diff --git a/ksmbd.conf.5.in b/ksmbd.conf.5.in index 7fcd7b66..478976bf 100644 --- a/ksmbd.conf.5.in +++ b/ksmbd.conf.5.in @@ -224,7 +224,7 @@ Default: \fBread list = \fR Users are allowed read-only access to the share. With \fBread only = no\fR, the effect is the same as with \fBwriteable = yes\fR. -Default: \fBread only = yes\fR +Default: \fBread only = ; yes\fR .TP \fBrestrict anonymous\fR (G) How to restrict connections to any share as the user given with \fBguest account\fR. @@ -353,7 +353,7 @@ Default: \fBworkgroup = WORKGROUP\fR Users are allowed read-write access to the share. With \fBwritable = yes\fR, the effect is the same as with \fBread only = no\fR. -Default: \fBwritable = no\fR +Default: \fBwritable = \fR .TP \fBwriteable\fR (S) Synonym for \fBwritable\fP. diff --git a/ksmbd.conf.example b/ksmbd.conf.example index ce4779d8..cf3c57d7 100644 --- a/ksmbd.conf.example +++ b/ksmbd.conf.example @@ -49,7 +49,7 @@ oplocks = yes path = read list = - read only = yes + read only = ; yes store dos attributes = yes valid users = veto files = diff --git a/tools/config_parser.c b/tools/config_parser.c index af144b91..2be1a168 100644 --- a/tools/config_parser.c +++ b/tools/config_parser.c @@ -564,7 +564,6 @@ static void add_group_ipc_share_conf(void) { add_group_key_value("comment = IPC share"); add_group_key_value("guest ok = yes"); - add_group_key_value("read only = yes"); } static int finalize_smbconf_parser(void) diff --git a/tools/management/share.c b/tools/management/share.c index 3719f967..037c5be7 100644 --- a/tools/management/share.c +++ b/tools/management/share.c @@ -73,7 +73,7 @@ const char *KSMBD_SHARE_DEFCONF[KSMBD_SHARE_CONF_MAX] = { "", "no", "", - "yes", + "; yes", /*5*/ "yes", "", "",