* --metze
*/
+/* NOTE: As of approximately Samba 3.0.24, the vfswrap_* functions are not
+ * global symbols. They are included here only as an pointer that opaque
+ * operations should not call further into the VFS.
+ */
+
static int skel_connect(vfs_handle_struct *handle, const char *service, const char *user)
{
return 0;
return vfswrap_symlink(NULL, oldpath, newpath);
}
+
static int skel_readlink(vfs_handle_struct *handle, const char *path, char *buf, size_t bufsiz)
{
return vfswrap_readlink(NULL, path, buf, bufsiz);
return vfswrap_realpath(NULL, path, resolved_path);
}
-static size_t skel_fget_nt_acl(vfs_handle_struct *handle, files_struct *fsp, int fd, uint32 security_info, struct security_descriptor_info **ppdesc)
+static NTSTATUS skel_notify_watch(struct vfs_handle_struct *handle,
+ struct sys_notify_context *ctx, struct notify_entry *e,
+ void (*callback)(struct sys_notify_context *ctx, void *private_data, struct notify_event *ev),
+ void *private_data, void *handle_p)
+{
+ return NT_STATUS_NOT_SUPPORTED;
+}
+
+static int skel_chflags(vfs_handle_struct *handle, const char *path, uint flags)
+{
+ errno = ENOSYS;
+ return -1;
+}
+
+static size_t skel_fget_nt_acl(vfs_handle_struct *handle, files_struct *fsp,
+ int fd, uint32 security_info, SEC_DESC **ppdesc)
{
errno = ENOSYS;
return 0;
}
-static size_t skel_get_nt_acl(vfs_handle_struct *handle, files_struct *fsp, const char *name, uint32 security_info, struct security_descriptor_info **ppdesc)
+static size_t skel_get_nt_acl(vfs_handle_struct *handle, files_struct *fsp,
+ const char *name, uint32 security_info, SEC_DESC **ppdesc)
{
errno = ENOSYS;
return 0;
}
-static BOOL skel_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, int fd, uint32 security_info_sent, struct security_descriptor_info *psd)
+static BOOL skel_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, int
+ fd, uint32 security_info_sent, SEC_DESC *psd)
{
errno = ENOSYS;
return False;
}
-static BOOL skel_set_nt_acl(vfs_handle_struct *handle, files_struct *fsp, const char *name, uint32 security_info_sent, struct security_descriptor_info *psd)
+static BOOL skel_set_nt_acl(vfs_handle_struct *handle, files_struct *fsp, const
+ char *name, uint32 security_info_sent, SEC_DESC *psd)
{
errno = ENOSYS;
return False;
{SMB_VFS_OP(skel_link), SMB_VFS_OP_LINK, SMB_VFS_LAYER_OPAQUE},
{SMB_VFS_OP(skel_mknod), SMB_VFS_OP_MKNOD, SMB_VFS_LAYER_OPAQUE},
{SMB_VFS_OP(skel_realpath), SMB_VFS_OP_REALPATH, SMB_VFS_LAYER_OPAQUE},
+ {SMB_VFS_OP(skel_notify_watch), SMB_VFS_OP_NOTIFY_WATCH, SMB_VFS_LAYER_OPAQUE},
+ {SMB_VFS_OP(skel_chflags), SMB_VFS_OP_CHFLAGS, SMB_VFS_LAYER_OPAQUE},
+
+
/* NT File ACL operations */