- # start new packages
- /etc/init.d/amavisd-cn restart
-}
-
-# handle freerdius upgrade
-upgrade_freeradius () {
- local password
-
- pkg freeradius-aai lt 2.1.12~srce1 || return 0
-
- # aai team prevents a normal upgrade
- cp -av /etc/freeradius /etc/freeradius.$backup_ext
- pkgrm freeradius-aai freeradius-ldap freeradius
- rm -rf /etc/freeradius/certs
- pkgadd freeradius-aai
-
- # sync localhost passwords
- if pkg libpam-radius-auth && [ -f "/etc/pam_radius_auth.conf" ]; then
- pkgadd libpam-radius-auth
- password=$(
- sed -n '/^[[:space:]]*client[[:space:]]\+localhost/,/^[[:space:]]*}/ { /^[[:space:]]*secret[[:space:]]*=[[:space:]]*\([^[:space:]]*\)/s//\1/p }' /etc/freeradius/clients.conf
- )
- if [ "$password" ] \
- && ! grep -q "^127.0.0.1\(:[[:digit:]]\+\)\?[[:space:]]\+$password[[:space:]]\+" \
- /etc/pam_radius_auth.conf
- then
- sed -i.$backup_ext "s/^\(127.0.0.1\(:[[:digit:]]\+\)\?[[:space:]]\+\)[^[:space:]]\+\(.*\)/\1$password\3/" /etc/pam_radius_auth.conf
+ # workaround for insserv complaining
+ if [ -x /sbin/insserv ]; then
+ if [ -r /etc/init.d/amavis.amavisd-new ]; then
+ /sbin/insserv amavis.amavisd-new