xref: /illumos-gate/usr/src/cmd/smbsrv/smbd/server.xml (revision 4b5c8e93cab28d3c65ba9d407fd8f46e3be1db1c)
1<?xml version="1.0"?>
2<!DOCTYPE service_bundle SYSTEM "/usr/share/lib/xml/dtd/service_bundle.dtd.1">
3<!--
4
5CDDL HEADER START
6
7The contents of this file are subject to the terms of the
8Common Development and Distribution License (the "License").
9You may not use this file except in compliance with the License.
10
11You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
12or http://www.opensolaris.org/os/licensing.
13See the License for the specific language governing permissions
14and limitations under the License.
15
16When distributing Covered Code, include this CDDL HEADER in each
17file and include the License file at usr/src/OPENSOLARIS.LICENSE.
18If applicable, add the following below this CDDL HEADER, with the
19fields enclosed by brackets "[]" replaced with your own identifying
20information: Portions Copyright [yyyy] [name of copyright owner]
21
22CDDL HEADER END
23
24Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
25Copyright 2015 Nexenta Systems, Inc.  All rights reserved.
26Copyright 2016 Hans Rosenfeld <rosenfeld@grumpf.hope-2000.org>
27
28NOTE:  This service manifest is not editable; its contents will
29be overwritten by package or patch operations, including
30operating system upgrade.  Make customizations in a different
31file.
32
33-->
34
35<service_bundle type='manifest' name='SUNWsmbsr:smb-server'>
36
37<!-- 1. Name the service to 'network/smb/server' -->
38<service
39    name='network/smb/server'
40    type='service'
41    version='1'>
42
43	<!-- 2. Create default service instance. -->
44	<create_default_instance enabled='false' />
45
46	<!-- 3. Service has single instance -->
47	<single_instance/>
48
49	<!-- 4. Identify dependencies -->
50
51	<dependency name='network'
52	    grouping='require_any'
53	    restart_on='error'
54	    type='service'>
55		<service_fmri value='svc:/milestone/network'/>
56	</dependency>
57
58	<!-- Must have all local filesystems mounted before we share them -->
59	<dependency name='filesystem-local'
60	    grouping='require_all'
61	    restart_on='error'
62	    type='service'>
63		<service_fmri value='svc:/system/filesystem/local'/>
64	</dependency>
65
66	<!-- Must have idmap service started -->
67	<dependency name='idmap'
68	    grouping='require_all'
69	    restart_on='none'
70	    type='service'>
71		<service_fmri value='svc:/system/idmap:default'/>
72	</dependency>
73
74	<!-- Must have SMB client service started -->
75	<dependency name='smb-client'
76	    grouping='require_all'
77	    restart_on='none'
78	    type='service'>
79		<service_fmri value='svc:/network/smb/client:default'/>
80	</dependency>
81
82	<!--
83	    Want to make sure that the network/shares/group service
84	    starts after the smb/server service.  It needs to be
85	    optional in order to not cause failure if smb is
86	    disabled.
87	-->
88	<dependent name='groups'
89	    grouping="optional_all"
90	    restart_on='error' >
91		    <service_fmri value='svc:/network/shares/group'/>
92	</dependent>
93
94	<!-- 5. Identify start/stop/refresh methods -->
95	<exec_method
96		type='method'
97		name='start'
98		exec='/usr/lib/smbsrv/smbd %m'
99		timeout_seconds='60' >
100		<!-- XXX: need method_context? -->
101	</exec_method>
102
103	<exec_method
104		type='method'
105		name='stop'
106		exec=':kill'
107		timeout_seconds='60' />
108
109	<exec_method
110		type='method'
111		name='refresh'
112		exec=':kill -HUP'
113		timeout_seconds='60' />
114
115	<property_group name='general' type='framework'>
116		<!-- To Start/Stop/Refresh the service -->
117		<propval name='action_authorization' type='astring'
118			value='solaris.smf.manage.smb' />
119		<propval name='value_authorization' type='astring'
120			value='solaris.smf.manage.smb' />
121	</property_group>
122
123	<property_group name='firewall_context' type='com.sun,fw_definition'>
124		<propval name='ipf_method' type='astring'
125		    value='/lib/svc/method/svc-smbd ipfilter' />
126	</property_group>
127
128	<property_group name='firewall_config' type='com.sun,fw_configuration'>
129		<propval name='policy' type='astring' value='use_global' />
130		<propval name='block_policy' type='astring'
131			value='use_global' />
132		<propval name='apply_to' type='astring' value='' />
133		<propval name='apply_to_6' type='astring' value='' />
134		<propval name='exceptions' type='astring' value='' />
135		<propval name='exceptions_6' type='astring' value='' />
136		<propval name='target' type='astring' value='' />
137		<propval name='target_6' type='astring' value='' />
138		<propval name='value_authorization' type='astring'
139			value='solaris.smf.value.firewall.config' />
140	</property_group>
141
142	<property_group name='read' type='application'>
143		<!-- To read protected parameters -->
144		<propval name='read_authorization' type='astring'
145			value='solaris.smf.read.smb' />
146		<propval name='value_authorization' type='astring'
147			value='solaris.smf.value.smb' />
148		<propval name='machine_passwd' type='astring' value='' />
149	</property_group>
150
151	<!-- SMB service-specific general configuration defaults -->
152	<property_group name='smbd' type='application'>
153		<stability value='Evolving' />
154		<propval name='value_authorization' type='astring'
155			value='solaris.smf.value.smb' />
156		<propval name='oplock_enable' type='boolean'
157			value='true' override='true'/>
158		<propval name='autohome_map' type='astring'
159			value='/etc' override='true'/>
160		<propval name='debug' type='integer'
161			value='0' override='true'/>
162		<propval name='domain_sid' type='astring'
163			value='' override='true'/>
164		<propval name='domain_member' type='boolean'
165			value='false' override='true'/>
166		<propval name='domain_name' type='astring'
167			value='WORKGROUP' override='true'/>
168		<propval name='fqdn' type='astring'
169			value='' override='true'/>
170		<propval name='forest' type='astring'
171			value='' override='true'/>
172		<propval name='domain_guid' type='astring'
173			value='' override='true'/>
174		<propval name='pdc' type='astring'
175			value='' override='true'/>
176		<propval name='wins_server_1' type='astring'
177			value='' override='true'/>
178		<propval name='wins_server_2' type='astring'
179			value='' override='true'/>
180		<propval name='wins_exclude' type='astring'
181			value='' override='true'/>
182		<propval name='max_workers' type='integer'
183			value='1024' override='true'/>
184		<propval name='max_connections' type='integer'
185			value='100000' override='true'/>
186		<propval name='keep_alive' type='integer'
187			value='5400' override='true'/>
188		<propval name='restrict_anonymous' type='boolean'
189			value='false' override='true'/>
190		<propval name='signing_enabled' type='boolean'
191			value='true' override='true'/>
192		<propval name='signing_required' type='boolean'
193			value='false' override='true'/>
194		<propval name='signing_check' type='boolean'
195			value='false' override='true'/>
196		<propval name='sync_enable' type='boolean'
197			value='false' override='true'/>
198		<propval name='security' type='astring'
199			value='workgroup' override='true'/>
200		<propval name='netbios_enable' type='boolean'
201			value='false' override='true'/>
202		<propval name='netbios_scope' type='astring'
203			value='' override='true'/>
204		<propval name='system_comment' type='astring'
205			value='' override='true'/>
206		<propval name='lmauth_level' type='integer'
207			value='4' override='true'/>
208		<propval name='ads_site' type='astring'
209			value='' override='true'/>
210		<propval name='ddns_enable' type='boolean'
211			value='false' override='true'/>
212		<propval name='kpasswd_server' type='astring'
213			value='' override='true'/>
214		<propval name='kpasswd_domain' type='astring'
215			value='' override='true'/>
216		<propval name='kpasswd_seqnum' type='integer'
217			value='0' override='true'/>
218		<propval name='netlogon_seqnum' type='integer'
219			value='0' override='true'/>
220		<propval name='ipv6_enable' type='boolean'
221			value='false' override='true'/>
222		<propval name='sv_version' type='astring'
223			value='5.0' override='true'/>
224		<propval name='dfs_stdroot_num' type='integer'
225			value='0' override='true'/>
226		<propval name='print_enable' type='boolean'
227			value='false' override='true'/>
228		<propval name='traverse_mounts' type='boolean'
229			value='true' override='true'/>
230		<propval name='max_protocol' type='astring'
231			value='' override='true'/>
232		<propval name='initial_credits' type='integer'
233			value='20' override='true'/>
234		<propval name='maximum_credits' type='integer'
235			value='1000' override='true'/>
236	</property_group>
237
238	<!-- SMB service-specific shares exec configuration defaults -->
239	<property_group name='exec' type='application'>
240		<stability value='Evolving' />
241		<propval name='map' type='astring'
242			value='' override='true'/>
243		<propval name='unmap' type='astring'
244			value='' override='true'/>
245		<propval name='disposition' type='astring'
246			value='' override='true'/>
247	</property_group>
248
249	<!-- 6. Identify faults to be ignored. -->
250	<!-- 7. Identify service model. Default service model is 'contract' -->
251	<!-- 8. Identify dependents.
252		For Solaris NAS, we may want to have the smbd service start,
253		before it reaches the svc:/milestone/multi-user-server
254		milestone.
255		<dependent
256			name='smb-server_multi-user-server'
257			grouping='optional_all'
258			restart_on='none'>
259			<service_fmri value=
260			    'svc:/milestone/multi-user-server'/>
261		</dependent>
262	-->
263	<!-- 9. Insert service milestones. None. -->
264
265	<stability value='Evolving' />
266
267	<!-- 10. Create Service Template information -->
268	<template>
269		<common_name>
270			<loctext xml:lang='C'> smbd daemon</loctext>
271		</common_name>
272		<documentation>
273			<manpage title='smbd' section='1M'
274				manpath='/usr/share/man' />
275		</documentation>
276	</template>
277
278</service>
279
280</service_bundle>
281