|
|
|
@ -180,7 +180,12 @@ start() { |
|
|
|
then |
|
|
|
echo "Loading module for in-kernel packet forwarding" |
|
|
|
rmmod xt_RTPENGINE 2> /dev/null |
|
|
|
modprobe xt_RTPENGINE |
|
|
|
if [[ -n "$RE_USER" ]] |
|
|
|
then |
|
|
|
modprobe xt_RTPENGINE set_proc_id=1 proc_uid=$(id $RE_USER -u) proc_gid=$(id $RE_USER -g) |
|
|
|
else |
|
|
|
modprobe xt_RTPENGINE |
|
|
|
fi |
|
|
|
temp=`firewall-cmd --state 2>/dev/null` |
|
|
|
if [[ $? == 0 ]] |
|
|
|
then |
|
|
|
@ -212,7 +217,12 @@ CUR_TABLE=$TABLE |
|
|
|
EOF |
|
|
|
fi |
|
|
|
echo -n $"Starting $prog: " |
|
|
|
daemon --pidfile=${pidfile} $rtpengine $OPTS |
|
|
|
if [[ -n "$RE_USER" ]] |
|
|
|
then |
|
|
|
daemon --user $RE_USER --pidfile=${pidfile} $rtpengine $OPTS |
|
|
|
else |
|
|
|
daemon --pidfile=${pidfile} $rtpengine $OPTS |
|
|
|
fi |
|
|
|
RETVAL=$? |
|
|
|
echo |
|
|
|
[ $RETVAL = 0 ] && touch ${lockfile} |
|
|
|
|