diff options
author | Jeremy Allison <jra@samba.org> | 2001-04-04 23:42:17 +0000 |
---|---|---|
committer | Jeremy Allison <jra@samba.org> | 2001-04-04 23:42:17 +0000 |
commit | 852242a1b53069e5e6c8861f8243fe4a5016001a (patch) | |
tree | c3191fbb57a6110298771770e9290f8bb8021760 /source3/rpc_server/srv_srvsvc.c | |
parent | dcc01ec5fb16b3529afef6c13324463db37ad147 (diff) | |
download | samba-852242a1b53069e5e6c8861f8243fe4a5016001a.tar.gz samba-852242a1b53069e5e6c8861f8243fe4a5016001a.tar.bz2 samba-852242a1b53069e5e6c8861f8243fe4a5016001a.zip |
I know we're supposed to be feature frozen, but I couldn't resist this... :-).
I worked out and added the per-share get/set RPCs for security descriptors.
Currently this code returns Everyone, full access on get and permission denied
on set, but backending this with a tdb and checking it on tconX (to give full NT
semantics for security on shares) is now an excersise for the reader... :-).
Jeremy.
(This used to be commit 3bfd155ba78798c50588904d4ea3389f50f8abb6)
Diffstat (limited to 'source3/rpc_server/srv_srvsvc.c')
-rw-r--r-- | source3/rpc_server/srv_srvsvc.c | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/source3/rpc_server/srv_srvsvc.c b/source3/rpc_server/srv_srvsvc.c index a3176bfd73..76e6be2ec1 100644 --- a/source3/rpc_server/srv_srvsvc.c +++ b/source3/rpc_server/srv_srvsvc.c @@ -198,6 +198,36 @@ static BOOL api_srv_net_share_get_info(pipes_struct *p) } /******************************************************************* + RPC to set share information. +********************************************************************/ + +static BOOL api_srv_net_share_set_info(pipes_struct *p) +{ + SRV_Q_NET_SHARE_SET_INFO q_u; + SRV_R_NET_SHARE_SET_INFO r_u; + prs_struct *data = &p->in_data.data; + prs_struct *rdata = &p->out_data.rdata; + + ZERO_STRUCT(q_u); + ZERO_STRUCT(r_u); + + /* Unmarshall the net server set info. */ + if(!srv_io_q_net_share_set_info("", &q_u, data, 0)) { + DEBUG(0,("api_srv_net_share_set_info: Failed to unmarshall SRV_Q_NET_SHARE_SET_INFO.\n")); + return False; + } + + r_u.status = _srv_net_share_set_info(p, &q_u, &r_u); + + if(!srv_io_r_net_share_set_info("", &r_u, rdata, 0)) { + DEBUG(0,("api_srv_net_share_set_info: Failed to marshall SRV_R_NET_SHARE_SET_INFO.\n")); + return False; + } + + return True; +} + +/******************************************************************* api_srv_net_remote_tod ********************************************************************/ @@ -234,6 +264,7 @@ struct api_struct api_srv_cmds[] = { "SRV_NETSESSENUM" , SRV_NETSESSENUM , api_srv_net_sess_enum }, { "SRV_NETSHAREENUM" , SRV_NETSHAREENUM , api_srv_net_share_enum }, { "SRV_NET_SHARE_GET_INFO", SRV_NET_SHARE_GET_INFO, api_srv_net_share_get_info }, + { "SRV_NET_SHARE_SET_INFO", SRV_NET_SHARE_SET_INFO, api_srv_net_share_set_info }, { "SRV_NETFILEENUM" , SRV_NETFILEENUM , api_srv_net_file_enum }, { "SRV_NET_SRV_GET_INFO" , SRV_NET_SRV_GET_INFO , api_srv_net_srv_get_info }, { "SRV_NET_REMOTE_TOD" , SRV_NET_REMOTE_TOD , api_srv_net_remote_tod }, |