* fhandler.cc (fhandler_base::open): Use Samba workaround generally
for all remote filesystems supporting ACLs. Change comment and explain why. Refer to the discussion which led to this.
This commit is contained in:
parent
af15c95e70
commit
b2d3f28fda
@ -1,3 +1,9 @@
|
|||||||
|
2008-08-07 Corinna Vinschen <corinna@vinschen.de>
|
||||||
|
|
||||||
|
* fhandler.cc (fhandler_base::open): Use Samba workaround generally
|
||||||
|
for all remote filesystems supporting ACLs. Change comment and
|
||||||
|
explain why. Refer to the discussion which led to this.
|
||||||
|
|
||||||
2008-08-05 Brian Dessent <brian@dessent.net>
|
2008-08-05 Brian Dessent <brian@dessent.net>
|
||||||
|
|
||||||
* config/i386/profile.h (mcount): Mark asms volatile.
|
* config/i386/profile.h (mcount): Mark asms volatile.
|
||||||
|
@ -573,8 +573,9 @@ fhandler_base::open (int flags, mode_t mode)
|
|||||||
file_attributes |= FILE_ATTRIBUTE_READONLY;
|
file_attributes |= FILE_ATTRIBUTE_READONLY;
|
||||||
|
|
||||||
/* If the file should actually be created and has ACLs,
|
/* If the file should actually be created and has ACLs,
|
||||||
set files attributes, except on Samba. See below. */
|
set files attributes, except on remote file systems.
|
||||||
if (has_acls () && !pc.fs_is_samba ())
|
See below. */
|
||||||
|
if (has_acls () && !pc.isremote ())
|
||||||
{
|
{
|
||||||
set_security_attribute (mode, &sa, sd);
|
set_security_attribute (mode, &sa, sd);
|
||||||
attr.SecurityDescriptor = sa.lpSecurityDescriptor;
|
attr.SecurityDescriptor = sa.lpSecurityDescriptor;
|
||||||
@ -619,21 +620,24 @@ fhandler_base::open (int flags, mode_t mode)
|
|||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Samba weirdness:
|
/* After some discussion on the samba-technical list, starting here:
|
||||||
The local user SID is used in set_security_attribute, but the
|
http://lists.samba.org/archive/samba-technical/2008-July/060247.html
|
||||||
actual owner on the Samba share is the SID of the Unix account.
|
|
||||||
There's no transparent mapping between these accounts.
|
|
||||||
|
|
||||||
FIXME: Really?
|
Always create files on a remote share using a NULL SD. Create
|
||||||
|
correct permission bits afterwards, maintaing the owner and group
|
||||||
|
information just like chmod.
|
||||||
|
|
||||||
And Samba has a strange behaviour when creating a file. Apparently
|
The reason to do this is to maintain the Windows behaviour when
|
||||||
it *first* creates the file, *then* it looks if the security
|
creating files on a remote share. Files on a remote share are
|
||||||
descriptor matches. The result is that the file gets created, but
|
created as the user used for authentication. In a domain that's
|
||||||
then NtCreateFile doesn't return a handle to the file and fails
|
usually the user you're logged in as. Outside of a domain you're
|
||||||
with STATUS_ACCESS_DENIED. That's why we first create the file
|
authenticating using a local user account on the sharing machine.
|
||||||
with default SD and afterwards set the permissions while ignoring
|
If the SIDs of the client machine are used, that's entirely
|
||||||
the owner and group. */
|
unexpected behaviour.
|
||||||
if ((flags & O_CREAT) && has_acls () && pc.fs_is_samba ())
|
|
||||||
|
Doing it like we do here creates the expected SD in a domain as
|
||||||
|
well as on standalone servers. */
|
||||||
|
if ((flags & O_CREAT) && has_acls () && pc.isremote ())
|
||||||
set_file_attribute (fh, pc, ILLEGAL_UID, ILLEGAL_GID, mode);
|
set_file_attribute (fh, pc, ILLEGAL_UID, ILLEGAL_GID, mode);
|
||||||
|
|
||||||
set_io_handle (fh);
|
set_io_handle (fh);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user