#!/bin/sh
#
# barnyard         Start/Stop the snort log preprocessor daemon.
#
# chkconfig: 2345 45 60
# description:  snort is a lightweight network intrusion detection tool that \
#		currently detects more than 1100 host and network \
#		vulnerabilities, portscans, backdoors, and more.
# processname: barnyard
# config: /etc/snort/barnyard.conf
# pidfile: /var/run/barnyard.pid

# Do not load RH compatibility interface.
WITHOUT_RC_COMPAT=1

# Source function library.
. /etc/rc.d/init.d/functions

# Source the local configuration file
CONFIG=/etc/sysconfig/barnyard
SourceIfNotEmpty "$CONFIG" || exit 0

RETVAL=0

######################################
# Now to the real heart of the matter:

start()
{
    start_daemon --pidfile "$PIDFILE" --lockfile "$LOCKFILE" --expect-user root -- barnyard -D \
		 -c $CONF \
		 -d $LOGDIR \
		 -s $SID_MSG \
		 -g $GEN_MSG \
		 -f $LOGBASE \
		 -w $WALDO \
		 -p $CLASS_CONFIG \
		 -X "$PIDFILE"
    RETVAL=$?
    return $RETVAL
}

stop()
{
    stop_daemon --pidfile "$PIDFILE" --lockfile "$LOCKFILE" --expect-user root -- barnyard
    RETVAL=$?
    return $RETVAL
}

restart()
{
    stop
    start
}

# See how we were called.
case "$1" in
  start)
	start
	;;
  stop)
	stop
	;;
  reload|restart)
	restart
	;;
  condrestart)
        [ -e "$LOCKFILE" ] && restart
        ;;
  status)
	status --pidfile "$PIDFILE" --expect-user root barnyard
	RETVAL=$?
	;;
  *)
	echo "Usage: ${0##*/} {start|stop|reload|restart|condrestart|status}"
	RETVAL=1
esac

exit $RETVAL
