From df8d19e53b69e19698737c7ea405c7f66f9ce2fd Mon Sep 17 00:00:00 2001 From: Andreas Schneider Date: Thu, 20 Jun 2024 09:14:20 +0200 Subject: [PATCH] s3:smbd: Remove trailing spaces in posix_acls.c Signed-off-by: Andreas Schneider Reviewed-by: Martin Schwenke --- source3/smbd/posix_acls.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/source3/smbd/posix_acls.c b/source3/smbd/posix_acls.c index d275bdb908b..2ff2d5f77b8 100644 --- a/source3/smbd/posix_acls.c +++ b/source3/smbd/posix_acls.c @@ -2091,7 +2091,7 @@ static bool create_canon_ace_lists(files_struct *fsp, entry as a mask on all following allow entries. Finally, delete the Everyone DENY entry (we have applied it to everything possible). - In addition, in this pass we remove any DENY entries that have + In addition, in this pass we remove any DENY entries that have no permissions (ie. they are a DENY nothing). --------------------------------------------------------------------------- Second pass - only deal with deny user entries. @@ -2227,7 +2227,7 @@ static void process_deny_list(connection_struct *conn, canon_ace **pp_ace_list ) for (allow_ace_p = curr_ace->next; allow_ace_p; allow_ace_p = allow_ace_p->next) { - /* + /* * Only mask off allow entries. */ @@ -2456,7 +2456,7 @@ static bool unpack_canon_ace(files_struct *fsp, process_deny_list(fsp->conn, &dir_ace); /* - * A well formed POSIX file or default ACL has at least 3 entries, a + * A well formed POSIX file or default ACL has at least 3 entries, a * SMB_ACL_USER_OBJ, SMB_ACL_GROUP_OBJ, SMB_ACL_OTHER_OBJ * and optionally a mask entry. Ensure this is the case. */ @@ -2973,7 +2973,7 @@ static bool set_canon_ace_list(files_struct *fsp, } /**************************************************************************** - + ****************************************************************************/ SMB_ACL_T free_empty_sys_acl(connection_struct *conn, SMB_ACL_T the_acl) @@ -3398,7 +3398,7 @@ NTSTATUS posix_fget_nt_acl(struct files_struct *fsp, uint32_t security_info, Try to chown a file. We will be able to chown it under the following conditions. 1) If we have root privileges, then it will just work. - 2) If we have SeRestorePrivilege we can change the user + group to any other user. + 2) If we have SeRestorePrivilege we can change the user + group to any other user. 3) If we have SeTakeOwnershipPrivilege we can change the user to the current user. 4) If we have write permission to the file and dos_filemodes is set then allow chown to the currently authenticated user. @@ -3967,7 +3967,7 @@ static int chmod_acl_internals(SMB_ACL_T posix_acl, mode_t mode) /* * If this is a simple 3 element ACL or no elements then it's a standard - * UNIX permission set. Just use chmod... + * UNIX permission set. Just use chmod... */ if ((num_entries == 3) || (num_entries == 0)) -- 2.47.3