2 <!DOCTYPE service_bundle SYSTEM "/usr/share/lib/xml/dtd/service_bundle.dtd.1">
4 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
5 Use is subject to license terms.
9 The contents of this file are subject to the terms of the
10 Common Development and Distribution License (the "License").
11 You may not use this file except in compliance with the License.
13 You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
14 or http://www.opensolaris.org/os/licensing.
15 See the License for the specific language governing permissions
16 and limitations under the License.
18 When distributing Covered Code, include this CDDL HEADER in each
19 file and include the License file at usr/src/OPENSOLARIS.LICENSE.
20 If applicable, add the following below this CDDL HEADER, with the
21 fields enclosed by brackets "[]" replaced with your own identifying
22 information: Portions Copyright [yyyy] [name of copyright owner]
26 ident "%Z%%M% %I% %E% SMI"
28 NOTE: This service manifest is not editable; its contents will
29 be overwritten by package or patch operations, including
30 operating system upgrade. Make customizations in a different
33 <service_bundle type='manifest' name='SUNWcsr:manual-key'>
36 name='network/ipsec/manual-key'
40 <!-- The 'manual-key' service is delivered disabled
41 because there is not a default configuration file.
42 See note below on changing the default configuration file. -->
44 <create_default_instance enabled='false' />
48 <!-- Read/Write access to /var/run required for lock files -->
51 grouping='require_all'
55 value='svc:/system/filesystem/minimal'
58 <!-- Kernel needs to know IPsec supported algorithms -->
61 grouping='require_all'
65 value='svc:/network/ipsec/ipsecalgs'
69 <!-- If we are enabled, we should be running fairly early -->
72 name='ipseckey-network'
73 grouping='optional_all'
76 value='svc:/milestone/network'
83 exec='/usr/sbin/ipseckey -f %{config/config_file}'
87 <!-- To prevent ipseckey generating warnings about duplicate
88 SAs when the service is refreshed, ipseckey will flush the
89 existing SAs when its called from smf(5). -->
94 exec='/usr/sbin/ipseckey -f %{config/config_file}'
101 exec='/usr/sbin/ipseckey flush'
105 <property_group name='general' type='framework'>
106 <!-- A user with this authorization can:
108 svcadm restart manual-key
109 svcadm refresh manual-key
110 svcadm mark <state> manual-key
111 svcadm clear manual-key
113 see auths(1) and user_attr(4)-->
116 name='action_authorization'
118 value='solaris.smf.manage.ipsec'
120 <!-- A user with this authorization can:
122 svcadm disable manual-key
123 svcadm enable manual-key
125 see auths(1) and user_attr(4)-->
128 name='value_authorization'
130 value='solaris.smf.manage.ipsec'
134 <!-- The properties defined below can be changed by a user
135 with 'solaris.smf.value.ipsec' authorization using the
140 svccfg -s manual-key setprop config/config_file = /new/config_file
142 The new configurations will be read on service refresh:
144 svcadm refresh ipsec/manual-key
146 Note: svcadm disable/enable does not use the new property
147 until after the service has been refreshed.
149 ***Do not edit this manifest to change these properties! -->
151 <property_group name='config' type='application'>
155 value='/etc/inet/secret/ipseckeys'
158 name='value_authorization'
160 value='solaris.smf.value.ipsec'
164 <property_group name='startd' type='framework'>
172 <stability value='Unstable' />
176 <loctext xml:lang='C'>
177 manually keyed IPsec startup
181 <loctext xml:lang='C'>
182 Loads static security associations
186 <manpage title='ipseckey' section='1M'
187 manpath='/usr/share/man' />