summaryrefslogtreecommitdiff
path: root/databases/riak/files/patch-deps-node_package-priv-base-env.sh
diff options
context:
space:
mode:
authorBryan Drewery <bdrewery@FreeBSD.org>2013-09-27 12:04:42 +0000
committerBryan Drewery <bdrewery@FreeBSD.org>2013-09-27 12:04:42 +0000
commitcd964d768134df3fae4df7b47c74d84b21706cb4 (patch)
treedba6a07fd3533d02b822d1cc9db5bd411c306555 /databases/riak/files/patch-deps-node_package-priv-base-env.sh
parent- Fix FORCE_PKG_REGISTER with pkg_install with staging (diff)
- Add new port databases/riak
- Did not convert to staging as it fails to build when enabled currently Riak is a distributed database designed for maximum availability: so long as your client can reach one server, it should be able to write data. In most failure scenarios the data you want to read should be available, albeit possibly stale. WWW: http://basho.com/riak/ PR: ports/182317 Submitted by: Bartek Rutkowski <ports@robakdesign.com>
Diffstat (limited to 'databases/riak/files/patch-deps-node_package-priv-base-env.sh')
-rw-r--r--databases/riak/files/patch-deps-node_package-priv-base-env.sh27
1 files changed, 27 insertions, 0 deletions
diff --git a/databases/riak/files/patch-deps-node_package-priv-base-env.sh b/databases/riak/files/patch-deps-node_package-priv-base-env.sh
new file mode 100644
index 000000000000..63c53f3a6d78
--- /dev/null
+++ b/databases/riak/files/patch-deps-node_package-priv-base-env.sh
@@ -0,0 +1,27 @@
+--- deps/node_package/priv/base/env.sh.orig 2013-09-13 10:22:32.000000000 +0200
++++ deps/node_package/priv/base/env.sh 2013-09-13 10:27:16.000000000 +0200
+@@ -100,7 +100,7 @@
+ # read/write/delete .pid files during startup/shutdown
+ create_pid_dir() {
+ # Validate RUNNER_USER is set and they have permissions to write to /var/run
+- # Don't continue if we've already sudo'd to RUNNER_USER
++ # Don't continue if we've already su'd to RUNNER_USER
+ if ([ "$RUNNER_USER" ] && [ "x$WHOAMI" != "x$RUNNER_USER" ]); then
+ if [ -w $RUN_DIR ]; then
+ mkdir -p $PID_DIR
+@@ -161,12 +161,12 @@
+ # Validate that the user running the script is the owner of the
+ # RUN_DIR.
+ if ([ "$RUNNER_USER" ] && [ "x$WHOAMI" != "x$RUNNER_USER" ]); then
+- type sudo > /dev/null 2>&1
++ type su > /dev/null 2>&1
+ if [ "$?" -ne 0 ]; then
+- echoerr "sudo doesn't appear to be installed and your EUID isn't $RUNNER_USER" 1>&2
++ echoerr "su doesn't appear to be installed and your EUID isn't $RUNNER_USER" 1>&2
+ exit 1
+ fi
+- exec sudo -H -u $RUNNER_USER -i $RUNNER_SCRIPT_DIR/$RUNNER_SCRIPT $@
++ exec su - $RUNNER_USER -c "$RUNNER_SCRIPT_DIR/$RUNNER_SCRIPT $@"
+ fi
+ }
+