From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <9front-bounces@9front.inri.net> X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI autolearn=ham autolearn_force=no version=3.4.4 Received: from 9front.inri.net (9front.inri.net [168.235.81.73]) by inbox.vuxu.org (Postfix) with ESMTP id 66941266FB for ; Tue, 7 May 2024 10:30:47 +0200 (CEST) Received: from dpmailmta01.doteasy.com ([65.61.219.13]) by 9front; Tue May 7 04:29:35 -0400 2024 X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=192.168.101.81; Received: from dpmailrp01.doteasy.com (unverified [192.168.101.81]) by dpmailmta01.doteasy.com (DEO) with ESMTP id 134315180-1394429 for <9front@9front.org>; Tue, 07 May 2024 01:29:31 -0700 Received: from dpmail01.doteasy.com (dpmail01.doteasy.com [192.168.101.1]) by dpmailrp01.doteasy.com (8.15.2/8.15.2/Debian-8+deb9u1) with ESMTP id 4478TUmf003685 for <9front@9front.org>; Tue, 7 May 2024 01:29:30 -0700 X-SmarterMail-Authenticated-As: fde101@fjrhome.net Received: from [192.168.1.95] (pool-173-67-134-57.hrbgpa.fios.verizon.net [173.67.134.57]) by dpmail01.doteasy.com with SMTP (version=Tls12 cipher=Aes256 bits=256); Tue, 7 May 2024 01:29:12 -0700 Message-ID: Date: Tue, 7 May 2024 04:29:10 -0400 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird To: 9front@9front.org References: <4azdxd3t3x3whti6dlyfn75pl4wzodvs3gzsbu5t7xcnqmnuuc@kxfwuan7u5mw> Content-Language: en-US From: "Frank D. Engel, Jr." In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Exim-Id: d400a142-e52c-4c32-b4f7-052a522f36ad X-Bayes-Prob: 0.5 (Score 0, tokens from: base:default, @@RPTN) X-CanIt-Geo: No geolocation information available for 192.168.101.1 X-CanItPRO-Stream: base:default X-Canit-Stats-ID: 01ck8tuw5 - 9389f8892dd2 - 20240507 X-Scanned-By: CanIt (www . roaringpenguin . com) on 192.168.101.81 X-Originating-IP: 192.168.101.81 List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: replication core injection service Subject: Re: [9front] Enabling a service Reply-To: 9front@9front.org Precedence: bulk s/trailing/leading/ On 5/7/24 04:22, Rocky Hotas wrote: > On mag 06 19:00, ori@eigenstate.org wrote: >> % g listen /bin/cpurc >> /bin/cpurc:26: # usb listener >> /bin/cpurc:108: aux/listen -q -t /rc/bin/service.auth -d $serviced tcp >> /bin/cpurc:112: aux/listen -q -d $serviced tcp >> /bin/cpurc:122: # other /proc files, such as note, so let listen be killed >> >> the invocation on line 112 is what you're looking for. > Ok! I make a recap if it can be useful for any other having the same > issue. > > As in this example > > aux/listen -q -t /rc/bin/service.auth -d /rc/bin/service tcp > > from > > > > `$serviced' is (in my default 9front installation) /rc/bin/service. > > After some attempts, this worked for me: > > term% cd /rc/bin/service > term% mv !tcp7 tcp7 > term% aux/listen -q -d /rc/bin/service tcp > > This way, all the services represented by files whose names are in > the form `tcp' in /rc/bin/service are enabled. > Files whose names have a trailing `!' are excluded, instead. > > The contents of file tcp7 determines how the service will behave when > someone connects to it: in this case, > > term% cat tcp7 > #!/bin/rc > /bin/cat > > And the client will get an echo of anything is typed, due to `cat'. > > According to listen(8), the service directory (`/rc/bin/service' in my > example) is also periodically scanned for changes in the files. It gets > updated within seconds probably: so, after running `aux/listen -q > -d /rc/bin/service tcp', if the contents of the file `tcp' > or the filename itself are modified, the system will behave accordingly > without need for any other action. > > Thank you so much! > > Rocky >