r21762: Fix the build by enabling shared modules and adding the config.*
[jra/samba/.git] / examples / VFS / skel_opaque.c
index 18ad5eb5172e2eff2532dee69feb6ea8e8969d79..7103d0c27b7b3a1697d417ad820804e3d35ea817 100644 (file)
  * --metze
  */
 
+/* NOTE: As of approximately Samba 3.0.24, the vfswrap_* functions are not
+ * global symbols. They are included here only as an pointer that opaque
+ * operations should not call further into the VFS.
+ */
+
 static int skel_connect(vfs_handle_struct *handle,  const char *service, const char *user)    
 {
        return 0;
@@ -236,6 +241,7 @@ static int skel_symlink(vfs_handle_struct *handle,  const char *oldpath, const c
        return vfswrap_symlink(NULL,  oldpath, newpath);
 }
 
+
 static int skel_readlink(vfs_handle_struct *handle,  const char *path, char *buf, size_t bufsiz)
 {
        return vfswrap_readlink(NULL,  path, buf, bufsiz);
@@ -256,25 +262,43 @@ static char *skel_realpath(vfs_handle_struct *handle,  const char *path, char *r
        return vfswrap_realpath(NULL,  path, resolved_path);
 }
 
-static size_t skel_fget_nt_acl(vfs_handle_struct *handle, files_struct *fsp, int fd, uint32 security_info, struct security_descriptor_info **ppdesc)
+static NTSTATUS skel_notify_watch(struct vfs_handle_struct *handle,
+           struct sys_notify_context *ctx, struct notify_entry *e,
+           void (*callback)(struct sys_notify_context *ctx, void *private_data, struct notify_event *ev),
+           void *private_data, void *handle_p)
+{
+       return NT_STATUS_NOT_SUPPORTED;
+}
+
+static int skel_chflags(vfs_handle_struct *handle,  const char *path, uint flags)
+{
+       errno = ENOSYS;
+       return -1;
+}
+
+static size_t skel_fget_nt_acl(vfs_handle_struct *handle, files_struct *fsp,
+       int fd, uint32 security_info, SEC_DESC **ppdesc)
 {
        errno = ENOSYS;
        return 0;
 }
 
-static size_t skel_get_nt_acl(vfs_handle_struct *handle, files_struct *fsp, const char *name, uint32 security_info, struct security_descriptor_info **ppdesc)
+static size_t skel_get_nt_acl(vfs_handle_struct *handle, files_struct *fsp,
+       const char *name, uint32 security_info, SEC_DESC **ppdesc)
 {
        errno = ENOSYS;
        return 0;
 }
 
-static BOOL skel_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, int fd, uint32 security_info_sent, struct security_descriptor_info *psd)
+static BOOL skel_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, int
+       fd, uint32 security_info_sent, SEC_DESC *psd)
 {
        errno = ENOSYS;
        return False;
 }
 
-static BOOL skel_set_nt_acl(vfs_handle_struct *handle, files_struct *fsp, const char *name, uint32 security_info_sent, struct security_descriptor_info *psd)
+static BOOL skel_set_nt_acl(vfs_handle_struct *handle, files_struct *fsp, const
+       char *name, uint32 security_info_sent, SEC_DESC *psd)
 {
        errno = ENOSYS;
        return False;
@@ -587,6 +611,10 @@ static vfs_op_tuple skel_op_tuples[] = {
        {SMB_VFS_OP(skel_link),                         SMB_VFS_OP_LINK,                SMB_VFS_LAYER_OPAQUE},
        {SMB_VFS_OP(skel_mknod),                        SMB_VFS_OP_MKNOD,               SMB_VFS_LAYER_OPAQUE},
        {SMB_VFS_OP(skel_realpath),                     SMB_VFS_OP_REALPATH,            SMB_VFS_LAYER_OPAQUE},
+       {SMB_VFS_OP(skel_notify_watch),                 SMB_VFS_OP_NOTIFY_WATCH,        SMB_VFS_LAYER_OPAQUE},
+       {SMB_VFS_OP(skel_chflags),                      SMB_VFS_OP_CHFLAGS,             SMB_VFS_LAYER_OPAQUE},
+
+
 
        /* NT File ACL operations */