06/20/87 set_acl, sa Syntax as a command: sa path mode1 {User_id1...modeN User_idN} {-control_args} Function: manipulates the access control lists (ACLs) of nonlink entries in a directory (see the Programmer's Reference Manual for a discussion of ACLs). Arguments: path If it is -working_directory (-wd), the user's working directory is assumed. You can use the star convention, which applies to types of entries, depending on the type of mode specified in modeN. modeN is a valid access mode. For segments it can consist of any or all the letters rew; for multisegment files, it can consist of the letters rw. Note that the letter e is not available to multisegment files. For directories, of any or all the letters sma except that if you give m, you must supply s also. Use null (n, "") to specify null access. To obtain a list of modes for extended types, see the describe_entry_type command. User_idN is an access control name of the form Person_id.Project_id.tag. All ACL entries with matching names receive modeN. (For a description of the matching strategy, see "Examples" below.) If no match is found and you give the three components, an entry is added to the ACL. If you omit the last User_id, your Person_id and Project_id are assumed. Control arguments: -brief, -bf suppresses error messages of the form "No match for User_id on ACL of ", where User_id omits components. -chase chases links matching a star name. Links are always chased when path is not a star name. -no_chase does not chase links when using the star convention. (Default) -no_sysdaemon, -nsd does not add "rw *.SysDaemon.*" when using -replace. -replace, -rp deletes all ACL terms--with the exception of the default *.SysDaemon.* term unless you supplied -no_sysdaemon--before adding the terms specified on the command line. (Default: to add to and modify the existing ACL) -sysdaemon, -sd adds, with -replace, a "rw *.SysDaemon.*" ACL term before adding the terms specified on the command line. (Default) Select either of the following control arguments to avoid the ambiguity that occurs only when modeN is null and you use the star convention in path: -directory, -dr affects directories only. -interpret_as_extended_entry, -inaee interpret the selected entry as an extended entry type. -interpret_as_standard_entry, -inase interpret the selected entry as a standard entry type. -segment, -sm affects segments and multisegment files only. (Default) -select_entry_type STR, -slet STR affects only entries of the entry type selected by STR, which is a comma-delimited list of file system entry types. Use the list_entry_types command to obtain a list of valid entry type values. Access required: You require modify permission on the containing directory. Notes: The arguments are processed from left to right; therefore the effect of a particular pair of arguments can be changed by a later pair. When you use the star convention to specify the last component of an entryname, extended entries are excluded from any matches. The strategy for matching an access control name argument is defined by three rules: 1) A literal component, including "*", matches only a component of the same name. 2) A missing component not delimited by a period is treated the same as a literal "*" (e.g., "*.Multics" is treated as "*.Multics.*"). Missing components on the left must be delimited by periods. 3) A missing component delimited by a period matches any component. ----------------------------------------------------------- Historical Background This edition of the Multics software materials and documentation is provided and donated to Massachusetts Institute of Technology by Group BULL including BULL HN Information Systems Inc. as a contribution to computer science knowledge. This donation is made also to give evidence of the common contributions of Massachusetts Institute of Technology, Bell Laboratories, General Electric, Honeywell Information Systems Inc., Honeywell BULL Inc., Groupe BULL and BULL HN Information Systems Inc. to the development of this operating system. Multics development was initiated by Massachusetts Institute of Technology Project MAC (1963-1970), renamed the MIT Laboratory for Computer Science and Artificial Intelligence in the mid 1970s, under the leadership of Professor Fernando Jose Corbato. Users consider that Multics provided the best software architecture for managing computer hardware properly and for executing programs. Many subsequent operating systems incorporated Multics principles. Multics was distributed in 1975 to 2000 by Group Bull in Europe , and in the U.S. by Bull HN Information Systems Inc., as successor in interest by change in name only to Honeywell Bull Inc. and Honeywell Information Systems Inc. . ----------------------------------------------------------- Permission to use, copy, modify, and distribute these programs and their documentation for any purpose and without fee is hereby granted,provided that the below copyright notice and historical background appear in all copies and that both the copyright notice and historical background and this permission notice appear in supporting documentation, and that the names of MIT, HIS, BULL or BULL HN not be used in advertising or publicity pertaining to distribution of the programs without specific prior written permission. Copyright 1972 by Massachusetts Institute of Technology and Honeywell Information Systems Inc. Copyright 2006 by BULL HN Information Systems Inc. Copyright 2006 by Bull SAS All Rights Reserved