dmake: do not set MAKEFLAGS=k
[unleashed/tickless.git] / usr / src / cmd / cmd-inet / usr.sbin / ipsecutils / manual-key.xml
blobd1dac2b94cae42a9ef174f649578eaddab0adbe4
1 <?xml version="1.0"?>
2 <!DOCTYPE service_bundle SYSTEM "/usr/share/lib/xml/dtd/service_bundle.dtd.1">
3 <!--
4  Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
5  Use is subject to license terms.
7  CDDL HEADER START
9  The contents of this file are subject to the terms of the
10  Common Development and Distribution License (the "License").
11  You may not use this file except in compliance with the License.
13  You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
14  or http://www.opensolaris.org/os/licensing.
15  See the License for the specific language governing permissions
16  and limitations under the License.
18  When distributing Covered Code, include this CDDL HEADER in each
19  file and include the License file at usr/src/OPENSOLARIS.LICENSE.
20  If applicable, add the following below this CDDL HEADER, with the
21  fields enclosed by brackets "[]" replaced with your own identifying
22  information: Portions Copyright [yyyy] [name of copyright owner]
24  CDDL HEADER END
26         ident   "%Z%%M% %I%     %E% SMI"
28         NOTE:  This service manifest is not editable; its contents will
29         be overwritten by package or patch operations, including
30         operating system upgrade.  Make customizations in a different
31         file.
32 -->
33 <service_bundle type='manifest' name='SUNWcsr:manual-key'>
35 <service
36         name='network/ipsec/manual-key'
37         type='service'
38         version='1'>
40         <!-- The 'manual-key' service is delivered disabled
41         because there is not a default configuration file.
42         See note below on changing the default configuration file. -->
44         <create_default_instance enabled='false' />
46         <single_instance />
48         <!-- Read/Write access to /var/run required for lock files -->
49         <dependency
50                 name='filesystem'
51                 grouping='require_all'
52                 restart_on='none'
53                 type='service'>
54                 <service_fmri
55                         value='svc:/system/filesystem/minimal'
56                 />
57         </dependency>
58         <!-- Kernel needs to know IPsec supported algorithms -->
59         <dependency
60                 name='algorithms'
61                 grouping='require_all'
62                 restart_on='none'
63                 type='service'>
64                 <service_fmri
65                         value='svc:/network/ipsec/ipsecalgs'
66                 />
67         </dependency>
69         <!-- If we are enabled, we should be running fairly early -->
71         <dependent
72                 name='ipseckey-network'
73                 grouping='optional_all'
74                 restart_on='none'>
75                 <service_fmri
76                         value='svc:/milestone/network'
77                 />
78         </dependent>
80         <exec_method
81                 type='method'
82                 name='start'
83                 exec='/usr/sbin/ipseckey -f  %{config/config_file}'
84                 timeout_seconds='60'
85         />
87         <!-- To prevent ipseckey generating warnings about duplicate
88         SAs when the service is refreshed, ipseckey will flush the
89         existing SAs when its called from smf(5). -->
91         <exec_method
92                 type='method'
93                 name='refresh'
94                 exec='/usr/sbin/ipseckey -f  %{config/config_file}'
95                 timeout_seconds='60'
96         />
98         <exec_method
99                 type='method'
100                 name='stop'
101                 exec='/usr/sbin/ipseckey flush'
102                 timeout_seconds='60'
103         />
105         <property_group name='general' type='framework'>
106                 <!-- A user with this authorization can:
108                         svcadm restart manual-key
109                         svcadm refresh manual-key
110                         svcadm mark <state> manual-key
111                         svcadm clear manual-key
113                 see auths(1) and user_attr(4)-->
115                 <propval
116                         name='action_authorization'
117                         type='astring'
118                         value='solaris.smf.manage.ipsec'
119                 />
120                 <!-- A user with this authorization can:
122                         svcadm disable manual-key
123                         svcadm enable manual-key
125                 see auths(1) and user_attr(4)-->
127                 <propval
128                         name='value_authorization'
129                         type='astring'
130                         value='solaris.smf.manage.ipsec'
131                 />
132         </property_group>
134         <!-- The properties defined below can be changed by a user
135         with 'solaris.smf.value.ipsec' authorization using the 
136         svccfg(1M) command. 
138         EG:
140         svccfg -s manual-key setprop config/config_file = /new/config_file
142         The new configurations will be read on service refresh:
144         svcadm refresh ipsec/manual-key
146         Note: svcadm disable/enable does not use the new property
147         until after the service has been refreshed.
149         ***Do not edit this manifest to change these properties! -->
151         <property_group name='config' type='application'>
152                 <propval
153                         name='config_file'
154                         type='astring'
155                         value='/etc/inet/secret/ipseckeys'
156                 />
157                 <propval
158                         name='value_authorization'
159                         type='astring'
160                         value='solaris.smf.value.ipsec'
161                 />
162         </property_group>
164         <property_group name='startd' type='framework'>
165                 <propval
166                         name='duration'
167                         type='astring'
168                         value='transient'
169                 />
170         </property_group>
172         <stability value='Unstable' />
174         <template>
175                 <common_name>
176                         <loctext xml:lang='C'>
177                                 manually keyed IPsec startup
178                         </loctext>
179                 </common_name>
180                 <description>
181                         <loctext xml:lang='C'>
182                                 Loads static security associations
183                         </loctext>
184                 </description>
185                 <documentation>
186                         <manpage title='ipseckey' section='1M'
187                                 manpath='/usr/share/man' />
188                 </documentation>
189         </template>
190 </service>
191 </service_bundle>