+++ /dev/null
-<samba:parameter name="only user"
- type="boolean"
- context="S"
- deprecated="1"
- xmlns:samba="http://www.samba.org/samba/DTD/samba-doc">
-<description>
- <para>To restrict a service to a particular set of users you
- can use the <smbconfoption name="valid users"/> parameter.</para>
-
- <para>This parameter is deprecated</para>
-
- <para>However, it currently operates only in conjunction with
- <smbconfoption name="username"/>. The supported way to restrict
- a service to a particular set of users is the
- <smbconfoption name="valid users"/> parameter.</para>
-
-</description>
-
-<related>user</related>
-
-<value type="default">no</value>
-</samba:parameter>
+++ /dev/null
-<samba:parameter name="username"
- context="S"
- type="string"
- deprecated="1"
- xmlns:samba="http://www.samba.org/samba/DTD/samba-doc">
-<synonym>user</synonym>
-<synonym>users</synonym>
-<description>
- <para>To restrict a service to a particular set of users you
- can use the <smbconfoption name="valid users"/> parameter.</para>
-
- <para>This parameter is deprecated</para>
-
- <para>However, it currently operates only in conjunction with
- <smbconfoption name="only user"/>. The supported way to restrict
- a service to a particular set of users is the
- <smbconfoption name="valid users"/> parameter.</para>
-
-</description>
-
-<value type="default"><comment>The guest account if a guest service,
- else <empty string>.</comment></value>
-
-<value type="example">fred, mary, jack, jane, @users, @pcgroup</value>
-</samba:parameter>
.usershare_last_mod = {0, 0},
.szService = NULL,
.path = NULL,
- .username = NULL,
.invalid_users = NULL,
.valid_users = NULL,
.admin_users = NULL,
.oplocks = true,
.kernel_oplocks = false,
.level2_oplocks = true,
- .only_user = false,
.mangled_names = true,
.wide_links = false,
.follow_symlinks = true,
}
lpcfg_string_set(ServicePtrs[i], &ServicePtrs[i]->path, tmpdir());
- lpcfg_string_set(ServicePtrs[i], &ServicePtrs[i]->username, "");
lpcfg_string_set(ServicePtrs[i], &ServicePtrs[i]->comment, comment);
lpcfg_string_set(ServicePtrs[i], &ServicePtrs[i]->fstype, "IPC");
ServicePtrs[i]->max_connections = 0;
/*
* Check whether the user described by "token" has access to share snum.
*
- * This looks at "invalid users", "valid users" and "only user/username"
+ * This looks at "invalid users" and "valid users".
*
* Please note that the user name and share names passed in here mainly for
* the substitution routines that expand the parameter values, the decision
}
}
- if (lp_only_user(snum)) {
- const char *list[2];
- list[0] = lp_username(talloc_tos(), snum);
- list[1] = NULL;
- if ((list[0] == NULL) || (*list[0] == '\0')) {
- DEBUG(0, ("'only user = yes' and no 'username ='\n"));
- return False;
- }
- if (!token_contains_name_in_list(NULL, domain,
- lp_servicename(talloc_tos(), snum),
- token, list)) {
- DEBUG(10, ("%s != 'username'\n", username));
- return False;
- }
- }
-
DEBUG(10, ("user_ok_token: share %s is ok for unix user %s\n",
lp_servicename(talloc_tos(), snum), username));
* Check whether the user described by "token" is restricted to read-only
* access on share snum.
*
- * This looks at "invalid users", "valid users" and "only user/username"
+ * This looks at "read list", "write list" and "read only".
*
* Please note that the user name and share names passed in here mainly for
* the substitution routines that expand the parameter values, the decision