summaryrefslogtreecommitdiffstats
path: root/source3/modules/onefs_acl.c
Commit message (Collapse)AuthorAgeFilesLines
* s3-smb Use FILE_ATTRIBUTE_DIRECTORY intead of aDIRAndrew Bartlett2011-04-291-1/+1
| | | | | | This means we use just one constant for this file attribute. Andrew Bartlett
* s3-vfs: include smbd/smbd.h in vfs modules.Günther Deschner2011-03-301-0/+1
| | | | Guenther
* s3-security: use shared SECINFO_DACL define.Günther Deschner2010-06-031-3/+3
| | | | Guenther
* s3-security: use shared SECINFO_SACL define.Günther Deschner2010-06-031-5/+5
| | | | Guenther
* s3-security: use shared SECINFO_GROUP define.Günther Deschner2010-06-031-2/+2
| | | | Guenther
* s3-security: use shared SECINFO_OWNER define.Günther Deschner2010-06-031-2/+2
| | | | Guenther
* s3:dom_sid Global replace of DOM_SID with struct dom_sidAndrew Bartlett2010-05-211-9/+9
| | | | | | | | | | This matches the structure that new code is being written to, and removes one more of the old-style named structures, and the need to know that is is just an alias for struct dom_sid. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
* s3-secdesc: remove "typedef struct security_descriptor SEC_DESC".Günther Deschner2010-05-181-6/+7
| | | | Guenther
* s3-secdesc: remove "typedef struct security_acl SEC_ACL".Günther Deschner2010-05-181-6/+6
| | | | Guenther
* s3-secdesc: remove "typedef struct security_ace SEC_ACE".Günther Deschner2010-05-181-5/+5
| | | | Guenther
* s3 onefs: Canonicalize the ACL in the correct ordertprouty2009-08-261-4/+8
|
* s3 onefs: Fix the onefs modules after the big refactoringTim Prouty2009-07-241-2/+2
|
* s3: Finish plumbing the fsp->fsp_name smb_fname conversion through the modules.Tim Prouty2009-07-201-27/+24
|
* s3: convert unix_mode to take an smb_filenameTim Prouty2009-07-081-2/+13
|
* s3 onefs: update the onefs module to be compliant with stat_exTim Prouty2009-05-281-2/+3
|
* s3 onefs: Fix ignore sacl parameterTim Prouty2009-05-121-11/+20
|
* s3 onefs: Change error status to NT_ACCESS_DENIED for errors in ↵David Kwan2009-03-241-5/+5
| | | | SET_SECURITY_DESC
* s3 OneFS: Refactor config code and cleanup includesTim Prouty2009-03-011-0/+3
|
* s3 OneFS: Fix uninitialized variableTim Prouty2009-02-241-1/+1
|
* s3: onefs_acl.c cleanupDan Sledz2009-02-241-4/+1
| | | | | Remove some duplicate code. Add a \n to a debugging statement
* S3: Add in profile counters for new vfs and syscall entries.todd stecher2009-02-241-1/+10
|
* s3 onefs: rename custom parameter to plural to match previous usageSteven Danneman2009-02-121-2/+2
|
* s3 OneFS: Expand the usage of the ignore sacl parametertodd stecher2009-02-111-0/+6
|
* s3 OneFS: Change ACLs to do a stat-only open before get/set_security_descriptorTim Prouty2009-02-091-22/+4
| | | | | | This ensures that getting/stting a security descriptor does not contend an oplock. The correct access checks will be still be done in the kernel on the get/set rather than the open.
* s3 onefs: Fix onefs ACLs to work with updated ACL syscallTim Prouty2009-01-301-1/+1
|
* s3: OneFS unmappable sids support.Dan Sledz2009-01-231-65/+173
| | | | | | | | | | | | | | | | | | | | | | | | Updates the onefs vfs module to add configurable behavior to deal with sids that are unknown to us. The best examples are aces that come from robocopy/xcopy. Adds the following share level options (which are specific to the vfs_onefs module): onefs: ignore unmappable sids (Default = false) If this option is set to true, sids which could not be resolved to a uid/gid are ignored. If an unmappable sid is encountered as the owner or group, the owner/group is converted to BUILTIN\Administrators. onefs: unmappable sids ignore list (Default = empty) Only the sids in the list are ignored. onefs: ignore sacls (Default = false) SACLs are ignored onefs: unmappable sids deny everyone (Default = false) If an unmappable sid is found in a deny ACE, the ACE's identity is changed to Everyone.
* s3: General cleanup of the open path in the OneFS vfs moduleTim Prouty2009-01-111-3/+3
|
* s3: Add the OneFS SMB_VFS_CREATE_FILE implementationTim Prouty2008-12-091-38/+81
| | | | | | | | | | | | | | | | | | | This is the first pass at extending the onefs vfs module to support the CIFS-specific enhancements available on OneFS. Most of this patch is massaging the sama open path to work with ifs_createfile. ifs_createfile is a CIFS-specific syscall for opening/files and directories. It adds support for: - Full in-kernel access checks using a windows access_mask - Cluster-coherent share mode locks - Cluster-coherent oplocks - Streams - Setting security descriptors at create time - Setting dos_attributes at create time This patch does not implement the samba side of the streams support or oplocks support. Tests that expect oplocks to be granted or streams to be supported will fail. This will be remedied in upcoming patches.
* Add support for OneFS ACLsSteven Danneman2008-12-021-0/+807
Add to the OneFS VFS module, support for NTFS ACLs through the calls: SMB_VFS_FGET_NT_ACL() SMB_VFS_GET_NT_ACL() SMB_VFS_FSET_NT_ACL() Also create several new onefs specific smb.conf parameters in onefs.h