diff options
author | Sebastian Schmelzer | 2010-09-02 17:50:49 +0200 |
---|---|---|
committer | Sebastian Schmelzer | 2010-09-02 17:50:49 +0200 |
commit | 416ab8a37f1b07dc9f6c0fb3ff1a8ff2036510b5 (patch) | |
tree | 4715f7d742fec50931017f38fe6ff0a89d4ceccc /initramfs/distro-specs/suse/functions-11.2 | |
parent | Fix for the problem reported on the list (sed filter forgotten for the (diff) | |
download | core-416ab8a37f1b07dc9f6c0fb3ff1a8ff2036510b5.tar.gz core-416ab8a37f1b07dc9f6c0fb3ff1a8ff2036510b5.tar.xz core-416ab8a37f1b07dc9f6c0fb3ff1a8ff2036510b5.zip |
change dir structure
Diffstat (limited to 'initramfs/distro-specs/suse/functions-11.2')
-rw-r--r-- | initramfs/distro-specs/suse/functions-11.2 | 95 |
1 files changed, 0 insertions, 95 deletions
diff --git a/initramfs/distro-specs/suse/functions-11.2 b/initramfs/distro-specs/suse/functions-11.2 deleted file mode 100644 index ae8008b9..00000000 --- a/initramfs/distro-specs/suse/functions-11.2 +++ /dev/null @@ -1,95 +0,0 @@ -# Copyright (c) 2010 - OpenSLX GmbH -# -# This program/file is free software distributed under the GPL version 2. -# See http://openslx.org/COPYING -# -# If you have any feedback please consult http://openslx.org/feedback and -# send your feedback to feedback@openslx.org -# -# General information about OpenSLX can be found under http://openslx.org -# -# configuration script for OpenSuSE 11.2 to configure linux stateless clients -# (included by init, hwautocfg, servconfig within InitialRamFS after -# inclusion of the main functions file). This file is the main base for the -# several SuSE distro versions - -# settings of central variables (formerly done via config-*, these variables -# are disputable ...) -# D_DIRINBINDMNT - lists of directories to be created in bind mounted rw -# part of the client filesystem -# D_RODIRSINRW - ReadOnly Directories in RW part of filesystem to save on -# TempFS usage -# D_DIRINDXS - directories in client filesystem which should be present -# anyhow - -# start portmapper (needed at least for nfs and nis services) -config_portmap () { -# portmap is provided via rpcbind in suse 11.1,2 -testmkd /mnt/var/lib/rpcbind -rllinker "rpcbind" 4 5 -} -# acpi and powersave daemons, required e.g. to shutdown the machine via -# power button, no need for early start -config_acpi () { -rllinker acpid 22 12 -# dbus is required to run acpid and powersaved -start_dreshal="yes" -} -# configure dbus (inter application communication for kde and gnome), hal -# (hardware abstraction layer - used e.g. by powersaved) -config_dreshal () { -local start=1 -local stop=10 -if [ "x$start_dreshal" = "xyes" ]; then - for dir in /var/lib/misc /var/run/ConsoleKit \ - "/var/run/PolicyKit polkituser:polkituser" \ - "/var/lib/PolicyKit polkituser:polkituser" \ - "/var/run/dbus/at_console/pool"; do - testmkd /mnt${dir} - done - # enable access to removable devices - sed -i /mnt/etc/PolicyKit/PolicyKit.conf \ - -e "s/\(<\/config>\)/ @@new@@\n\1/" \ - -e "s/@@new@@/<match action=\"@@action@@\">\n@@return@@\n <\/match>/" \ - -e "s/@@action@@/org.freedesktop.hal.storage.mount-removable/" \ - -e "s/@@return@@/ <return result=\"yes\"\/>/" - - if [ -f /mnt/etc/init.d/dbus ] ; then - strinfile "messagebus:" /mnt/etc/passwd || \ - echo "messagebus:x:102:103:User for D-BUS:/var/run/dbus:/bin/false" \ - >> /mnt/etc/passwd - strinfile "messagebus:" /mnt/etc/group || \ - echo "messagebus:!:103:" >> /mnt/etc/group - # create directories and set permissions with user and group id - testmkd /mnt/var/run/dbus messagebus:messagebus - testmkd /mnt/var/lib/dbus - # console-kit-daemon is often not started properly (why ever) - sed -i /mnt/etc/init.d/dbus \ - -e '/start_daemon -f $DBUS_D/a\ -\ \ \ \ \ \ \ \ start_daemon -f /usr/sbin/console-kit-daemon' - - rm -rf /mnt/etc/dbus-1/system.d/*etwork*anager.conf \ - /mnt/etc/dbus-1/system.d/nm-* \ - /mnt/etc/dbus-1/event.d/*NetworkManager* - - rllinker "dbus" $start $stop - fi - if [ -f /mnt/etc/init.d/haldaemon ] ; then - strinfile "haldaemon:" /mnt/etc/passwd || \ - echo "haldaemon:x:106:107:User for haldaemon:/var/run/hal:/bin/false" \ - >> /mnt/etc/passwd - strinfile "haldaemon:" /mnt/etc/group || \ - echo "haldaemon:!:107:" >> /mnt/etc/group - echo -n "" >/mnt/var/lib/misc/PolicyKit.reload - chmod a+x /mnt/var/lib/misc/PolicyKit.reload - # create directories and set permissions with user and group id - for dir in /var/run/hald /var/run/hald/hald-local \ - /var/run/hald/hald-runner /var/cache/hald; do - testmkd /mnt/${dir} haldaemon:haldaemon - done - start=$(($start + 1)) - stop=$(($stop - 1)) - rllinker "haldaemon" $start $stop - fi -fi -} |