diff --git a/pbs-config/src/acl.rs b/pbs-config/src/acl.rs index ed10410a..f6ed1f41 100644 --- a/pbs-config/src/acl.rs +++ b/pbs-config/src/acl.rs @@ -952,7 +952,11 @@ acl:1:/storage/store1:user1@pbs:DatastoreBackup assert!(tree.any_privs_below(&user1, &["store"], ROLE_ADMIN)?); // user2 has not privileges under "/store/store2/store3" --> return false - assert!(!tree.any_privs_below(&user2, &["store", "store2", "store3"], ROLE_DATASTORE_READER)?); + assert!(!tree.any_privs_below( + &user2, + &["store", "store2", "store3"], + ROLE_DATASTORE_READER + )?); // user2 has DatastoreReader privileges under "/store/store2/store31" --> return true assert!(tree.any_privs_below(&user2, &["store/store2/store31"], ROLE_DATASTORE_READER)?); diff --git a/src/api2/tape/restore.rs b/src/api2/tape/restore.rs index 4d6f812a..cde1e908 100644 --- a/src/api2/tape/restore.rs +++ b/src/api2/tape/restore.rs @@ -297,9 +297,9 @@ pub const ROUTER: Router = Router::new().post(&API_METHOD_RESTORE); }, access: { // Note: parameters are no uri parameter, so we need to test inside function body - description: "The user needs Tape.Read privilege on /tape/pool/{pool} \ - and /tape/drive/{drive}, Datastore.Backup privilege on /datastore/{store}/[{namespace}],\ - Datastore.Modify privileges to create namespaces (if they don't exist).", + description: "The user needs Tape.Read privilege on /tape/pool/{pool} and \ + /tape/drive/{drive}, Datastore.Backup privilege on /datastore/{store}/[{namespace}], \ + Datastore.Modify privileges to create namespaces (if they don't exist).", permission: &Permission::Anybody, }, )]