diff options
author | Christian Ambach <ambi@samba.org> | 2011-07-26 13:43:14 +0200 |
---|---|---|
committer | Christian Ambach <ambi@samba.org> | 2011-07-26 15:57:55 +0200 |
commit | 749868ede4cf2d3888135716d98d38dff020cae3 (patch) | |
tree | e76da7aa9a989f83059566e5a1ad98bf66bed914 /source3/lib | |
parent | ac57cfda9d9a530b8759c65986c9e5a7f1105d3c (diff) | |
download | samba-749868ede4cf2d3888135716d98d38dff020cae3.tar.gz samba-749868ede4cf2d3888135716d98d38dff020cae3.tar.xz samba-749868ede4cf2d3888135716d98d38dff020cae3.zip |
s3:lib change default share security access mask
when there is no share SD set, the default share SD that
is used e.g. for the output of sharesec -v defaults to a
value that is not equivalent to the desired FULL access.
This is a more or less a cosmetical follow-up for the patches
in Bug #8201 that makes them more consumeable by printing
FULL (that is what the user expects) instead of a bitmask
in hexadecimal form.
previous output:
REVISION:1
OWNER:(NULL SID)
GROUP:(NULL SID)
ACL:S-1-1-0:ALLOWED/0/0x101f01ff
with patch:
REVISION:1
OWNER:(NULL SID)
GROUP:(NULL SID)
ACL:S-1-1-0:ALLOWED/0/FULL
Autobuild-User: Christian Ambach <ambi@samba.org>
Autobuild-Date: Tue Jul 26 15:57:55 CEST 2011 on sn-devel-104
Diffstat (limited to 'source3/lib')
-rw-r--r-- | source3/lib/sharesec.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/source3/lib/sharesec.c b/source3/lib/sharesec.c index 2f625351b2..11ccb42300 100644 --- a/source3/lib/sharesec.c +++ b/source3/lib/sharesec.c @@ -293,7 +293,7 @@ struct security_descriptor *get_share_security( TALLOC_CTX *ctx, const char *ser if (data.dptr == NULL) { return get_share_security_default(ctx, psize, - GENERIC_ALL_ACCESS); + SEC_RIGHTS_DIR_ALL); } status = unmarshall_sec_desc(ctx, data.dptr, data.dsize, &psd); @@ -304,14 +304,14 @@ struct security_descriptor *get_share_security( TALLOC_CTX *ctx, const char *ser DEBUG(0, ("unmarshall_sec_desc failed: %s\n", nt_errstr(status))); return get_share_security_default(ctx, psize, - GENERIC_ALL_ACCESS); + SEC_RIGHTS_DIR_ALL); } if (psd) { *psize = ndr_size_security_descriptor(psd, 0); } else { return get_share_security_default(ctx, psize, - GENERIC_ALL_ACCESS); + SEC_RIGHTS_DIR_ALL); } return psd; |