xref: /titanic_44/usr/src/cmd/smbsrv/smbd/server.xml (revision 87308b749adb04ab3f564c765b089962af3edb4d)
1<?xml version="1.0"?>
2<!DOCTYPE service_bundle SYSTEM "/usr/share/lib/xml/dtd/service_bundle.dtd.1">
3<!--
4
5CDDL HEADER START
6
7The contents of this file are subject to the terms of the
8Common Development and Distribution License (the "License").
9You may not use this file except in compliance with the License.
10
11You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
12or http://www.opensolaris.org/os/licensing.
13See the License for the specific language governing permissions
14and limitations under the License.
15
16When distributing Covered Code, include this CDDL HEADER in each
17file and include the License file at usr/src/OPENSOLARIS.LICENSE.
18If applicable, add the following below this CDDL HEADER, with the
19fields enclosed by brackets "[]" replaced with your own identifying
20information: Portions Copyright [yyyy] [name of copyright owner]
21
22CDDL HEADER END
23
24Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
25Copyright 2013 Nexenta Systems, Inc.  All rights reserved.
26Copyright 2016 Hans Rosenfeld <rosenfeld@grumpf.hope-2000.org>
27
28NOTE:  This service manifest is not editable; its contents will
29be overwritten by package or patch operations, including
30operating system upgrade.  Make customizations in a different
31file.
32
33-->
34
35<service_bundle type='manifest' name='SUNWsmbsr:smb-server'>
36
37<!-- 1. Name the service to 'network/smb/server' -->
38<service
39    name='network/smb/server'
40    type='service'
41    version='1'>
42
43	<!-- 2. Create default service instance. -->
44	<create_default_instance enabled='false' />
45
46	<!-- 3. Service has single instance -->
47	<single_instance/>
48
49	<!-- 4. Identify dependencies -->
50
51	<dependency name='network'
52	    grouping='require_any'
53	    restart_on='error'
54	    type='service'>
55		<service_fmri value='svc:/milestone/network'/>
56	</dependency>
57
58	<!-- Must have all local filesystems mounted before we share them -->
59	<dependency name='filesystem-local'
60	    grouping='require_all'
61	    restart_on='error'
62	    type='service'>
63		<service_fmri value='svc:/system/filesystem/local'/>
64	</dependency>
65
66	<!-- Must have idmap service started -->
67	<dependency name='idmap'
68	    grouping='require_all'
69	    restart_on='none'
70	    type='service'>
71		<service_fmri value='svc:/system/idmap:default'/>
72	</dependency>
73
74	<!-- Must have SMB client service started -->
75	<dependency name='smb-client'
76	    grouping='require_all'
77	    restart_on='none'
78	    type='service'>
79		<service_fmri value='svc:/network/smb/client:default'/>
80	</dependency>
81
82	<!--
83	    Want to make sure that the network/shares/group service
84	    starts after the smb/server service.  It needs to be
85	    optional in order to not cause failure if smb is
86	    disabled.
87	-->
88	<dependent name='groups'
89	    grouping="optional_all"
90	    restart_on='error' >
91		    <service_fmri value='svc:/network/shares/group'/>
92	</dependent>
93
94	<!-- 5. Identify start/stop/refresh methods -->
95	<exec_method
96		type='method'
97		name='start'
98		exec='/usr/lib/smbsrv/smbd %m'
99		timeout_seconds='60' >
100		<!-- XXX: need method_context? -->
101	</exec_method>
102
103	<exec_method
104		type='method'
105		name='stop'
106		exec=':kill'
107		timeout_seconds='60' />
108
109	<exec_method
110		type='method'
111		name='refresh'
112		exec=':kill -HUP'
113		timeout_seconds='60' />
114
115	<property_group name='general' type='framework'>
116		<!-- To Start/Stop/Refresh the service -->
117		<propval name='action_authorization' type='astring'
118			value='solaris.smf.manage.smb' />
119		<propval name='value_authorization' type='astring'
120			value='solaris.smf.manage.smb' />
121	</property_group>
122
123	<property_group name='firewall_context' type='com.sun,fw_definition'>
124		<propval name='ipf_method' type='astring'
125		    value='/lib/svc/method/svc-smbd ipfilter' />
126	</property_group>
127
128	<property_group name='firewall_config' type='com.sun,fw_configuration'>
129		<propval name='policy' type='astring' value='use_global' />
130		<propval name='block_policy' type='astring'
131			value='use_global' />
132		<propval name='apply_to' type='astring' value='' />
133		<propval name='apply_to_6' type='astring' value='' />
134		<propval name='exceptions' type='astring' value='' />
135		<propval name='exceptions_6' type='astring' value='' />
136		<propval name='target' type='astring' value='' />
137		<propval name='target_6' type='astring' value='' />
138		<propval name='value_authorization' type='astring'
139			value='solaris.smf.value.firewall.config' />
140	</property_group>
141
142	<property_group name='read' type='application'>
143		<!-- To read protected parameters -->
144		<propval name='read_authorization' type='astring'
145			value='solaris.smf.read.smb' />
146		<propval name='value_authorization' type='astring'
147			value='solaris.smf.value.smb' />
148		<propval name='machine_passwd' type='astring' value='' />
149	</property_group>
150
151	<!-- SMB service-specific general configuration defaults -->
152	<property_group name='smbd' type='application'>
153		<stability value='Evolving' />
154		<propval name='value_authorization' type='astring'
155			value='solaris.smf.value.smb' />
156		<propval name='oplock_enable' type='boolean'
157			value='true' override='true'/>
158		<propval name='autohome_map' type='astring'
159			value='/etc' override='true'/>
160		<propval name='debug' type='integer'
161			value='0' override='true'/>
162		<propval name='domain_sid' type='astring'
163			value='' override='true'/>
164		<propval name='domain_member' type='boolean'
165			value='false' override='true'/>
166		<propval name='domain_name' type='astring'
167			value='WORKGROUP' override='true'/>
168		<propval name='fqdn' type='astring'
169			value='' override='true'/>
170		<propval name='forest' type='astring'
171			value='' override='true'/>
172		<propval name='domain_guid' type='astring'
173			value='' override='true'/>
174		<propval name='pdc' type='astring'
175			value='' override='true'/>
176		<propval name='wins_server_1' type='astring'
177			value='' override='true'/>
178		<propval name='wins_server_2' type='astring'
179			value='' override='true'/>
180		<propval name='wins_exclude' type='astring'
181			value='' override='true'/>
182		<propval name='max_workers' type='integer'
183			value='1024' override='true'/>
184		<propval name='max_connections' type='integer'
185			value='100000' override='true'/>
186		<propval name='keep_alive' type='integer'
187			value='5400' override='true'/>
188		<propval name='restrict_anonymous' type='boolean'
189			value='false' override='true'/>
190		<propval name='signing_enabled' type='boolean'
191			value='false' override='true'/>
192		<propval name='signing_required' type='boolean'
193			value='false' override='true'/>
194		<propval name='signing_check' type='boolean'
195			value='false' override='true'/>
196		<propval name='sync_enable' type='boolean'
197			value='false' override='true'/>
198		<propval name='security' type='astring'
199			value='workgroup' override='true'/>
200		<propval name='netbios_enable' type='boolean'
201			value='false' override='true'/>
202		<propval name='netbios_scope' type='astring'
203			value='' override='true'/>
204		<propval name='system_comment' type='astring'
205			value='' override='true'/>
206		<propval name='lmauth_level' type='integer'
207			value='4' override='true'/>
208		<propval name='ads_site' type='astring'
209			value='' override='true'/>
210		<propval name='ddns_enable' type='boolean'
211			value='false' override='true'/>
212		<propval name='kpasswd_server' type='astring'
213			value='' override='true'/>
214		<propval name='kpasswd_domain' type='astring'
215			value='' override='true'/>
216		<propval name='kpasswd_seqnum' type='integer'
217			value='0' override='true'/>
218		<propval name='netlogon_seqnum' type='integer'
219			value='0' override='true'/>
220		<propval name='ipv6_enable' type='boolean'
221			value='false' override='true'/>
222		<propval name='sv_version' type='astring'
223			value='5.0' override='true'/>
224		<propval name='dfs_stdroot_num' type='integer'
225			value='0' override='true'/>
226		<propval name='traverse_mounts' type='boolean'
227			value='true' override='true'/>
228	</property_group>
229
230	<!-- SMB service-specific shares exec configuration defaults -->
231	<property_group name='exec' type='application'>
232		<stability value='Evolving' />
233		<propval name='map' type='astring'
234			value='' override='true'/>
235		<propval name='unmap' type='astring'
236			value='' override='true'/>
237		<propval name='disposition' type='astring'
238			value='' override='true'/>
239	</property_group>
240
241	<!-- 6. Identify faults to be ignored. -->
242	<!-- 7. Identify service model. Default service model is 'contract' -->
243	<!-- 8. Identify dependents.
244		For Solaris NAS, we may want to have the smbd service start,
245		before it reaches the svc:/milestone/multi-user-server
246		milestone.
247		<dependent
248			name='smb-server_multi-user-server'
249			grouping='optional_all'
250			restart_on='none'>
251			<service_fmri value=
252			    'svc:/milestone/multi-user-server'/>
253		</dependent>
254	-->
255	<!-- 9. Insert service milestones. None. -->
256
257	<stability value='Evolving' />
258
259	<!-- 10. Create Service Template information -->
260	<template>
261		<common_name>
262			<loctext xml:lang='C'> smbd daemon</loctext>
263		</common_name>
264		<documentation>
265			<manpage title='smbd' section='1M'
266				manpath='/usr/share/man' />
267		</documentation>
268	</template>
269
270</service>
271
272</service_bundle>
273