{
NTSTATUS status;
const struct security_token *token = NULL;
+ struct dom_sid_buf buf;
status = SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd);
if (!NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
}
DBG_DEBUG("overriding chown on file %s for sid %s\n",
- fsp_str_dbg(fsp), sid_string_tos(psd->owner_sid));
+ fsp_str_dbg(fsp),
+ dom_sid_str_buf(psd->owner_sid, &buf));
/* Ok, we failed to chown and we have
SEC_STD_WRITE_OWNER access - override. */
}
if (sidpts) {
+ struct dom_sid_buf buf;
/* Expect all users/groups in pts as SIDs */
name = talloc_strdup(
talloc_tos(),
- sid_string_tos(&ace->trustee));
+ dom_sid_str_buf(&ace->trustee, &buf));
if (name == NULL) {
return false;
}
#include "system/filesys.h"
#include "smbd/smbd.h"
#include "libcli/security/security_token.h"
+#include "libcli/security/dom_sid.h"
#include "nfs4_acls.h"
#include "librpc/gen_ndr/ndr_nfs4acl.h"
#include "nfs4acl_xattr.h"
mode_t expected_mode;
mode_t restored_mode;
bool chown_needed = false;
+ struct dom_sid_buf buf;
NTSTATUS status;
int ret;
}
DBG_DEBUG("overriding chown on file %s for sid %s\n",
- fsp_str_dbg(fsp), sid_string_tos(psd->owner_sid));
+ fsp_str_dbg(fsp),
+ dom_sid_str_buf(psd->owner_sid, &buf));
become_root();
status = smb_set_nt_acl_nfs4(handle,