1 01/14/87 set_iacl_dir, sid
2
3 Syntax as a command: sid path mode1 User_id1...modeN User_idN
4 -control_args
5
6
7 Function: manipulates the directory initial access control lists
8 initial ACLs of directories.
9
10
11 Arguments:
12 path
13 specifies the directory whose directory initial ACL is to be
14 changed. If it is -working_directory -wd, the directory initial
15 ACL for the user's working directory is changed. You can use the
16 star convention.
17 modes
18 is the mode associated with User_ids. It can consist of any or all
19 the letters sma except that if you give m, you must also give s.
20 The strings null, n, and "" specifically deny access to User_ids.
21 User_ids
22 is an access control name of the form Person_id.Project_id.tag. If
23 one or more of the components is missing, all entries that match
24 User_ids are changed to modes see set_acl for a description of the
25 matching strategy. If the three components are present, the
26 directory initial ACL entry with that name is changed to modes or
27 one is added if none exists. If the last modes has no User_ids
28 following it, your name and project are assumed.
29
30
31 Control arguments:
32 -no_sysdaemon, -nsd
33 does not add "sm *.SysDaemon.*" when using -replace.
34 -replace, -rp
35 deletes all directory initial ACL terms--with the exception of the
36 default *.SysDaemon.* term unless you supplied -no_sysdaemon--before
37 adding the terms specified on the command line. Default: to add
38 to and modify the existing initial ACL
39 -ring N, -rg N
40 identifies the ring number whose directory initial ACL is to be set.
41 It can appear anywhere on the line, except between a mode and its
42 associated User_id, and affects the whole line. If present, follow
43 it by N where 0 <= N <= 7. If omitted, your ring is assumed.
44 -sysdaemon, -sd
45 adds, with -replace, an "sm *.SysDaemon.*" initial ACL term before
46 adding the terms specified on the command line. Default
47
48
49 Notes: A directory initial ACL contains the ACL entries to be placed
50 on directories created in the specified directory see "Access Control"
51 in the Programmer's Reference Manual.