Security News
ESLint is Now Language-Agnostic: Linting JSON, Markdown, and Beyond
ESLint has added JSON and Markdown linting support with new officially-supported plugins, expanding its versatility beyond JavaScript.
Turn your node daemon into an LSB-compatible init script.
init = require('init');
init.simple({
pidfile : '/var/run/myprog.pid',
logfile : '/var/log/myprog.log',
command : process.argv[3],
run : function () {
doWhateverMyDaemonDoes();
}
})
You're in luck (maybe). simple() just makes the easy case easy. See the api methods below for more flexible ways to use this module.
Starts your service. This function will not return, and takes the following keyword arguments:
Required. This should be a path to a file to lock and store the daemon pid in. If the daemon is already running according to this pidfile, start succeeds without doing anything.
Path to a file to redirect your daemon's stdout and stderr to. Defaults to /dev/null.
Required. A function to be called after daemon setup is complete. Do your daemon work here.
A function to be called when the start action succeeded (already running or about to daemonize). 'pid' will be the id of the running process, and 'wasRunning' is true if the process was already running.
A function to be called if the start action cannot be performed. Error will be some sort of stringifiable error object. Defaults to init.startFailed.
Stops your service with one of shutdown functions. Default is
init.hardKiller(2000)
, but you may pass your own.
Gets the status of your service. The status is not returned, but rather will be passed to cb if you provide it (defaults to init.printStatus). It is an object of the form: { running: true, pid: 3472, exists: true }.
Higher level method that leaves all the callbacks as defaults and dispatches to calling the right function depending on the string you provide. Takes the following keyword arguments:
As in init.start()
As in init.stop()
A string on which to dispatch. Defaults to your program's first argument (process.argv[2]). Recognized actions are "start", "stop", "restart", "try-restart", "force-reload", and "status".
As in init.stop()
Sends your service TERM, INT, QUIT, in that order (with 2000 ms delays) and then KILL until the process is no longer running, then calls cb (defaults to init.stopped). If the process was running, cb's first argument will be true. This is the default shutdown function.
Sends your service TERM and waits until it dies with 2000 ms delays. If it is more important that your service shutdown gracefully (to preserve data integrity, etc) than that it exits promptly, this is a good choice.
These functions are the defaults for various callbacks, but you can call them from your own custom callbacks if you want to augment them instead of replacing them.
Prints "Started with PID n" or "Already running with PID n" and exits with a 0 status code.
Prints error and exits with a 1 status code.
Prints "Stopped" or "Not running" and exits with a 0 status code.
Prints a human-readable message and exits with an LSB-appropriate error code.
Program is running:
Process is already running with pid N.
exit 0
Program is dead (exited without removing pid file)
Pidfile exists, but process is dead.
exit 2
Program is not running:
Not running.
exit 3
FAQs
Turn your node daemon into an LSB-like init script
We found that init demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
ESLint has added JSON and Markdown linting support with new officially-supported plugins, expanding its versatility beyond JavaScript.
Security News
Members Hub is conducting large-scale campaigns to artificially boost Discord server metrics, undermining community trust and platform integrity.
Security News
NIST has failed to meet its self-imposed deadline of clearing the NVD's backlog by the end of the fiscal year. Meanwhile, CVE's awaiting analysis have increased by 33% since June.