summaryrefslogtreecommitdiff
path: root/source3/lib
diff options
context:
space:
mode:
authorChristian Ambach <ambi@samba.org>2011-07-26 13:43:14 +0200
committerChristian Ambach <ambi@samba.org>2011-07-26 15:57:55 +0200
commit749868ede4cf2d3888135716d98d38dff020cae3 (patch)
treee76da7aa9a989f83059566e5a1ad98bf66bed914 /source3/lib
parentac57cfda9d9a530b8759c65986c9e5a7f1105d3c (diff)
downloadsamba-749868ede4cf2d3888135716d98d38dff020cae3.tar.gz
samba-749868ede4cf2d3888135716d98d38dff020cae3.tar.bz2
samba-749868ede4cf2d3888135716d98d38dff020cae3.zip
s3:lib change default share security access mask
when there is no share SD set, the default share SD that is used e.g. for the output of sharesec -v defaults to a value that is not equivalent to the desired FULL access. This is a more or less a cosmetical follow-up for the patches in Bug #8201 that makes them more consumeable by printing FULL (that is what the user expects) instead of a bitmask in hexadecimal form. previous output: REVISION:1 OWNER:(NULL SID) GROUP:(NULL SID) ACL:S-1-1-0:ALLOWED/0/0x101f01ff with patch: REVISION:1 OWNER:(NULL SID) GROUP:(NULL SID) ACL:S-1-1-0:ALLOWED/0/FULL Autobuild-User: Christian Ambach <ambi@samba.org> Autobuild-Date: Tue Jul 26 15:57:55 CEST 2011 on sn-devel-104
Diffstat (limited to 'source3/lib')
-rw-r--r--source3/lib/sharesec.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/source3/lib/sharesec.c b/source3/lib/sharesec.c
index 2f625351b2..11ccb42300 100644
--- a/source3/lib/sharesec.c
+++ b/source3/lib/sharesec.c
@@ -293,7 +293,7 @@ struct security_descriptor *get_share_security( TALLOC_CTX *ctx, const char *ser
if (data.dptr == NULL) {
return get_share_security_default(ctx, psize,
- GENERIC_ALL_ACCESS);
+ SEC_RIGHTS_DIR_ALL);
}
status = unmarshall_sec_desc(ctx, data.dptr, data.dsize, &psd);
@@ -304,14 +304,14 @@ struct security_descriptor *get_share_security( TALLOC_CTX *ctx, const char *ser
DEBUG(0, ("unmarshall_sec_desc failed: %s\n",
nt_errstr(status)));
return get_share_security_default(ctx, psize,
- GENERIC_ALL_ACCESS);
+ SEC_RIGHTS_DIR_ALL);
}
if (psd) {
*psize = ndr_size_security_descriptor(psd, 0);
} else {
return get_share_security_default(ctx, psize,
- GENERIC_ALL_ACCESS);
+ SEC_RIGHTS_DIR_ALL);
}
return psd;