forked from adriansev/alicexrd
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathxrd.sh
executable file
·596 lines (487 loc) · 18 KB
/
xrd.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
#!/bin/bash
## execute the script NOT source
[[ "$0" == "bash" ]] && echo "Error: Please don't source me - just execute me!" && exit 1;
######################################
BOOTUP=color
RES_COL=60
MOVE_TO_COL="echo -en \\033[${RES_COL}G"
SETCOLOR_SUCCESS="echo -en \\033[1;32m"
SETCOLOR_FAILURE="echo -en \\033[1;31m"
SETCOLOR_WARNING="echo -en \\033[1;33m"
SETCOLOR_NORMAL="echo -en \\033[0;39m"
## checking prereqisites
[ ! -e "/usr/bin/dig" ] && { echo "dig command not found; do : yum -y install bind-utils.x86_64"; exit 1; }
[ ! -e "/usr/bin/wget" ] && { echo "wget command not found; do : yum -y install wget.x86_64"; exit 1; }
[ ! -e "/usr/bin/curl" ] && { echo "wget command not found; do : yum -y install wget.x86_64"; exit 1; }
# set arch for lib definition
[[ "`/bin/arch`" == "x86_64" ]] && export BITARCH=64
## find the location of xrd.sh script
SOURCE="${BASH_SOURCE[0]}"
# resolve $SOURCE until the file is no longer a symlink
#while [ -h "$SOURCE" ]; do
# XRDSHDIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
# SOURCE="$(readlink "$SOURCE")"
# # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located
# [[ $SOURCE != /* ]] && SOURCE="$DIR/$SOURCE"
#done
#XRDSHDIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
export XRDSHDIR=`dirname $SOURCE`
# make sure xrd.sh is executable by user and user group
chmod ug+x ${XRDSHDIR}/xrd.sh
# location of logs, admin, core dirs
XRDRUNDIR=${XRDRUNDIR:-$XRDSHDIR/run/}
export XRDRUNDIR
# location of configuration files; needs not be the same with xrd.sh location
XRDCONFDIR=${XRDCONFDIR:-$XRDSHDIR/xrootd.conf/}
export XRDCONFDIR
## LOCATIONS AND INFORMATIONS
export XRDCONF="$XRDCONFDIR/system.cnf"
source ${XRDCONF}
# ApMon files
export apmonPidFile=${XRDRUNDIR}/admin/apmon.pid
export apmonLogFile=${XRDRUNDIR}/logs/apmon.log
USER=${USER:-$LOGNAME}
[[ -z "$USER" ]] && USER=`id -nu`
SCRIPTUSER=$USER
## automatically asume that the owner of location of xrd.sh is XRDUSER
XRDUSER=`stat -c %U $XRDSHDIR`
## if xrd.sh is started by root get the home of the designated xrd user
if [[ "$USER" == "root" ]]; then
USER=$XRDUSER
XRDHOME=`su $XRDUSER -c "/bin/echo \\\$HOME"`
cd "$XRDHOME"
if [ $? -eq 0 ]; then
echo -n ""
else
echo Fatal: user '$XRDUSER' does not exist - check your system.conf - abort
exit
fi
else
XRDHOME=$HOME
fi
########## FUNCTIONS #############
echo_success() {
[ "$BOOTUP" = "color" ] && $MOVE_TO_COL
echo -n "[ "
[ "$BOOTUP" = "color" ] && $SETCOLOR_SUCCESS
echo -n $"OK"
[ "$BOOTUP" = "color" ] && $SETCOLOR_NORMAL
echo -n " ]"
echo -ne "\r"
return 0
}
######################################
echo_failure() {
[ "$BOOTUP" = "color" ] && $MOVE_TO_COL
echo -n "[ "
[ "$BOOTUP" = "color" ] && $SETCOLOR_FAILURE
echo -n $"DOWN"
[ "$BOOTUP" = "color" ] && $SETCOLOR_NORMAL
echo -n " ]"
echo -ne "\r"
return 0
}
######################################
echo_passed() {
[ "$BOOTUP" = "color" ] && $MOVE_TO_COL
echo -n "["
[ "$BOOTUP" = "color" ] && $SETCOLOR_WARNING
echo -n $"PASSED"
[ "$BOOTUP" = "color" ] && $SETCOLOR_NORMAL
echo -n "]"
echo -ne "\r"
return 1
}
######################################
startUp() {
if [[ "$SCRIPTUSER" == "root" ]]; then
cd "$XRDSHDIR"
su -s /bin/bash $XRDUSER -c "${EXECENV} $*";
echo_passed
# test $? -eq 0 && echo_success || echo_failure
echo
else
ulimit -c unlimited
$*
echo_passed
# test $? -eq 0 && echo_success || echo_failure
echo
fi
}
######################################
createconf_pre() {
## Find information about site from ML
export MONALISA_HOST_INFO=`host $(curl -s http://alimonitor.cern.ch/services/getClosestSite.jsp?ml_ip=true | awk -F, '{print $1}')`
export MONALISA_HOST=`echo $MONALISA_HOST_INFO | awk '{ print substr ($NF,1,length($NF)-1);}'`
local TMP_SITEINFO; TMP_SITEINFO="/tmp/site_info.txt"
wget -q http://alimonitor.cern.ch/services/se.jsp?se=${SE_NAME} -O $TMP_SITEINFO
export MANAGERHOST=`grep seioDaemons $TMP_SITEINFO | awk -F": " '{ gsub ("root://","",$2);gsub (":1094","",$2) ; print $2 }'`
export LOCALPATHPFX=`grep seStoragePath $TMP_SITEINFO | awk -F": " '{ print $2 }'`
rm -f ${TMP_SITEINFO}
## what is my hostname
[[ -z "$myhost" ]] && myhost=`hostname -f`
[[ -z "$myhost" ]] && myhost=`hostname`
[[ -z "$myhost" ]] && myhost=$HOST
[[ -z "$myhost" ]] && echo "Cannot determine hostname. Aborting." && exit 1
echo "The fully qualified hostname appears to be $myhost"
## Network information and validity checking
MYIP=`dig @ns1.google.com -t txt o-o.myaddr.l.google.com +short | sed 's/\"//g' | awk -F, '{print $1}'`
ip_list=`/sbin/ip addr show scope global permanent up | grep inet | awk '{ split ($2,ip,"/"); print ip[1]}'`
found_at=`expr index "$ip_list" "$MYIP"`
[[ "$found_at" == "0" ]] && { echo "Server without public/rutable ip. No NAT schema supported at this moment" && exit 10; }
reverse=`host $MYIP | awk '{ print substr ($NF,1,length($NF)-1);}'`
[[ "$myhost" != "$reverse" ]] && { echo "detected hostname $myhost does not corespond to reverse dns name $reverse" && exit 10; }
#echo "host = "$myhost
#echo "reverse = "$reverse
## What i am?
# default role - server
role="server"; server="yes"; nproc=1;
# unless i am manager
if [[ "x$myhost" == "x$MANAGERHOST" ]]; then
role="manager";
manager="yes";
server="";
if [[ "x$SERVERONREDIRECTOR" = "x1" ]]; then # i am am both add server role
role="all";
server="yes";
nproc=2;
fi
fi
export role
export manager
export server
export nproc
}
createconf () {
createconf_pre
###################
export osscachetmp=`echo -e $OSSCACHE`;
# Replace XRDSHDIR for service starting
cd ${XRDSHDIR}
cp -f alicexrdservices.tmp alicexrdservices;
perl -pi -e 's/XRDSHDIR/$ENV{XRDSHDIR}/g;' ${XRDSHDIR}/alicexrdservices;
cd ${XRDCONFDIR}
for name in `find . -type f | grep ".tmp"`; do
newname=`echo $name | sed s/\.tmp// `;
cp -f $name $newname;
# Set xrootd site name
perl -pi -e 's/SITENAME/$ENV{SE_NAME}/g;' ${XRDCONFDIR}/$newname;
# Replace XRDSHDIR and XRDRUNDIR
perl -pi -e 's/XRDSHDIR/$ENV{XRDSHDIR}/g; s/XRDRUNDIR/$ENV{XRDRUNDIR}/g;' ${XRDCONFDIR}/$newname;
# Substitute all the variables into the templates
perl -pi -e 's/BITARCH/$ENV{BITARCH}/g; s/LOCALPATHPFX/$ENV{LOCALPATHPFX}/g; s/LOCALROOT/$ENV{LOCALROOT}/g; s/XRDUSER/$ENV{XRDUSER}/g; s/MANAGERHOST/$ENV{MANAGERHOST}/g; s/XRDSERVERPORT/$ENV{XRDSERVERPORT}/g; s/XRDMANAGERPORT/$ENV{XRDMANAGERPORT}/g; s/CMSDSERVERPORT/$ENV{CMSDSERVERPORT}/g; s/CMSDMANAGERPORT/$ENV{CMSDMANAGERPORT}/g; s/SERVERONREDIRECTOR/$ENV{SERVERONREDIRECTOR}/g;' ${XRDCONFDIR}/$newname;
# write storage partitions
perl -pi -e 's/OSSCACHE/$ENV{osscachetmp}/g;' ${XRDCONFDIR}/$newname;
# if [ -n "$OSSCACHE" ] ; then
# echo -e "\n\n\n${OSSCACHE}\n\n\n" >> ${XRDCONFDIR}/$newname
# fi
# Monalisa stuff which has to be commented out in some cases
if [[ -n "$MONALISA_HOST" ]] ; then
perl -pi -e 's/MONALISA_HOST/$ENV{MONALISA_HOST}/g' ${XRDCONFDIR}/$newname
else
perl -pi -e 's/(.*MONALISA_HOST.*)/#\1/g' ${XRDCONFDIR}/$newname
fi
# XrdAcc stuff which has to be commented out in some cases
if [[ -n "$ACCLIB" ]] ; then
perl -pi -e 's/ACCLIB/$ENV{ACCLIB}/g' ${XRDCONFDIR}/$newname
else
perl -pi -e 's/(.*ACCLIB.*)/#\1/g; s/(.*ofs\.authorize.*)/#\1/g' ${XRDCONFDIR}/$newname
fi
# Xrdn2n stuff which has to be commented out in some cases
if [[ -z "$LOCALPATHPFX" ]] ; then
perl -pi -e 's/(.*oss\.namelib.*)/#\1/g' ${XRDCONFDIR}/$newname
fi
done;
#add variable definitions to cron job; crontab.xrootd already created above, so no modifications on crontab.xrootd.tmp
cd $XRDCONFDIR
( /bin/echo -e "\nXRDCONFDIR=${XRDCONFDIR} \nXRDRUNDIR=${XRDRUNDIR}\n" && cat crontab.xrootd ) > crontab.xrootd2
mv -f crontab.xrootd2 crontab.xrootd
if [[ ${SYSTEM} == "XROOTD" ]]; then
unlink ${XRDCONFDIR}/server/xrootd.cf >&/dev/null ; ln -s ${XRDCONFDIR}/server/xrootd.xrootd.cf ${XRDCONFDIR}/server/xrootd.cf;
unlink ${XRDCONFDIR}/manager/xrootd.cf >&/dev/null ; ln -s ${XRDCONFDIR}/manager/xrootd.xrootd.cf ${XRDCONFDIR}/manager/xrootd.cf;
elif [[ ${SYSTEM} == "DPM" ]]; then
unlink ${XRDCONFDIR}/server/xrootd.cf >&/dev/null ; ln -s ${XRDCONFDIR}/server/xrootd.dpm.cf ${XRDCONFDIR}/server/xrootd.cf;
unlink ${XRDCONFDIR}/manager/xrootd.cf >&/dev/null ; ln -s ${XRDCONFDIR}/manager/xrootd.dpm.cf ${XRDCONFDIR}/manager/xrootd.cf;
if [[ -z "$DPM_HOST" ]]; then
echo -e "\n\n##########################################################################\nWarning: you should define DPM_HOST in the environment of user $USER if you want to run with DPM!!!\n##########################################################################\n";
fi
fi;
rm -f `find ${XRDCONFDIR}/ -name "*.template"`
cd -;
}
## create TkAuthz.Authorization file; take as argument the place where are the public keys
create_tkauthz() {
local PRIV_KEY_DIR; PRIV_KEY_DIR=$1
echo "KEY VO:* PRIVKEY:${PRIV_KEY_DIR}/privkey.pem PUBKEY:${PRIV_KEY_DIR}/pubkey.pem" > ${PRIV_KEY_DIR}/TkAuthz.Authorization
chmod 600 ${PRIV_KEY_DIR}/TkAuthz.Authorization
#########################################
# the root of the exported namespace you allow to export on your disk servers
# just add all directories you want to allow
# this is only taken into account if you use the TokenAuthzOfs OFS
# Of course, the localroot prefix here should be omitted
# If the cluster is (correctly!) configured with the right
# localroot option, allowing / is just fine and 100% secure. That should be
# considered normal.
echo 'EXPORT PATH:/ VO:* ACCESS:ALLOW CERT:*' >> ${PRIV_KEY_DIR}/TkAuthz.Authorization
# rules, which define which paths need authorization; leave it like that, that is safe
echo 'RULE PATH:/ AUTHZ:delete|write|write-once| NOAUTHZ:read| VO:*| CERT:*' >> ${PRIV_KEY_DIR}/TkAuthz.Authorization
}
######################################
checkkeys() {
KEYS_REPO="http://alitorrent.cern.ch/src/xrd3/keys/"
authz_dir1="/etc/grid-security/xrootd/"
authz_dir2="${XRDHOME}/.globus/xrootd/"
authz_dir3="${XRDHOME}/.authz/xrootd/"
authz_dir=${authz_dir3} # default dir
if [[ -n "$ACCLIB" ]]; then
installkeys=yes ## default action is installing keys in default dir
for dir in ${authz_dir1} ${authz_dir2} ${authz_dir3}; do ## unless keys are found in locations searched by xrootd
[[ -e ${dir}/privkey.pem && -e ${dir}/pubkey.pem ]] && installkeys=no && break
done
if [[ "$installkeys" == "yes" ]]; then
[[ `id -u` == "0" ]] && authz_dir=${authz_dir1}
mkdir -p ${authz_dir}
echo "Getting Keys and bootstrapping ${authz_dir}/TkAuthz.Authorization ..."
cd ${authz_dir}
curl -fsSL -O ${KEYS_REPO}/pubkey.pem -O ${KEYS_REPO}/privkey.pem
chmod 400 ${authz_dir}/privkey.pem ${authz_dir}/pubkey.pem
create_tkauthz ${authz_dir}
chown -R $XRDUSER $XRDHOME/.authz
fi
cd ~
fi
}
######################################
addcron() {
rndname="/tmp/cron.$RANDOM.xrd.sh";
crontab -l | grep -v "xrd.sh" | grep -v "\#" > $rndname;
cat $XRDCONFDIR/crontab.xrootd >> $rndname;
crontab $rndname;
# crontab -l
rm -f $rndname;
}
######################################
removecron() {
rndname="/tmp/cron.$RANDOM.xrd.sh";
crontab -l | grep -v "xrd\.sh" | grep -v "\#|" | grep -v XRDCONF | grep -v XRDRUN > $rndname;
tabcontent=`cat $rndname`;
if [ x"$tabcontent" = x ]; then
crontab -r
else
crontab $rndname;
rm -f $rndname;
fi
}
######################################
bootstrap() {
createconf
mkdir -p ${LOCALROOT}/${LOCALPATHPFX}
[[ "${role}" == "server" ]] && chown $XRDUSER ${LOCALROOT}/${LOCALPATHPFX}
}
######################################
getSrvToMon() {
srvToMon=""
[[ -n "${SE_NAME}" ]] && se="${SE_NAME}_"
for typ in manager server ; do
for srv in xrootd cmsd ; do
pid=`pgrep -f -U $USER "$srv .*$typ" | head -1`
[[ -n "${pid}" ]] && srvToMon="$srvToMon ${se}${typ}_${srv} $pid"
done
done
}
######################################
servMon() {
[[ -n "${SE_NAME}" ]] && se="${SE_NAME}_"
startUp /usr/sbin/servMon.sh -p ${apmonPidFile} ${se}xrootd $*
echo
}
######################################
startMon() {
[[ -z "${MONALISA_HOST}" ]] && return
getSrvToMon
echo -n "Starting ApMon [$srvToMon] ..."
servMon -f $srvToMon
echo_passed
echo
}
######################################
killXRD() {
echo -n "Stopping xrootd/cmsd: "
pkill -u $USER xrootd
pkill -u $USER cmsd
sleep 1
pkill -9 -u $USER xrootd
pkill -9 -u $USER cmsd
pkill -f -u $USER XrdOlbMonPerf
pkill -f -u $USER mpxstats
echo_passed;
echo
echo -n "Stopping ApMon:"
servMon -k
}
######################################
execEnvironment() {
mkdir -p ${XRDRUNDIR}/logs/
mkdir -p ${XRDRUNDIR}/core/${USER}_$1
mkdir -p ${XRDRUNDIR}/admin/
cd ${XRDRUNDIR}/core/${USER}_$1
# if [ $USER = "root" ]; then
# EXECENV="ulimit -n ${XRDMAXFD};ulimit -c unlimited;"
# else
# EXECENV="ulimit -c unlimited;"
# fi
EXECENV="ulimit -c unlimited;"
ulimit -n ${XRDMAXFD}
fdmax=`ulimit -n`
if [ "$fdmax" -lt "65000" ] ; then
echo "Fatal: This machine does not allow more than $fdmax file descriptors. At least 65000 are needed for serious operation - abort"
exit -1
fi
chown -R $XRDUSER ${XRDRUNDIR}/core ${XRDRUNDIR}/logs ${XRDRUNDIR}/admin
chmod -R 755 ${XRDRUNDIR}/core ${XRDRUNDIR}/logs ${XRDRUNDIR}/admin
}
######################################
handlelogs() {
cd ${XRDRUNDIR}
LOCK=${XRDRUNDIR}/logs/HANDLELOGS.lock
mkdir -p ${XRDRUNDIR}/logsbackup
todaynow=`date +%Y%m%d`
cd ${XRDRUNDIR}/logs
not_compressed=`find . -type f -not -name '*.bz2' -not -name 'stage_log' -not -name 'cmslog' -not -name 'xrdlog' -not -name 'pstg_log' -not -name 'xrd.watchdog.log' -not -name 'apmon.log' -not -name 'servMon.log' -print`
if [[ ! -f $LOCK ]]; then
touch $LOCK
for log in $not_compressed; do bzip2 -9fq $log; done
fi
rm -f $LOCK
# move compressed to logs backup
mv -f ${XRDRUNDIR}/logs/*/*.bz2 ${XRDRUNDIR}/logsbackup/ &> /dev/null
}
######################################
restartXRD() {
echo restartXRD
killXRD
if [[ "$manager" == "yes" ]]; then
(
execEnvironment manager || exit
echo -n "Starting xrootd [manager]: "
startUp /usr/bin/xrootd -n manager -b $XRDDEBUG -l ${XRDRUNDIR}/logs/xrdlog -c ${XRDCONFDIR}/manager/xrootd.cf -s ${XRDRUNDIR}/admin/xrd_mgr.pid
echo -n "Starting cmsd [manager]: "
startUp /usr/bin/cmsd -n manager -b $XRDDEBUG -l ${XRDRUNDIR}/logs/cmslog -c ${XRDCONFDIR}/manager/xrootd.cf -s ${XRDRUNDIR}/admin/cmsd_mgr.pid
)
fi
if [[ "$server" == "yes" ]]; then
(
execEnvironment server || exit
echo -n "Starting xrootd [server]: "
startUp /usr/bin/xrootd -n server -b $XRDDEBUG -l ${XRDRUNDIR}/logs/xrdlog -c ${XRDCONFDIR}/server/xrootd.cf -s ${XRDRUNDIR}/admin/xrd_svr.pid
echo -n "Starting cmsd [server]: "
startUp /usr/bin/cmsd -n server -b $XRDDEBUG -l ${XRDRUNDIR}/logs/cmslog -c ${XRDCONFDIR}/server/xrootd.cf -s ${XRDRUNDIR}/admin/cmsd_svr.pid
)
fi
startMon
sleep 1 ## need delay for starMon
}
######################################
checkstate()
{
echo "******************************************"
date
echo "******************************************"
nxrd=`pgrep -u $USER xrootd | wc -l`;
ncms=`pgrep -u $USER cmsd | wc -l`;
returnval=0
if [ "$nxrd" -eq "$nproc" ]; then
echo -n "xrootd:";
echo_success;
echo
else
echo -n "xrootd:";
echo_failure;
echo
returnval=1;
fi
if [ "$ncms" -eq "$nproc" ] ; then
echo -n "cmsd :";
echo_success;
echo
else
echo -n "cmsd :";
echo_failure;
echo
returnval=1;
fi
if [[ -n "${MONALISA_HOST}" ]] ; then
lines=`find ${apmonPidFile}* 2>/dev/null | wc -l`
if [ "$lines" -gt 0 ] ; then
echo -n "apmon:";
echo_success;
echo
else
echo -n "apmon:";
echo_failure;
echo
returnval=1;
fi
fi
exit $returnval
}
######################
## Main logic ##
######################
if [[ "x$1" = "x-s" ]]; then ## checkstate
createconf_pre
checkstate
elif [[ "x$1" = "x-c" ]]; then ## check and restart if not running
removecron
checkkeys
bootstrap
addcron
## check the number of xrootd and cmsd processes
nxrd=`pgrep -u $USER xrootd | wc -l`;
ncms=`pgrep -u $USER cmsd | wc -l`;
## if their number is lower than it should (number given by the roles)
if [ "$nxrd" -lt "$nproc" ] || [ "$ncms" -lt "$nproc" ] ; then
date
echo "------------------------------------------"
ps
echo "------------------------------------------"
echo "Starting all .... (only $nxrd xrootds $ncms cmsds)"
restartXRD
echo "------------------------------------------"
fi
## we start servMon anyway
[[ -n "$MONALISA_HOST" ]] && servMon
handlelogs
checkstate
elif [[ "$1" == "-f" ]]; then ## force restart
removecron
checkkeys
bootstrap
addcron
date
echo "(Re-)Starting ...."
restartXRD
## we start servMon anyway
[[ -n "$MONALISA_HOST" ]] && servMon
checkstate
elif [[ "$1" == "-k" ]]; then ## kill running processes
removecron
killXRD
checkstate
elif [[ "$1" == "-logs" ]]; then ## handlelogs
handlelogs
elif [[ "$1" == "-conf" ]]; then ## create configuration
createconf
elif [[ "$1" == "-getkeys" ]]; then ## download keys and create TkAuthz.Authorization file
checkkeys
else
echo "usage: xrd.sh arg";
echo "where argument is _one_ of :"
echo " [-f] force restart";
echo " [-s] check state";
echo " [-c] check and restart if not running";
echo " [-k] kill running processes";
echo " [-logs] manage the logs";
echo " [-conf] just (re)create configuration";
echo " [-getkeys] just get keys";
fi