@@ -176,13 +176,13 @@ stop() {
176
176
177
177
log_header ' terminating ...'
178
178
179
- if is_kerberos_enabled ; then
179
+ if is_kerberos_requested ; then
180
180
kill_process_if_running " $PATH_BIN_RPC_SVCGSSD "
181
181
fi
182
182
183
183
stop_nfsd
184
184
185
- if is_idmapd_enabled ; then
185
+ if is_idmapd_requested ; then
186
186
kill_process_if_running " $PATH_BIN_IDMAPD "
187
187
fi
188
188
@@ -236,7 +236,7 @@ get_requested_port_statd_out() {
236
236
echo " ${! ENV_VAR_NFS_PORT_STATD_OUT:- $DEFAULT_NFS_PORT_STATD_OUT } "
237
237
}
238
238
239
- is_kerberos_enabled () {
239
+ is_kerberos_requested () {
240
240
241
241
if [[ -n " ${! ENV_VAR_NFS_ENABLE_KERBEROS} " ]]; then
242
242
return 0
@@ -254,7 +254,7 @@ is_nfs3_enabled() {
254
254
return 1
255
255
}
256
256
257
- is_idmapd_enabled () {
257
+ is_idmapd_requested () {
258
258
259
259
if [[ -f " $PATH_FILE_ETC_IDMAPD_CONF " ]]; then
260
260
return 0
@@ -459,7 +459,7 @@ init_assertions() {
459
459
assert_cap_sysadmin
460
460
461
461
# perform Kerberos assertions
462
- if is_kerberos_enabled ; then
462
+ if is_kerberos_requested ; then
463
463
464
464
assert_file_provided " $PATH_FILE_ETC_KRB5_KEYTAB "
465
465
assert_file_provided " $PATH_FILE_ETC_KRB5_CONF "
@@ -544,7 +544,7 @@ boot_main_rpcbind() {
544
544
545
545
boot_main_idmapd () {
546
546
547
- if is_idmapd_enabled ; then
547
+ if is_idmapd_requested ; then
548
548
log ' starting idmapd'
549
549
$PATH_BIN_IDMAPD -v -S
550
550
on_failure stop ' idmapd failed'
@@ -585,7 +585,7 @@ boot_main_nfsd() {
585
585
586
586
boot_main_svcgssd () {
587
587
588
- if ! is_kerberos_enabled ; then
588
+ if ! is_kerberos_requested ; then
589
589
return
590
590
fi
591
591
0 commit comments