Solved

Installing a cvs server (pserver) on Red Hat 7.3

Posted on 2002-07-11
4
237 Views
Last Modified: 2013-12-15
Does anyone know of a HOWTO for installing CVS on RH 7.3.

I tried to follow this one, but I'm having a hard time making the pserver a service and starting it.

http://www.taursys.com/howto/cvs/

Thanks,

Matt
0
Comment
Question by:mraible
  • 2
  • 2
4 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7148667
if you successfully completed step2 1-7, you should be able to login and checkout.
Other steps described are only necessary if you want to use cvs' private passwd file (which must be configured in the cvs config files in CVSROOT).

What's going wrong? please post commands and results.
0
 
LVL 1

Author Comment

by:mraible
ID: 7148900
The problem is that when I get to step #6, there is no file at: /etc/inetd.conf

So I put this information:

#
# CVS PServer
#
cvspserver stream tcp nowait cvs /usr/bin/cvs cvs --allow-root=/usr/local/cvsroot pserver

In a cvspserver file in /etc/init.d/cvspserver - but it won't start as a service, and if I use a GUI to try and configure it, it won't show up - even though this line:

cvspserver 2401/tcp #CVS PServer

is in /etc/services.
0
 
LVL 51

Accepted Solution

by:
ahoffmann earned 150 total points
ID: 7150148
oops, it's RH (should have read carefully)
RH uses xinetd, not inetd, so you need to have a
  /etc/xinetd.d/cvs
file with following content:
# default: on
# description: cvs
service cvspserver
{
    port          = 2401
    socket_type   = stream
    wait          = no
    user          = root
    server        = /usr/bin/cvs
    server_args   = -f --allow-root=/usr/local/cvsroot pserver
    log_on_failure += USERID
    disable       = no
}

Then restart xinetd with
  kill -1 <pid of xinetd>
0
 
LVL 1

Author Comment

by:mraible
ID: 7150689
Awesome, and much faster than on my Windows 2000 box with double the RAM!

Thanks for your help!
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question