summaryrefslogtreecommitdiffstats
path: root/src/providers
diff options
context:
space:
mode:
authorJakub Hrozek <jhrozek@redhat.com>2011-10-31 12:43:12 +0100
committerStephen Gallagher <sgallagh@redhat.com>2011-11-22 10:40:15 -0500
commitac3a1f3da772cf101101c31675c63dc3549b21b5 (patch)
tree83f68a5d28f276af3341f364afb0c7146bc1c8e6 /src/providers
parent0e34a9148d90a6cc37369de15507b5967e30cecf (diff)
downloadsssd-ac3a1f3da772cf101101c31675c63dc3549b21b5.tar.gz
sssd-ac3a1f3da772cf101101c31675c63dc3549b21b5.tar.xz
sssd-ac3a1f3da772cf101101c31675c63dc3549b21b5.zip
Cleanup: Remove unused parameters
Diffstat (limited to 'src/providers')
-rw-r--r--src/providers/data_provider_fo.c4
-rw-r--r--src/providers/ipa/ipa_access.c4
-rw-r--r--src/providers/ipa/ipa_dyndns.c3
-rw-r--r--src/providers/ipa/ipa_dyndns.h3
-rw-r--r--src/providers/ipa/ipa_hbac_common.c8
-rw-r--r--src/providers/ipa/ipa_hbac_hosts.c10
-rw-r--r--src/providers/ipa/ipa_hbac_private.h8
-rw-r--r--src/providers/ipa/ipa_hbac_rules.c2
-rw-r--r--src/providers/ipa/ipa_hbac_services.c4
-rw-r--r--src/providers/ipa/ipa_hbac_users.c2
-rw-r--r--src/providers/ipa/ipa_init.c2
-rw-r--r--src/providers/krb5/krb5_auth.c9
-rw-r--r--src/providers/ldap/ldap_auth.c3
-rw-r--r--src/providers/ldap/ldap_id_cleanup.c9
-rw-r--r--src/providers/ldap/sdap.c2
-rw-r--r--src/providers/ldap/sdap.h2
-rw-r--r--src/providers/ldap/sdap_access.c15
-rw-r--r--src/providers/ldap/sdap_async.c3
-rw-r--r--src/providers/ldap/sdap_async_connection.c14
-rw-r--r--src/providers/ldap/sdap_async_groups.c18
-rw-r--r--src/providers/ldap/sdap_async_initgroups.c23
-rw-r--r--src/providers/ldap/sdap_async_netgroups.c5
-rw-r--r--src/providers/proxy/proxy.h1
-rw-r--r--src/providers/proxy/proxy_id.c2
-rw-r--r--src/providers/proxy/proxy_netgroup.c1
25 files changed, 38 insertions, 119 deletions
diff --git a/src/providers/data_provider_fo.c b/src/providers/data_provider_fo.c
index fd23c0dbe..7a5c82c3e 100644
--- a/src/providers/data_provider_fo.c
+++ b/src/providers/data_provider_fo.c
@@ -62,7 +62,7 @@ int be_fo_is_srv_identifier(const char *server)
return server && strcasecmp(server, BE_SRV_IDENTIFIER) == 0;
}
-static int be_fo_get_options(TALLOC_CTX *mem_ctx, struct be_ctx *ctx,
+static int be_fo_get_options(struct be_ctx *ctx,
struct fo_options *opts)
{
errno_t ret;
@@ -108,7 +108,7 @@ int be_init_failover(struct be_ctx *ctx)
return ret;
}
- ret = be_fo_get_options(ctx->be_fo, ctx, &fopts);
+ ret = be_fo_get_options(ctx, &fopts);
if (ret != EOK) {
talloc_zfree(ctx->be_fo);
return ret;
diff --git a/src/providers/ipa/ipa_access.c b/src/providers/ipa/ipa_access.c
index 10f1cb7e6..f02f64ed8 100644
--- a/src/providers/ipa/ipa_access.c
+++ b/src/providers/ipa/ipa_access.c
@@ -296,7 +296,6 @@ static int hbac_get_host_info_step(struct hbac_ctx *hbac_ctx)
ipa_hbac_host_info_send(hbac_ctx,
hbac_ctx_ev(hbac_ctx),
hbac_ctx_sysdb(hbac_ctx),
- hbac_ctx_be(hbac_ctx)->domain,
sdap_id_op_handle(hbac_ctx->sdap_op),
hbac_ctx_sdap_id_ctx(hbac_ctx)->opts,
hbac_ctx->hbac_search_base);
@@ -329,7 +328,6 @@ static void hbac_get_service_info_step(struct tevent_req *req)
req = ipa_hbac_service_info_send(hbac_ctx,
hbac_ctx_ev(hbac_ctx),
hbac_ctx_sysdb(hbac_ctx),
- hbac_ctx_be(hbac_ctx)->domain,
sdap_id_op_handle(hbac_ctx->sdap_op),
hbac_ctx_sdap_id_ctx(hbac_ctx)->opts,
hbac_ctx->hbac_search_base);
@@ -395,8 +393,6 @@ static void hbac_get_rule_info_step(struct tevent_req *req)
req = ipa_hbac_rule_info_send(hbac_ctx,
hbac_ctx->get_deny_rules,
hbac_ctx_ev(hbac_ctx),
- hbac_ctx_sysdb(hbac_ctx),
- hbac_ctx_be(hbac_ctx)->domain,
sdap_id_op_handle(hbac_ctx->sdap_op),
hbac_ctx_sdap_id_ctx(hbac_ctx)->opts,
hbac_ctx->hbac_search_base,
diff --git a/src/providers/ipa/ipa_dyndns.c b/src/providers/ipa/ipa_dyndns.c
index c532c3d0b..946fa3900 100644
--- a/src/providers/ipa/ipa_dyndns.c
+++ b/src/providers/ipa/ipa_dyndns.c
@@ -138,8 +138,7 @@ fail:
}
-errno_t ipa_dyndns_init(TALLOC_CTX *mem_ctx,
- struct be_ctx *be_ctx,
+errno_t ipa_dyndns_init(struct be_ctx *be_ctx,
struct ipa_options *ctx)
{
errno_t ret;
diff --git a/src/providers/ipa/ipa_dyndns.h b/src/providers/ipa/ipa_dyndns.h
index 0d8ce7e7a..d86c6634b 100644
--- a/src/providers/ipa/ipa_dyndns.h
+++ b/src/providers/ipa/ipa_dyndns.h
@@ -25,8 +25,7 @@
#ifndef IPA_DYNDNS_H_
#define IPA_DYNDNS_H_
-errno_t ipa_dyndns_init(TALLOC_CTX *mem_ctx,
- struct be_ctx *be_ctx,
+errno_t ipa_dyndns_init(struct be_ctx *be_ctx,
struct ipa_options *ctx);
void ipa_dyndns_update(void *pvt);
diff --git a/src/providers/ipa/ipa_hbac_common.c b/src/providers/ipa/ipa_hbac_common.c
index 8815dae18..88532302d 100644
--- a/src/providers/ipa/ipa_hbac_common.c
+++ b/src/providers/ipa/ipa_hbac_common.c
@@ -299,7 +299,6 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Get the users */
ret = hbac_user_attrs_to_rule(new_rule,
hbac_ctx_sysdb(hbac_ctx),
- hbac_ctx_be(hbac_ctx)->domain,
new_rule->name,
hbac_ctx->rules[idx],
&new_rule->users);
@@ -312,7 +311,6 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Get the services */
ret = hbac_service_attrs_to_rule(new_rule,
hbac_ctx_sysdb(hbac_ctx),
- hbac_ctx_be(hbac_ctx)->domain,
new_rule->name,
hbac_ctx->rules[idx],
&new_rule->services);
@@ -325,7 +323,6 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Get the target hosts */
ret = hbac_thost_attrs_to_rule(new_rule,
hbac_ctx_sysdb(hbac_ctx),
- hbac_ctx_be(hbac_ctx)->domain,
new_rule->name,
hbac_ctx->rules[idx],
&new_rule->targethosts);
@@ -338,7 +335,6 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Get the source hosts */
ret = hbac_shost_attrs_to_rule(new_rule,
hbac_ctx_sysdb(hbac_ctx),
- hbac_ctx_be(hbac_ctx)->domain,
new_rule->name,
hbac_ctx->rules[idx],
&new_rule->srchosts);
@@ -396,7 +392,6 @@ done:
static errno_t
hbac_eval_user_element(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *username,
struct hbac_request_element **user_element);
@@ -440,7 +435,7 @@ hbac_ctx_to_eval_request(TALLOC_CTX *mem_ctx,
eval_req->request_time = time(NULL);
/* Get user the user name and groups */
- ret = hbac_eval_user_element(eval_req, sysdb, domain,
+ ret = hbac_eval_user_element(eval_req, sysdb,
pd->user, &eval_req->user);
if (ret != EOK) goto done;
@@ -489,7 +484,6 @@ done:
static errno_t
hbac_eval_user_element(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *username,
struct hbac_request_element **user_element)
{
diff --git a/src/providers/ipa/ipa_hbac_hosts.c b/src/providers/ipa/ipa_hbac_hosts.c
index 42a3f5c1b..75cbcd7fb 100644
--- a/src/providers/ipa/ipa_hbac_hosts.c
+++ b/src/providers/ipa/ipa_hbac_hosts.c
@@ -28,7 +28,6 @@
struct ipa_hbac_host_state {
struct tevent_context *ev;
struct sysdb_ctx *sysdb;
- struct sss_domain_info *dom;
struct sdap_handle *sh;
struct sdap_options *opts;
const char *search_base;
@@ -52,7 +51,6 @@ struct tevent_req *
ipa_hbac_host_info_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_handle *sh,
struct sdap_options *opts,
const char *search_base)
@@ -70,7 +68,6 @@ ipa_hbac_host_info_send(TALLOC_CTX *mem_ctx,
state->ev = ev;
state->sysdb = sysdb;
- state->dom = dom;
state->sh = sh;
state->opts = opts;
state->search_base = search_base;
@@ -246,7 +243,6 @@ ipa_hbac_host_info_recv(struct tevent_req *req,
*/
static errno_t hbac_host_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *rule_name,
struct sysdb_attrs *rule_attrs,
const char *category_attr,
@@ -441,14 +437,13 @@ done:
errno_t
hbac_thost_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *rule_name,
struct sysdb_attrs *rule_attrs,
struct hbac_rule_element **thosts)
{
DEBUG(7, ("Processing target hosts for rule [%s]\n", rule_name));
- return hbac_host_attrs_to_rule(mem_ctx, sysdb, domain,
+ return hbac_host_attrs_to_rule(mem_ctx, sysdb,
rule_name, rule_attrs,
IPA_HOST_CATEGORY, IPA_MEMBER_HOST,
NULL, thosts);
@@ -457,7 +452,6 @@ hbac_thost_attrs_to_rule(TALLOC_CTX *mem_ctx,
errno_t
hbac_shost_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *rule_name,
struct sysdb_attrs *rule_attrs,
struct hbac_rule_element **source_hosts)
@@ -471,7 +465,7 @@ hbac_shost_attrs_to_rule(TALLOC_CTX *mem_ctx,
DEBUG(7, ("Processing source hosts for rule [%s]\n", rule_name));
- ret = hbac_host_attrs_to_rule(tmp_ctx, sysdb, domain,
+ ret = hbac_host_attrs_to_rule(tmp_ctx, sysdb,
rule_name, rule_attrs,
IPA_SOURCE_HOST_CATEGORY, IPA_SOURCE_HOST,
&host_count, &shosts);
diff --git a/src/providers/ipa/ipa_hbac_private.h b/src/providers/ipa/ipa_hbac_private.h
index 32b5d70ce..6b5956df0 100644
--- a/src/providers/ipa/ipa_hbac_private.h
+++ b/src/providers/ipa/ipa_hbac_private.h
@@ -103,7 +103,6 @@ struct tevent_req *
ipa_hbac_host_info_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_handle *sh,
struct sdap_options *opts,
const char *search_base);
@@ -119,7 +118,6 @@ ipa_hbac_host_info_recv(struct tevent_req *req,
errno_t
hbac_thost_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *rule_name,
struct sysdb_attrs *rule_attrs,
struct hbac_rule_element **thosts);
@@ -127,7 +125,6 @@ hbac_thost_attrs_to_rule(TALLOC_CTX *mem_ctx,
errno_t
hbac_shost_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *rule_name,
struct sysdb_attrs *rule_attrs,
struct hbac_rule_element **source_hosts);
@@ -142,7 +139,6 @@ struct tevent_req *
ipa_hbac_service_info_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_handle *sh,
struct sdap_options *opts,
const char *search_base);
@@ -158,7 +154,6 @@ ipa_hbac_service_info_recv(struct tevent_req *req,
errno_t
hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *rule_name,
struct sysdb_attrs *rule_attrs,
struct hbac_rule_element **services);
@@ -173,8 +168,6 @@ struct tevent_req *
ipa_hbac_rule_info_send(TALLOC_CTX *mem_ctx,
bool get_deny_rules,
struct tevent_context *ev,
- struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_handle *sh,
struct sdap_options *opts,
const char *search_base,
@@ -190,7 +183,6 @@ ipa_hbac_rule_info_recv(struct tevent_req *req,
errno_t
hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *rule_name,
struct sysdb_attrs *rule_attrs,
struct hbac_rule_element **users);
diff --git a/src/providers/ipa/ipa_hbac_rules.c b/src/providers/ipa/ipa_hbac_rules.c
index cc502a8fb..0b567dab8 100644
--- a/src/providers/ipa/ipa_hbac_rules.c
+++ b/src/providers/ipa/ipa_hbac_rules.c
@@ -38,8 +38,6 @@ struct tevent_req *
ipa_hbac_rule_info_send(TALLOC_CTX *mem_ctx,
bool get_deny_rules,
struct tevent_context *ev,
- struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_handle *sh,
struct sdap_options *opts,
const char *search_base,
diff --git a/src/providers/ipa/ipa_hbac_services.c b/src/providers/ipa/ipa_hbac_services.c
index dace7b235..cc4e6dea5 100644
--- a/src/providers/ipa/ipa_hbac_services.c
+++ b/src/providers/ipa/ipa_hbac_services.c
@@ -27,7 +27,6 @@
struct ipa_hbac_service_state {
struct tevent_context *ev;
struct sysdb_ctx *sysdb;
- struct sss_domain_info *dom;
struct sdap_handle *sh;
struct sdap_options *opts;
const char *search_base;
@@ -50,7 +49,6 @@ struct tevent_req *
ipa_hbac_service_info_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_handle *sh,
struct sdap_options *opts,
const char *search_base)
@@ -69,7 +67,6 @@ ipa_hbac_service_info_send(TALLOC_CTX *mem_ctx,
state->ev = ev;
state->sysdb = sysdb;
- state->dom = dom;
state->sh = sh;
state->opts = opts;
state->search_base = search_base;
@@ -260,7 +257,6 @@ ipa_hbac_service_info_recv(struct tevent_req *req,
errno_t
hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *rule_name,
struct sysdb_attrs *rule_attrs,
struct hbac_rule_element **services)
diff --git a/src/providers/ipa/ipa_hbac_users.c b/src/providers/ipa/ipa_hbac_users.c
index cf838e503..e25de6ad0 100644
--- a/src/providers/ipa/ipa_hbac_users.c
+++ b/src/providers/ipa/ipa_hbac_users.c
@@ -27,7 +27,6 @@
struct hbac_update_groups_state {
struct hbac_ctx *hbac_ctx;
struct sysdb_ctx *sysdb;
- struct sss_domain_info *domain;
};
@@ -150,7 +149,6 @@ done:
errno_t
hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *rule_name,
struct sysdb_attrs *rule_attrs,
struct hbac_rule_element **users)
diff --git a/src/providers/ipa/ipa_init.c b/src/providers/ipa/ipa_init.c
index 5d08b8c18..df22535d0 100644
--- a/src/providers/ipa/ipa_init.c
+++ b/src/providers/ipa/ipa_init.c
@@ -149,7 +149,7 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
/* nsupdate is available. Dynamic updates
* are supported
*/
- ret = ipa_dyndns_init(ctx, ctx->be, ipa_options);
+ ret = ipa_dyndns_init(ctx->be, ipa_options);
if (ret != EOK) {
DEBUG(1, ("Failure setting up automatic DNS update\n"));
/* We will continue without DNS updating */
diff --git a/src/providers/krb5/krb5_auth.c b/src/providers/krb5/krb5_auth.c
index d74068601..f177be513 100644
--- a/src/providers/krb5/krb5_auth.c
+++ b/src/providers/krb5/krb5_auth.c
@@ -148,7 +148,6 @@ static errno_t check_if_ccache_file_is_used(uid_t uid, const char *ccname,
static int krb5_mod_ccname(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *name,
const char *ccname,
int mod_op)
@@ -212,21 +211,19 @@ done:
static int krb5_save_ccname(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *name,
const char *ccname)
{
- return krb5_mod_ccname(mem_ctx, sysdb, domain, name, ccname,
+ return krb5_mod_ccname(mem_ctx, sysdb, name, ccname,
SYSDB_MOD_REP);
}
static int krb5_delete_ccname(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
const char *name,
const char *ccname)
{
- return krb5_mod_ccname(mem_ctx, sysdb, domain, name, ccname,
+ return krb5_mod_ccname(mem_ctx, sysdb, name, ccname,
SYSDB_MOD_DEL);
}
@@ -848,7 +845,6 @@ static void krb5_child_done(struct tevent_req *subreq)
}
ret = krb5_delete_ccname(state, state->be_ctx->sysdb,
- state->be_ctx->domain,
pd->user, kr->old_ccname);
if (ret != EOK) {
DEBUG(1, ("krb5_delete_ccname failed.\n"));
@@ -922,7 +918,6 @@ static void krb5_child_done(struct tevent_req *subreq)
}
ret = krb5_save_ccname(state, state->be_ctx->sysdb,
- state->be_ctx->domain,
pd->user, kr->ccname);
if (ret) {
DEBUG(1, ("krb5_save_ccname failed.\n"));
diff --git a/src/providers/ldap/ldap_auth.c b/src/providers/ldap/ldap_auth.c
index df4557938..f58d52fee 100644
--- a/src/providers/ldap/ldap_auth.c
+++ b/src/providers/ldap/ldap_auth.c
@@ -341,7 +341,6 @@ shadow_fail:
static int get_user_dn(TALLOC_CTX *memctx,
struct sysdb_ctx *sysdb,
struct sdap_options *opts,
- struct sss_domain_info *dom,
const char *username,
char **user_dn,
enum pwexpire *user_pw_expire_type,
@@ -604,7 +603,7 @@ static void auth_connect_done(struct tevent_req *subreq)
}
ret = get_user_dn(state, state->ctx->be->sysdb, state->ctx->opts,
- state->ctx->be->domain, state->username, &state->dn,
+ state->username, &state->dn,
&state->pw_expire_type, &state->pw_expire_data);
if (ret) {
tevent_req_error(req, ret);
diff --git a/src/providers/ldap/ldap_id_cleanup.c b/src/providers/ldap/ldap_id_cleanup.c
index 9c50ee485..27a86b9f6 100644
--- a/src/providers/ldap/ldap_id_cleanup.c
+++ b/src/providers/ldap/ldap_id_cleanup.c
@@ -171,8 +171,7 @@ struct global_cleanup_state {
static int cleanup_users(TALLOC_CTX *memctx, struct sdap_id_ctx *ctx);
static int cleanup_groups(TALLOC_CTX *memctx,
- struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain);
+ struct sysdb_ctx *sysdb);
struct tevent_req *ldap_id_cleanup_send(TALLOC_CTX *memctx,
struct tevent_context *ev,
@@ -203,8 +202,7 @@ struct tevent_req *ldap_id_cleanup_send(TALLOC_CTX *memctx,
}
ret = cleanup_groups(state,
- state->ctx->be->sysdb,
- state->ctx->be->domain);
+ state->ctx->be->sysdb);
if (ret) {
goto fail;
}
@@ -379,8 +377,7 @@ static int cleanup_users_logged_in(hash_table_t *table,
/* ==Group-Cleanup-Process================================================ */
static int cleanup_groups(TALLOC_CTX *memctx,
- struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain)
+ struct sysdb_ctx *sysdb)
{
TALLOC_CTX *tmpctx;
const char *attrs[] = { SYSDB_NAME, SYSDB_GIDNUM, NULL };
diff --git a/src/providers/ldap/sdap.c b/src/providers/ldap/sdap.c
index c3f507bb1..373bd4d22 100644
--- a/src/providers/ldap/sdap.c
+++ b/src/providers/ldap/sdap.c
@@ -281,7 +281,6 @@ int sdap_parse_group(TALLOC_CTX *memctx, struct sdap_options *opts,
errno_t sdap_parse_deref(TALLOC_CTX *mem_ctx,
struct sdap_attr_map_info *minfo,
size_t num_maps,
- struct sdap_handle *sh,
LDAPDerefRes *dref,
struct sdap_deref_attrs ***_res)
{
@@ -733,7 +732,6 @@ done:
}
errno_t sdap_set_config_options_with_rootdse(struct sysdb_attrs *rootdse,
- struct sdap_handle *sh,
struct sdap_options *opts)
{
int ret;
diff --git a/src/providers/ldap/sdap.h b/src/providers/ldap/sdap.h
index b32560a8f..c8eb92819 100644
--- a/src/providers/ldap/sdap.h
+++ b/src/providers/ldap/sdap.h
@@ -357,7 +357,6 @@ int sdap_parse_group(TALLOC_CTX *memctx, struct sdap_options *opts,
errno_t sdap_parse_deref(TALLOC_CTX *mem_ctx,
struct sdap_attr_map_info *minfo,
size_t num_maps,
- struct sdap_handle *sh,
LDAPDerefRes *dref,
struct sdap_deref_attrs ***_res);
@@ -387,7 +386,6 @@ int sdap_control_create(struct sdap_handle *sh, const char *oid, int iscritical,
struct berval *value, int dupval, LDAPControl **ctrlp);
errno_t sdap_set_config_options_with_rootdse(struct sysdb_attrs *rootdse,
- struct sdap_handle *sh,
struct sdap_options *opts);
int sdap_get_server_opts_from_rootdse(TALLOC_CTX *memctx,
const char *server,
diff --git a/src/providers/ldap/sdap_access.c b/src/providers/ldap/sdap_access.c
index 9f10a1464..287ba1254 100644
--- a/src/providers/ldap/sdap_access.c
+++ b/src/providers/ldap/sdap_access.c
@@ -71,7 +71,6 @@ static void sdap_access_filter_done(struct tevent_req *subreq);
static struct tevent_req *sdap_account_expired_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
- struct be_ctx *be_ctx,
struct sdap_access_ctx *access_ctx,
struct pam_data *pd,
struct ldb_message *user_entry);
@@ -82,7 +81,6 @@ static void sdap_access_service_done(struct tevent_req *subreq);
static struct tevent_req *sdap_access_service_send(
TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
- struct sdap_access_ctx *access_ctx,
struct pam_data *pd,
struct ldb_message *user_entry);
@@ -95,8 +93,6 @@ static void sdap_access_host_done(struct tevent_req *subreq);
static struct tevent_req *sdap_access_host_send(
TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
- struct sdap_access_ctx *access_ctx,
- struct pam_data *pd,
struct ldb_message *user_entry);
static void sdap_access_done(struct tevent_req *req);
@@ -247,7 +243,7 @@ static errno_t select_next_rule(struct tevent_req *req)
return EOK;
case LDAP_ACCESS_EXPIRE:
- subreq = sdap_account_expired_send(state, state->ev, state->be_ctx,
+ subreq = sdap_account_expired_send(state, state->ev,
state->access_ctx,
state->pd,
state->user_entry);
@@ -261,7 +257,6 @@ static errno_t select_next_rule(struct tevent_req *req)
case LDAP_ACCESS_SERVICE:
subreq = sdap_access_service_send(state, state->ev,
- state->access_ctx,
state->pd,
state->user_entry);
if (subreq == NULL) {
@@ -273,9 +268,7 @@ static errno_t select_next_rule(struct tevent_req *req)
case LDAP_ACCESS_HOST:
subreq = sdap_access_host_send(state, state->ev,
- state->access_ctx,
- state->pd,
- state->user_entry);
+ state->user_entry);
if (subreq == NULL) {
DEBUG(1, ("sdap_access_host_send failed.\n"));
return ENOMEM;
@@ -645,7 +638,6 @@ struct sdap_account_expired_req_ctx {
static struct tevent_req *sdap_account_expired_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
- struct be_ctx *be_ctx,
struct sdap_access_ctx *access_ctx,
struct pam_data *pd,
struct ldb_message *user_entry)
@@ -1126,7 +1118,6 @@ struct sdap_access_service_ctx {
static struct tevent_req *sdap_access_service_send(
TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
- struct sdap_access_ctx *access_ctx,
struct pam_data *pd,
struct ldb_message *user_entry)
{
@@ -1260,8 +1251,6 @@ struct sdap_access_host_ctx {
static struct tevent_req *sdap_access_host_send(
TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
- struct sdap_access_ctx *access_ctx,
- struct pam_data *pd,
struct ldb_message *user_entry)
{
errno_t ret;
diff --git a/src/providers/ldap/sdap_async.c b/src/providers/ldap/sdap_async.c
index a1355f93e..b1177e274 100644
--- a/src/providers/ldap/sdap_async.c
+++ b/src/providers/ldap/sdap_async.c
@@ -933,6 +933,7 @@ sdap_get_generic_ext_send(TALLOC_CTX *memctx,
state->attrs = attrs;
state->attrsonly = attrsonly;
state->op = NULL;
+ state->sizelimit = sizelimit;
state->timeout = timeout;
state->cookie.bv_len = 0;
state->cookie.bv_val = NULL;
@@ -1452,7 +1453,7 @@ static errno_t sdap_x_deref_parse_entry(struct sdap_handle *sh,
for (dref = deref_res; dref; dref=dref->next) {
ret = sdap_parse_deref(tmp_ctx, state->maps, state->num_maps,
- state->sh, dref, &res);
+ dref, &res);
if (ret) {
DEBUG(SSSDBG_OP_FAILURE, ("sdap_parse_deref failed [%d]: %s\n",
ret, strerror(ret)));
diff --git a/src/providers/ldap/sdap_async_connection.c b/src/providers/ldap/sdap_async_connection.c
index cb7325365..dfec3548a 100644
--- a/src/providers/ldap/sdap_async_connection.c
+++ b/src/providers/ldap/sdap_async_connection.c
@@ -982,8 +982,7 @@ struct sdap_auth_state {
};
static void sdap_auth_done(struct tevent_req *subreq);
-static int sdap_auth_get_authtok(TALLOC_CTX *memctx,
- const char *authtok_type,
+static int sdap_auth_get_authtok(const char *authtok_type,
struct dp_opt_blob authtok,
struct berval *pw);
@@ -1006,7 +1005,7 @@ struct tevent_req *sdap_auth_send(TALLOC_CTX *memctx,
state->user_dn = user_dn;
- ret = sdap_auth_get_authtok(state, authtok_type, authtok, &state->pw);
+ ret = sdap_auth_get_authtok(authtok_type, authtok, &state->pw);
if (ret != EOK) {
if (ret == ENOSYS) {
DEBUG(1, ("Getting authtok is not supported with the "
@@ -1039,8 +1038,7 @@ struct tevent_req *sdap_auth_send(TALLOC_CTX *memctx,
return req;
}
-static int sdap_auth_get_authtok(TALLOC_CTX *mem_ctx,
- const char *authtok_type,
+static int sdap_auth_get_authtok(const char *authtok_type,
struct dp_opt_blob authtok,
struct berval *pw)
{
@@ -1353,8 +1351,7 @@ static void sdap_cli_rootdse_done(struct tevent_req *subreq)
return;
}
- ret = sdap_set_config_options_with_rootdse(rootdse, state->sh,
- state->opts);
+ ret = sdap_set_config_options_with_rootdse(rootdse, state->opts);
if (ret) {
DEBUG(1, ("sdap_set_config_options_with_rootdse failed.\n"));
tevent_req_error(req, ret);
@@ -1680,8 +1677,7 @@ static int sdap_rebind_proc(LDAP *ldap, LDAP_CONST char *url, ber_tag_t request,
user_dn = dp_opt_get_string(p->opts->basic, SDAP_DEFAULT_BIND_DN);
if (user_dn != NULL) {
- ret = sdap_auth_get_authtok(tmp_ctx,
- dp_opt_get_string(p->opts->basic,
+ ret = sdap_auth_get_authtok(dp_opt_get_string(p->opts->basic,
SDAP_DEFAULT_AUTHTOK_TYPE),
dp_opt_get_blob(p->opts->basic,
SDAP_DEFAULT_AUTHTOK),
diff --git a/src/providers/ldap/sdap_async_groups.c b/src/providers/ldap/sdap_async_groups.c
index 25a3e0a5b..11f6b5c7d 100644
--- a/src/providers/ldap/sdap_async_groups.c
+++ b/src/providers/ldap/sdap_async_groups.c
@@ -178,9 +178,7 @@ done:
/* FIXME: support storing additional attributes */
static errno_t
-sdap_store_group_with_gid(TALLOC_CTX *mem_ctx,
- struct sysdb_ctx *ctx,
- struct sss_domain_info *domain,
+sdap_store_group_with_gid(struct sysdb_ctx *ctx,
const char *name,
gid_t gid,
struct sysdb_attrs *group_attrs,
@@ -387,7 +385,7 @@ static int sdap_save_group(TALLOC_CTX *memctx,
DEBUG(6, ("Storing info for group %s\n", name));
- ret = sdap_store_group_with_gid(group_attrs, ctx, dom,
+ ret = sdap_store_group_with_gid(ctx,
name, gid, group_attrs,
dp_opt_get_int(opts->basic,
SDAP_ENTRY_CACHE_TIMEOUT),
@@ -1530,7 +1528,6 @@ int sdap_get_groups_recv(struct tevent_req *req,
}
static errno_t sdap_nested_group_populate_users(struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_options *opts,
struct sysdb_attrs **users,
int num_users);
@@ -1608,8 +1605,8 @@ static void sdap_nested_done(struct tevent_req *subreq)
}
in_transaction = true;
- ret = sdap_nested_group_populate_users(state->sysdb, state->dom,
- state->opts, users, user_count);
+ ret = sdap_nested_group_populate_users(state->sysdb, state->opts,
+ users, user_count);
if (ret != EOK) {
goto fail;
}
@@ -1642,7 +1639,6 @@ fail:
}
static errno_t sdap_nested_group_populate_users(struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_options *opts,
struct sysdb_attrs **users,
int num_users)
@@ -1970,7 +1966,6 @@ immediate:
static errno_t sdap_nested_group_check_hash(struct sdap_nested_group_ctx *);
static errno_t sdap_nested_group_check_cache(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
struct sdap_options *opts,
char *member_dn,
struct ldb_message ***_msgs,
@@ -2026,7 +2021,7 @@ static errno_t sdap_nested_group_process_deref_step(struct tevent_req *req)
}
ret = sdap_nested_group_check_cache(state, state->sysdb,
- state->domain, state->opts,
+ state->opts,
state->member_dn,
&msgs, &mtype);
if (ret == EOK) {
@@ -2132,7 +2127,7 @@ static errno_t sdap_nested_group_process_step(struct tevent_req *req)
}
ret = sdap_nested_group_check_cache(state, state->sysdb,
- state->domain, state->opts,
+ state->opts,
state->member_dn,
&msgs, &mtype);
if (ret == EOK) {
@@ -2225,7 +2220,6 @@ sdap_nested_group_check_hash(struct sdap_nested_group_ctx *state)
static errno_t
sdap_nested_group_check_cache(TALLOC_CTX *mem_ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *domain,
struct sdap_options *opts,
char *dn,
struct ldb_message ***_msgs,
diff --git a/src/providers/ldap/sdap_async_initgroups.c b/src/providers/ldap/sdap_async_initgroups.c
index 0ab30cfdb..08eff0f00 100644
--- a/src/providers/ldap/sdap_async_initgroups.c
+++ b/src/providers/ldap/sdap_async_initgroups.c
@@ -29,7 +29,6 @@
/* ==Save-fake-group-list=====================================*/
static errno_t sdap_add_incomplete_groups(struct sysdb_ctx *sysdb,
struct sdap_options *opts,
- struct sss_domain_info *dom,
char **groupnames,
struct sysdb_attrs **ldap_groups,
int ldap_groups_count)
@@ -162,7 +161,6 @@ fail:
static int sdap_initgr_common_store(struct sysdb_ctx *sysdb,
struct sdap_options *opts,
- struct sss_domain_info *dom,
const char *name,
enum sysdb_member_type type,
char **sysdb_grouplist,
@@ -216,7 +214,7 @@ static int sdap_initgr_common_store(struct sysdb_ctx *sysdb,
* member of but that are not cached in sysdb
*/
if (add_groups && add_groups[0]) {
- ret = sdap_add_incomplete_groups(sysdb, opts, dom,
+ ret = sdap_add_incomplete_groups(sysdb, opts,
add_groups, ldap_groups,
ldap_groups_count);
if (ret != EOK) {
@@ -260,7 +258,6 @@ struct sdap_initgr_rfc2307_state {
struct tevent_context *ev;
struct sysdb_ctx *sysdb;
struct sdap_options *opts;
- struct sss_domain_info *dom;
struct sdap_handle *sh;
const char **attrs;
const char *name;
@@ -284,9 +281,7 @@ struct tevent_req *sdap_initgr_rfc2307_send(TALLOC_CTX *memctx,
struct tevent_context *ev,
struct sdap_options *opts,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_handle *sh,
- const char *base_dn,
const char *name)
{
struct tevent_req *req;
@@ -300,7 +295,6 @@ struct tevent_req *sdap_initgr_rfc2307_send(TALLOC_CTX *memctx,
state->ev = ev;
state->opts = opts;
state->sysdb = sysdb;
- state->dom = dom;
state->sh = sh;
state->op = NULL;
state->timeout = dp_opt_get_int(state->opts->basic, SDAP_SEARCH_TIMEOUT);
@@ -485,7 +479,7 @@ static void sdap_initgr_rfc2307_process(struct tevent_req *subreq)
/* There are no nested groups here so we can just update the
* memberships */
ret = sdap_initgr_common_store(state->sysdb, state->opts,
- state->dom, state->name,
+ state->name,
SYSDB_MEMBER_USER,
sysdb_grouplist,
state->ldap_groups,
@@ -508,7 +502,6 @@ static int sdap_initgr_rfc2307_recv(struct tevent_req *req)
/* ==Common code for pure RFC2307bis and IPA/AD========================= */
static errno_t
sdap_nested_groups_store(struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
struct sdap_options *opts,
struct sysdb_attrs **groups,
unsigned long count)
@@ -540,7 +533,7 @@ sdap_nested_groups_store(struct sysdb_ctx *sysdb,
}
in_transaction = true;
- ret = sdap_add_incomplete_groups(sysdb, opts, dom, groupnamelist,
+ ret = sdap_add_incomplete_groups(sysdb, opts, groupnamelist,
groups, count);
if (ret != EOK) {
DEBUG(6, ("Could not add incomplete groups [%d]: %s\n",
@@ -874,7 +867,7 @@ fail:
static errno_t
sdap_initgr_store_groups(struct sdap_initgr_nested_state *state)
{
- return sdap_nested_groups_store(state->sysdb, state->dom,
+ return sdap_nested_groups_store(state->sysdb,
state->opts, state->groups,
state->groups_cur);
}
@@ -1606,7 +1599,7 @@ save_rfc2307bis_groups(struct sdap_initgr_rfc2307bis_state *state)
}
talloc_zfree(values);
- ret = sdap_nested_groups_store(state->sysdb, state->dom, state->opts,
+ ret = sdap_nested_groups_store(state->sysdb, state->opts,
groups, count);
if (ret != EOK) {
DEBUG(3, ("Could not save groups [%d]: %s\n",
@@ -2430,10 +2423,8 @@ static void sdap_get_initgr_user(struct tevent_req *subreq)
}
subreq = sdap_initgr_rfc2307_send(state, state->ev, state->opts,
- state->sysdb, state->dom, state->sh,
- dp_opt_get_string(state->opts->basic,
- SDAP_GROUP_SEARCH_BASE),
- state->name);
+ state->sysdb, state->sh,
+ state->name);
if (!subreq) {
tevent_req_error(req, ENOMEM);
return;
diff --git a/src/providers/ldap/sdap_async_netgroups.c b/src/providers/ldap/sdap_async_netgroups.c
index 1f0d1dd27..e963159c4 100644
--- a/src/providers/ldap/sdap_async_netgroups.c
+++ b/src/providers/ldap/sdap_async_netgroups.c
@@ -39,7 +39,6 @@ static bool is_dn(const char *str)
static errno_t sdap_save_netgroup(TALLOC_CTX *memctx,
struct sysdb_ctx *ctx,
struct sdap_options *opts,
- struct sss_domain_info *dom,
struct sysdb_attrs *attrs,
char **_timestamp,
time_t now)
@@ -239,7 +238,6 @@ struct netgr_translate_members_state {
struct tevent_context *ev;
struct sdap_options *opts;
struct sdap_handle *sh;
- struct sss_domain_info *dom;
struct sysdb_ctx *sysdb;
struct sysdb_attrs **netgroups;
@@ -284,7 +282,6 @@ struct tevent_req *netgr_translate_members_send(TALLOC_CTX *memctx,
state->ev = ev;
state->opts = opts;
- state->dom = dom;
state->sh = sh;
state->sysdb = sysdb;
state->netgroups = netgroups;
@@ -729,7 +726,7 @@ static void netgr_translate_members_done(struct tevent_req *subreq)
now = time(NULL);
for (c = 0; c < state->count; c++) {
ret = sdap_save_netgroup(state, state->sysdb,
- state->opts, state->dom,
+ state->opts,
state->netgroups[c],
&state->higher_timestamp,
now);
diff --git a/src/providers/proxy/proxy.h b/src/providers/proxy/proxy.h
index fdf037c5d..c75242890 100644
--- a/src/providers/proxy/proxy.h
+++ b/src/providers/proxy/proxy.h
@@ -142,7 +142,6 @@ void proxy_pam_handler(struct be_req *req);
/* From proxy_netgroup.c */
errno_t get_netgroup(struct proxy_id_ctx *ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
const char *name);
diff --git a/src/providers/proxy/proxy_id.c b/src/providers/proxy/proxy_id.c
index c7fdf356c..0a5f5427e 100644
--- a/src/providers/proxy/proxy_id.c
+++ b/src/providers/proxy/proxy_id.c
@@ -1176,7 +1176,7 @@ void proxy_get_account_info(struct be_req *breq)
ENODEV, "Netgroups are not supported");
}
- ret = get_netgroup(ctx, sysdb, domain, ar->filter_value);
+ ret = get_netgroup(ctx, sysdb, ar->filter_value);
break;
default: /*fail*/
diff --git a/src/providers/proxy/proxy_netgroup.c b/src/providers/proxy/proxy_netgroup.c
index bad0ee450..d0dd819e7 100644
--- a/src/providers/proxy/proxy_netgroup.c
+++ b/src/providers/proxy/proxy_netgroup.c
@@ -65,7 +65,6 @@ static errno_t make_netgroup_attr(struct __netgrent netgrent,
errno_t get_netgroup(struct proxy_id_ctx *ctx,
struct sysdb_ctx *sysdb,
- struct sss_domain_info *dom,
const char *name)
{
struct __netgrent result;