iHe7Z/LE
48 KI7UBAC39WMm+edHhyxF6wwEmlZYqrwDFoEKo3J6CR+2lcw1qUgvuiL/5aNMtoOo
49 5tJdeR0QK+LTOUgFVQqZ2qp+/oSGZ0YBwTqBPxm7t+5PUGrATr5Dq5yEz3We1uch
50 wxzAiYRelQEaB7yP1UZg1/Yesqr7HsAz9KoLOogYl7vQPgW0mbQ5Qmxha2UgV2F0
51 dGVycyAoaUJpYmxpbyBXb3Jrc3RhdGlvbikgPHNid0BtZXRhbGFiLnVuYy5lZHU+
52 iFkEExECABkFAj0siXQECwcDAgMVAgMDFgIBAh4BAheAAAoJEIRMqbXn8Y4JLAsA
53 oKwikeHYK5548OBlPkS327AhW0pWAJ414fJ9evHsU35LxQNvv7zC7iL2vrkBDQQ9
54 LIl2EAQAjp8PVuYy336gpEtS3zMcGvHFGzZmQIM/NLsXfOpzFsRwG9Kw9cGsu6H3
55 DfC+Mv8uBdRRS8/a50mZpmrTkp8xJKgQFL6xkdE+Y3HmUsgmAQ8XXmbbZ0VTZH+z
56 ZCdmkHTy6/fyTLzTShDC1dADp8XRfLb+a/eE1oRuwkzC85AnInMAAwUD/ig02s7z
57 inXR0cQ2Fj7szXXTI0t77gmpSMTzImaDEYbMfi+ab8B/Wy0kCqZR+pfoNxibILkf
58 DSEjsq8D9ZnPLu/c134+r+480HCR/d02PXt0bdIjAGBc2v20O/KFYiOLlnsB9+w7
59 Bbi+T74t3t9ch+yoOPaKgoEC/5VNHrnLOCDHiEYEGBECAAYFAj0siXYACgkQhEyp
60 tefxjglPxQCcDJ908Vtm8JfK9TD5ZeyRZvxYsAcAoIKsKJ0W4QW1+GVIndf3jmfI
61 V1/d
62 =tYnY
63 -----END PGP PUBLIC KEY BLOCK-----