diff options
author | Pavel Reichl <preichl@redhat.com> | 2015-01-22 07:22:42 -0500 |
---|---|---|
committer | Jakub Hrozek <jhrozek@redhat.com> | 2015-01-27 10:58:30 +0100 |
commit | b07a3b729892d2bc2ffa73d93de95e19003cc6c8 (patch) | |
tree | 2a8a61dd3552a80bdd6f6f0f1fc3531f16a8c661 | |
parent | ab5f9b58ae740868cb09e92379ed41d30b9401ac (diff) | |
download | sssd-b07a3b729892d2bc2ffa73d93de95e19003cc6c8.tar.gz sssd-b07a3b729892d2bc2ffa73d93de95e19003cc6c8.tar.xz sssd-b07a3b729892d2bc2ffa73d93de95e19003cc6c8.zip |
add missing '\n' in debug messages
Also reformat debug strings not to exceed 80 columns long lines.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
-rw-r--r-- | src/providers/data_provider_be.c | 2 | ||||
-rw-r--r-- | src/providers/ipa/ipa_subdomains_ext_groups.c | 7 | ||||
-rw-r--r-- | src/providers/ldap/sdap_access.c | 2 | ||||
-rw-r--r-- | src/responder/pac/pacsrv_cmd.c | 19 | ||||
-rw-r--r-- | src/tools/sss_cache.c | 9 | ||||
-rw-r--r-- | src/util/domain_info_utils.c | 9 |
6 files changed, 26 insertions, 22 deletions
diff --git a/src/providers/data_provider_be.c b/src/providers/data_provider_be.c index 53a0be258..02749035c 100644 --- a/src/providers/data_provider_be.c +++ b/src/providers/data_provider_be.c @@ -499,7 +499,7 @@ void be_mark_offline(struct be_ctx *ctx) if (ret != EOK) { DEBUG(SSSDBG_CRIT_FAILURE, "Failed to get offline_timeout from confdb. " - "Will use 60 seconds."); + "Will use 60 seconds.\n"); offline_timeout = 60; } ret = be_ptask_create_sync(ctx, ctx, diff --git a/src/providers/ipa/ipa_subdomains_ext_groups.c b/src/providers/ipa/ipa_subdomains_ext_groups.c index b9690bdb6..92889c270 100644 --- a/src/providers/ipa/ipa_subdomains_ext_groups.c +++ b/src/providers/ipa/ipa_subdomains_ext_groups.c @@ -847,9 +847,10 @@ static void ipa_add_ad_memberships_get_next(struct tevent_req *req) } if (missing_groups) { - DEBUG(SSSDBG_CRIT_FAILURE, "There are unresolved external group " \ - "memberships even after all groups have " \ - "been looked up on the LDAP server."); + DEBUG(SSSDBG_CRIT_FAILURE, "There are unresolved external group " + "memberships even after all groups " + "have been looked up on the LDAP " + "server.\n"); } tevent_req_done(req); return; diff --git a/src/providers/ldap/sdap_access.c b/src/providers/ldap/sdap_access.c index e09e6b8fe..a6c882cae 100644 --- a/src/providers/ldap/sdap_access.c +++ b/src/providers/ldap/sdap_access.c @@ -276,7 +276,7 @@ static void sdap_access_done(struct tevent_req *subreq) break; default: ret = EINVAL; - DEBUG(SSSDBG_MINOR_FAILURE, "Unknown access control type: %d.", + DEBUG(SSSDBG_MINOR_FAILURE, "Unknown access control type: %d.\n", state->ac_type); break; } diff --git a/src/responder/pac/pacsrv_cmd.c b/src/responder/pac/pacsrv_cmd.c index 07d2f0cf7..83609343b 100644 --- a/src/responder/pac/pacsrv_cmd.c +++ b/src/responder/pac/pacsrv_cmd.c @@ -584,15 +584,16 @@ static errno_t save_pac_user(struct pac_req_ctx *pr_ctx) &msg); if (ret == ENOENT) { if (pwd->pw_gid == 0 && !pr_ctx->dom->mpg) { - DEBUG(SSSDBG_CRIT_FAILURE, "Primary group RID from the PAC " \ - "cannot be translated into a GID for " \ - "user [%s]. Typically this happens " \ - "when UIDs and GIDs are read from AD " \ - "and the primary AD group does not " \ - "have a GID assigned. Make sure the " \ - "user is created by the ID provider " \ - "before GSSAPI based authentication " \ - "is used in this case.", pwd->pw_name); + DEBUG(SSSDBG_CRIT_FAILURE, "Primary group RID from the PAC " + "cannot be translated into a GID for " + "user [%s]. Typically this happens " + "when UIDs and GIDs are read from AD " + "and the primary AD group does not " + "have a GID assigned. Make sure the " + "user is created by the ID provider " + "before GSSAPI based authentication " + "is used in this case.\n", + pwd->pw_name); ret = EINVAL; goto done; } diff --git a/src/tools/sss_cache.c b/src/tools/sss_cache.c index e6faf2d74..c9bf24914 100644 --- a/src/tools/sss_cache.c +++ b/src/tools/sss_cache.c @@ -426,15 +426,16 @@ static bool invalidate_entries(TALLOC_CTX *ctx, c_name = ldb_msg_find_attr_as_string(msgs[i], SYSDB_NAME, NULL); if (c_name == NULL) { DEBUG(SSSDBG_MINOR_FAILURE, - "Something bad happened, can't find attribute %s", SYSDB_NAME); - ERROR("Couldn't invalidate %1$s", type_string); + "Something bad happened, can't find attribute %s\n", + SYSDB_NAME); + ERROR("Couldn't invalidate %1$s\n", type_string); iret = false; } else { ret = invalidate_entry(ctx, dinfo, c_name, entry_type); if (ret != EOK) { DEBUG(SSSDBG_MINOR_FAILURE, - "Couldn't invalidate %s %s", type_string, c_name); - ERROR("Couldn't invalidate %1$s %2$s", type_string, c_name); + "Couldn't invalidate %s %s\n", type_string, c_name); + ERROR("Couldn't invalidate %1$s %2$s\n", type_string, c_name); iret = false; } } diff --git a/src/util/domain_info_utils.c b/src/util/domain_info_utils.c index e0f1120e3..cbfc55b26 100644 --- a/src/util/domain_info_utils.c +++ b/src/util/domain_info_utils.c @@ -433,8 +433,9 @@ sss_write_domain_mappings(struct sss_domain_info *domain) fd = mkstemp(tmp_file); umask(old_mode); if (fd < 0) { - DEBUG(SSSDBG_OP_FAILURE, "creating the temp file [%s] for domain-realm " - "mappings failed.", tmp_file); + DEBUG(SSSDBG_OP_FAILURE, + "creating the temp file [%s] for domain-realm mappings " + "failed.\n", tmp_file); ret = EIO; talloc_zfree(tmp_ctx); goto done; @@ -682,8 +683,8 @@ static errno_t sss_write_krb5_localauth_snippet(const char *path) fd = mkstemp(tmp_file); umask(old_mode); if (fd < 0) { - DEBUG(SSSDBG_OP_FAILURE, "creating the temp file [%s] for domain-realm " - "mappings failed.", tmp_file); + DEBUG(SSSDBG_OP_FAILURE, "creating the temp file [%s] for " + "domain-realm mappings failed.\n", tmp_file); ret = EIO; talloc_zfree(tmp_ctx); goto done; |