summaryrefslogtreecommitdiffstats
path: root/src/providers/ipa
diff options
context:
space:
mode:
Diffstat (limited to 'src/providers/ipa')
-rw-r--r--src/providers/ipa/ipa_access.c70
-rw-r--r--src/providers/ipa/ipa_auth.c66
-rw-r--r--src/providers/ipa/ipa_autofs.c4
-rw-r--r--src/providers/ipa/ipa_common.c174
-rw-r--r--src/providers/ipa/ipa_config.c8
-rw-r--r--src/providers/ipa/ipa_dyndns.c36
-rw-r--r--src/providers/ipa/ipa_hbac_common.c88
-rw-r--r--src/providers/ipa/ipa_hbac_hosts.c42
-rw-r--r--src/providers/ipa/ipa_hbac_rules.c18
-rw-r--r--src/providers/ipa/ipa_hbac_services.c56
-rw-r--r--src/providers/ipa/ipa_hbac_users.c34
-rw-r--r--src/providers/ipa/ipa_hostid.c8
-rw-r--r--src/providers/ipa/ipa_hosts.c22
-rw-r--r--src/providers/ipa/ipa_id.c10
-rw-r--r--src/providers/ipa/ipa_idmap.c82
-rw-r--r--src/providers/ipa/ipa_init.c94
-rw-r--r--src/providers/ipa/ipa_netgroups.c56
-rw-r--r--src/providers/ipa/ipa_s2n_exop.c116
-rw-r--r--src/providers/ipa/ipa_selinux.c110
-rw-r--r--src/providers/ipa/ipa_selinux_maps.c8
-rw-r--r--src/providers/ipa/ipa_srv.c10
-rw-r--r--src/providers/ipa/ipa_subdomains.c174
-rw-r--r--src/providers/ipa/ipa_subdomains_ext_groups.c162
-rw-r--r--src/providers/ipa/ipa_subdomains_id.c62
-rw-r--r--src/providers/ipa/ipa_sudo.c6
25 files changed, 758 insertions, 758 deletions
diff --git a/src/providers/ipa/ipa_access.c b/src/providers/ipa/ipa_access.c
index c601935a6..efe920331 100644
--- a/src/providers/ipa/ipa_access.c
+++ b/src/providers/ipa/ipa_access.c
@@ -152,7 +152,7 @@ static void ipa_hbac_check(struct tevent_req *req)
hbac_ctx = talloc_zero(be_req, struct hbac_ctx);
if (hbac_ctx == NULL) {
- DEBUG(1, ("talloc failed.\n"));
+ DEBUG(1, "talloc failed.\n");
ret = ENOMEM;
goto fail;
}
@@ -167,7 +167,7 @@ static void ipa_hbac_check(struct tevent_req *req)
hbac_ctx->tr_ctx = ipa_access_ctx->tr_ctx;
hbac_ctx->search_bases = ipa_access_ctx->hbac_search_bases;
if (hbac_ctx->search_bases == NULL) {
- DEBUG(1, ("No HBAC search base found.\n"));
+ DEBUG(1, "No HBAC search base found.\n");
ret = EINVAL;
goto fail;
}
@@ -206,7 +206,7 @@ static int hbac_retry(struct hbac_ctx *hbac_ctx)
struct be_ctx *be_ctx = be_req_get_be_ctx(hbac_ctx->be_req);
offline = be_is_offline(be_ctx);
- DEBUG(9, ("Connection status is [%s].\n", offline ? "offline" : "online"));
+ DEBUG(9, "Connection status is [%s].\n", offline ? "offline" : "online");
refresh_interval = dp_opt_get_int(hbac_ctx->ipa_options,
IPA_HBAC_REFRESH);
@@ -214,7 +214,7 @@ static int hbac_retry(struct hbac_ctx *hbac_ctx)
now = time(NULL);
if (now < access_ctx->last_update + refresh_interval) {
/* Simulate offline mode and just go to the cache */
- DEBUG(6, ("Performing cached HBAC evaluation\n"));
+ DEBUG(6, "Performing cached HBAC evaluation\n");
offline = true;
}
@@ -223,14 +223,14 @@ static int hbac_retry(struct hbac_ctx *hbac_ctx)
hbac_ctx->sdap_op = sdap_id_op_create(hbac_ctx,
hbac_ctx->sdap_ctx->conn->conn_cache);
if (hbac_ctx->sdap_op == NULL) {
- DEBUG(1, ("sdap_id_op_create failed.\n"));
+ DEBUG(1, "sdap_id_op_create failed.\n");
return EIO;
}
}
subreq = sdap_id_op_connect_send(hbac_ctx->sdap_op, hbac_ctx, &ret);
if (!subreq) {
- DEBUG(1, ("sdap_id_op_connect_send failed: %d(%s).\n", ret, strerror(ret)));
+ DEBUG(1, "sdap_id_op_connect_send failed: %d(%s).\n", ret, strerror(ret));
talloc_zfree(hbac_ctx->sdap_op);
return ret;
}
@@ -357,8 +357,8 @@ static int hbac_get_host_info_step(struct hbac_ctx *hbac_ctx)
hostname = NULL;
/* THIS FEATURE IS DEPRECATED */
- DEBUG(SSSDBG_MINOR_FAILURE, ("WARNING: Using deprecated option "
- "ipa_hbac_support_srchost.\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "WARNING: Using deprecated option "
+ "ipa_hbac_support_srchost.\n");
sss_log(SSS_LOG_NOTICE, "WARNING: Using deprecated option "
"ipa_hbac_support_srchost.\n");
} else {
@@ -373,7 +373,7 @@ static int hbac_get_host_info_step(struct hbac_ctx *hbac_ctx)
hbac_ctx->access_ctx->hostgroup_map,
hbac_ctx->access_ctx->host_search_bases);
if (req == NULL) {
- DEBUG(1, ("Could not get host info\n"));
+ DEBUG(1, "Could not get host info\n");
return ENOMEM;
}
tevent_req_set_callback(req, hbac_get_service_info_step, hbac_ctx);
@@ -404,7 +404,7 @@ static void hbac_get_service_info_step(struct tevent_req *req)
hbac_ctx->sdap_ctx->opts,
hbac_ctx->search_bases);
if (req == NULL) {
- DEBUG(1,("Could not get service info\n"));
+ DEBUG(1,"Could not get service info\n");
goto fail;
}
tevent_req_set_callback(req, hbac_get_rule_info_step, hbac_ctx);
@@ -438,7 +438,7 @@ static void hbac_get_rule_info_step(struct tevent_req *req)
hbac_ctx->ipa_host = NULL;
ipa_hostname = dp_opt_get_cstring(hbac_ctx->ipa_options, IPA_HOSTNAME);
if (ipa_hostname == NULL) {
- DEBUG(1, ("Missing ipa_hostname, this should never happen.\n"));
+ DEBUG(1, "Missing ipa_hostname, this should never happen.\n");
goto fail;
}
@@ -447,7 +447,7 @@ static void hbac_get_rule_info_step(struct tevent_req *req)
SYSDB_FQDN,
&hostname);
if (ret != EOK) {
- DEBUG(1, ("Could not locate IPA host\n"));
+ DEBUG(1, "Could not locate IPA host\n");
goto fail;
}
@@ -457,7 +457,7 @@ static void hbac_get_rule_info_step(struct tevent_req *req)
}
}
if (hbac_ctx->ipa_host == NULL) {
- DEBUG(1, ("Could not locate IPA host\n"));
+ DEBUG(1, "Could not locate IPA host\n");
goto fail;
}
@@ -471,7 +471,7 @@ static void hbac_get_rule_info_step(struct tevent_req *req)
hbac_ctx->search_bases,
hbac_ctx->ipa_host);
if (req == NULL) {
- DEBUG(1, ("Could not get rules\n"));
+ DEBUG(1, "Could not get rules\n");
goto fail;
}
@@ -523,7 +523,7 @@ static void hbac_sysdb_save(struct tevent_req *req)
ret = sysdb_delete_recursive(domain->sysdb, base_dn, true);
talloc_free(tmp_ctx);
if (ret != EOK) {
- DEBUG(1, ("sysdb_delete_recursive failed.\n"));
+ DEBUG(1, "sysdb_delete_recursive failed.\n");
ipa_access_reply(hbac_ctx, PAM_SYSTEM_ERR);
return;
}
@@ -539,7 +539,7 @@ static void hbac_sysdb_save(struct tevent_req *req)
ret = sysdb_transaction_start(domain->sysdb);
if (ret != EOK) {
- DEBUG(0, ("Could not start transaction\n"));
+ DEBUG(0, "Could not start transaction\n");
goto fail;
}
in_transaction = true;
@@ -552,8 +552,8 @@ static void hbac_sysdb_save(struct tevent_req *req)
hbac_ctx->hostgroup_count,
hbac_ctx->hostgroups);
if (ret != EOK) {
- DEBUG(1, ("Error saving hosts: [%d][%s]\n",
- ret, strerror(ret)));
+ DEBUG(1, "Error saving hosts: [%d][%s]\n",
+ ret, strerror(ret));
goto fail;
}
@@ -565,8 +565,8 @@ static void hbac_sysdb_save(struct tevent_req *req)
hbac_ctx->servicegroup_count,
hbac_ctx->servicegroups);
if (ret != EOK) {
- DEBUG(1, ("Error saving services: [%d][%s]\n",
- ret, strerror(ret)));
+ DEBUG(1, "Error saving services: [%d][%s]\n",
+ ret, strerror(ret));
goto fail;
}
/* Save the rules */
@@ -576,14 +576,14 @@ static void hbac_sysdb_save(struct tevent_req *req)
hbac_ctx->rules,
NULL, NULL, 0, NULL);
if (ret != EOK) {
- DEBUG(1, ("Error saving rules: [%d][%s]\n",
- ret, strerror(ret)));
+ DEBUG(1, "Error saving rules: [%d][%s]\n",
+ ret, strerror(ret));
goto fail;
}
ret = sysdb_transaction_commit(domain->sysdb);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to commit transaction\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to commit transaction\n");
goto fail;
}
in_transaction = false;
@@ -606,7 +606,7 @@ fail:
if (in_transaction) {
ret = sysdb_transaction_cancel(domain->sysdb);
if (ret != EOK) {
- DEBUG(0, ("Could not cancel transaction\n"));
+ DEBUG(0, "Could not cancel transaction\n");
}
}
ipa_access_reply(hbac_ctx, PAM_SYSTEM_ERR);
@@ -625,43 +625,43 @@ void ipa_hbac_evaluate_rules(struct hbac_ctx *hbac_ctx)
ret = hbac_get_cached_rules(hbac_ctx, be_ctx->domain,
&hbac_ctx->rule_count, &hbac_ctx->rules);
if (ret != EOK) {
- DEBUG(1, ("Could not retrieve rules from the cache\n"));
+ DEBUG(1, "Could not retrieve rules from the cache\n");
ipa_access_reply(hbac_ctx, PAM_SYSTEM_ERR);
}
ret = hbac_ctx_to_rules(hbac_ctx, hbac_ctx,
&hbac_rules, &eval_req);
if (ret == EPERM) {
- DEBUG(1, ("DENY rules detected. Denying access to all users\n"));
+ DEBUG(1, "DENY rules detected. Denying access to all users\n");
ipa_access_reply(hbac_ctx, PAM_PERM_DENIED);
return;
} else if (ret != EOK) {
- DEBUG(1, ("Could not construct HBAC rules\n"));
+ DEBUG(1, "Could not construct HBAC rules\n");
ipa_access_reply(hbac_ctx, PAM_SYSTEM_ERR);
return;
}
result = hbac_evaluate(hbac_rules, eval_req, &info);
if (result == HBAC_EVAL_ALLOW) {
- DEBUG(3, ("Access granted by HBAC rule [%s]\n",
- info->rule_name));
+ DEBUG(3, "Access granted by HBAC rule [%s]\n",
+ info->rule_name);
hbac_free_info(info);
ipa_access_reply(hbac_ctx, PAM_SUCCESS);
return;
} else if (result == HBAC_EVAL_ERROR) {
- DEBUG(1, ("Error [%s] occurred in rule [%s]\n",
+ DEBUG(1, "Error [%s] occurred in rule [%s]\n",
hbac_error_string(info->code),
- info->rule_name));
+ info->rule_name);
hbac_free_info(info);
ipa_access_reply(hbac_ctx, PAM_SYSTEM_ERR);
return;
} else if (result == HBAC_EVAL_OOM) {
- DEBUG(1, ("Insufficient memory\n"));
+ DEBUG(1, "Insufficient memory\n");
ipa_access_reply(hbac_ctx, PAM_SYSTEM_ERR);
return;
}
- DEBUG(3, ("Access denied by HBAC rules\n"));
+ DEBUG(3, "Access denied by HBAC rules\n");
hbac_free_info(info);
ipa_access_reply(hbac_ctx, PAM_PERM_DENIED);
}
@@ -707,7 +707,7 @@ errno_t hbac_get_cached_rules(TALLOC_CTX *mem_ctx,
HBAC_RULES_SUBDIR, attrs,
&rule_count, &msgs);
if (ret != EOK && ret != ENOENT) {
- DEBUG(1, ("Error looking up HBAC rules"));
+ DEBUG(1, "Error looking up HBAC rules");
goto done;
} if (ret == ENOENT) {
rule_count = 0;
@@ -715,7 +715,7 @@ errno_t hbac_get_cached_rules(TALLOC_CTX *mem_ctx,
ret = sysdb_msg2attrs(tmp_ctx, rule_count, msgs, &rules);
if (ret != EOK) {
- DEBUG(1, ("Could not convert ldb message to sysdb_attrs\n"));
+ DEBUG(1, "Could not convert ldb message to sysdb_attrs\n");
goto done;
}
diff --git a/src/providers/ipa/ipa_auth.c b/src/providers/ipa/ipa_auth.c
index 4bd142726..8fe2c1acc 100644
--- a/src/providers/ipa/ipa_auth.c
+++ b/src/providers/ipa/ipa_auth.c
@@ -55,14 +55,14 @@ static struct tevent_req *get_password_migration_flag_send(TALLOC_CTX *memctx,
struct get_password_migration_flag_state *state;
if (sdap_id_ctx == NULL || ipa_realm == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("Missing parameter.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Missing parameter.\n");
return NULL;
}
req = tevent_req_create(memctx, &state,
struct get_password_migration_flag_state);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("tevent_req_create failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "tevent_req_create failed.\n");
return NULL;
}
@@ -75,14 +75,14 @@ static struct tevent_req *get_password_migration_flag_send(TALLOC_CTX *memctx,
state->sdap_op = sdap_id_op_create(state,
state->sdap_id_ctx->conn->conn_cache);
if (state->sdap_op == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_create failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_create failed.\n");
goto fail;
}
subreq = sdap_id_op_connect_send(state->sdap_op, state, &ret);
if (!subreq) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_connect_send failed: %d(%s).\n",
- ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_connect_send failed: %d(%s).\n",
+ ret, strerror(ret));
goto fail;
}
@@ -108,12 +108,12 @@ static void get_password_migration_flag_auth_done(struct tevent_req *subreq)
if (ret) {
if (dp_error == DP_ERR_OFFLINE) {
DEBUG(SSSDBG_MINOR_FAILURE,
- ("No IPA server is available, cannot get the "
- "migration flag while offline\n"));
+ "No IPA server is available, cannot get the "
+ "migration flag while offline\n");
} else {
DEBUG(SSSDBG_OP_FAILURE,
- ("Failed to connect to IPA server: [%d](%s)\n",
- ret, strerror(ret)));
+ "Failed to connect to IPA server: [%d](%s)\n",
+ ret, strerror(ret));
}
tevent_req_error(req, ret);
@@ -194,7 +194,7 @@ void ipa_auth(struct be_req *be_req)
state = talloc_zero(be_req, struct ipa_auth_state);
if (state == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_zero failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_zero failed.\n");
goto fail;
}
@@ -219,14 +219,14 @@ void ipa_auth(struct be_req *be_req)
struct ipa_auth_ctx);
break;
default:
- DEBUG(SSSDBG_OP_FAILURE, ("Unsupported PAM task.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Unsupported PAM task.\n");
goto fail;
}
req = krb5_auth_send(state, state->ev, be_ctx, state->pd,
state->ipa_auth_ctx->krb5_auth_ctx);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("krb5_auth_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "krb5_auth_send failed.\n");
goto fail;
}
@@ -251,7 +251,7 @@ static void ipa_auth_handler_done(struct tevent_req *req)
talloc_zfree(req);
state->pd->pam_status = pam_status;
if (ret != EOK && pam_status != PAM_CRED_ERR) {
- DEBUG(SSSDBG_OP_FAILURE, ("krb5_auth_recv request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "krb5_auth_recv request failed.\n");
dp_err = DP_ERR_OK;
goto done;
}
@@ -270,7 +270,7 @@ static void ipa_auth_handler_done(struct tevent_req *req)
IPA_KRB5_REALM));
if (req == NULL) {
DEBUG(SSSDBG_OP_FAILURE,
- ("get_password_migration_flag failed.\n"));
+ "get_password_migration_flag failed.\n");
goto done;
}
@@ -292,8 +292,8 @@ static void ipa_get_migration_flag_done(struct tevent_req *req)
ret = get_password_migration_flag_recv(req, &state->password_migration);
talloc_zfree(req);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("get_password_migration_flag "
- "request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "get_password_migration_flag "
+ "request failed.\n");
state->pd->pam_status = PAM_SYSTEM_ERR;
dp_err = DP_ERR_OK;
goto done;
@@ -306,7 +306,7 @@ static void ipa_get_migration_flag_done(struct tevent_req *req)
state->ipa_auth_ctx->sdap_auth_ctx->service,
true, CON_TLS_ON, true);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_cli_connect_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_cli_connect_send failed.\n");
goto done;
}
@@ -314,7 +314,7 @@ static void ipa_get_migration_flag_done(struct tevent_req *req)
return;
}
- DEBUG(SSSDBG_CONF_SETTINGS, ("Password migration is not enabled.\n"));
+ DEBUG(SSSDBG_CONF_SETTINGS, "Password migration is not enabled.\n");
dp_err = DP_ERR_OK;
done:
be_req_terminate(state->be_req, dp_err, state->pd->pam_status, NULL);
@@ -335,17 +335,17 @@ static void ipa_migration_flag_connect_done(struct tevent_req *req)
talloc_zfree(req);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Cannot connect to LDAP server to perform migration\n"));
+ "Cannot connect to LDAP server to perform migration\n");
goto done;
}
state->pd->pam_status = PAM_SYSTEM_ERR;
- DEBUG(SSSDBG_TRACE_FUNC, ("Assuming Kerberos password is missing, "
- "starting password migration.\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "Assuming Kerberos password is missing, "
+ "starting password migration.\n");
attrs = talloc_array(state, const char *, 2);
if (attrs == NULL) {
- DEBUG(1, ("talloc_array failed.\n"));
+ DEBUG(1, "talloc_array failed.\n");
state->pd->pam_status = PAM_SYSTEM_ERR;
dp_err = DP_ERR_OK;
goto done;
@@ -356,14 +356,14 @@ static void ipa_migration_flag_connect_done(struct tevent_req *req)
ret = sysdb_search_user_by_name(state, be_ctx->domain, state->pd->user,
attrs, &user_msg);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_search_user_by_name failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_search_user_by_name failed.\n");
goto done;
}
dn = ldb_msg_find_attr_as_string(user_msg, SYSDB_ORIG_DN, NULL);
if (dn == NULL) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Missing original DN for user [%s].\n",
- state->pd->user));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Missing original DN for user [%s].\n",
+ state->pd->user);
state->pd->pam_status = PAM_SYSTEM_ERR;
dp_err = DP_ERR_OK;
goto done;
@@ -372,7 +372,7 @@ static void ipa_migration_flag_connect_done(struct tevent_req *req)
req = sdap_auth_send(state, state->ev, state->sh, NULL, NULL, dn,
state->pd->authtok);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_auth_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_auth_send failed.\n");
goto done;
}
@@ -401,26 +401,26 @@ static void ipa_auth_ldap_done(struct tevent_req *req)
case ERR_AUTH_FAILED:
case ERR_PASSWORD_EXPIRED:
/* TODO: do we need to handle expired passwords? */
- DEBUG(SSSDBG_MINOR_FAILURE, ("LDAP authentication failed, "
- "Password migration not possible.\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "LDAP authentication failed, "
+ "Password migration not possible.\n");
state->pd->pam_status = PAM_CRED_INSUFFICIENT;
dp_err = DP_ERR_OK;
goto done;
default:
- DEBUG(SSSDBG_OP_FAILURE, ("auth_send request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "auth_send request failed.\n");
state->pd->pam_status = PAM_SYSTEM_ERR;
dp_err = DP_ERR_OK;
goto done;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("LDAP authentication succeded, "
- "trying Kerberos authentication again.\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "LDAP authentication succeded, "
+ "trying Kerberos authentication again.\n");
req = krb5_auth_send(state, state->ev, be_ctx, state->pd,
state->ipa_auth_ctx->krb5_auth_ctx);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("krb5_auth_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "krb5_auth_send failed.\n");
goto done;
}
@@ -442,7 +442,7 @@ static void ipa_auth_handler_retry_done(struct tevent_req *req)
ret = krb5_auth_recv(req, &pam_status, &dp_err);
talloc_zfree(req);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("krb5_auth_recv request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "krb5_auth_recv request failed.\n");
state->pd->pam_status = PAM_SYSTEM_ERR;
dp_err = DP_ERR_OK;
goto done;
diff --git a/src/providers/ipa/ipa_autofs.c b/src/providers/ipa/ipa_autofs.c
index de343212f..504735d3e 100644
--- a/src/providers/ipa/ipa_autofs.c
+++ b/src/providers/ipa/ipa_autofs.c
@@ -44,7 +44,7 @@ int ipa_autofs_init(struct be_ctx *be_ctx,
{
int ret;
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Initializing autofs LDAP back end\n"));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Initializing autofs LDAP back end\n");
*ops = &ipa_autofs_ops;
*pvt_data = id_ctx->sdap_id_ctx;
@@ -52,7 +52,7 @@ int ipa_autofs_init(struct be_ctx *be_ctx,
ret = ipa_get_autofs_options(id_ctx->ipa_options, be_ctx->cdb,
be_ctx->conf_path, &id_ctx->sdap_id_ctx->opts);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Cannot get IPA autofs options\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Cannot get IPA autofs options\n");
return ret;
}
diff --git a/src/providers/ipa/ipa_common.c b/src/providers/ipa/ipa_common.c
index 671374098..180163b76 100644
--- a/src/providers/ipa/ipa_common.c
+++ b/src/providers/ipa/ipa_common.c
@@ -73,20 +73,20 @@ int ipa_get_options(TALLOC_CTX *memctx,
server = dp_opt_get_string(opts->basic, IPA_SERVER);
if (!server) {
- DEBUG(1, ("No ipa server set, will use service discovery!\n"));
+ DEBUG(1, "No ipa server set, will use service discovery!\n");
}
ipa_hostname = dp_opt_get_string(opts->basic, IPA_HOSTNAME);
if (ipa_hostname == NULL) {
ret = gethostname(hostname, HOST_NAME_MAX);
if (ret != EOK) {
- DEBUG(1, ("gethostname failed [%d][%s].\n", errno,
- strerror(errno)));
+ DEBUG(1, "gethostname failed [%d][%s].\n", errno,
+ strerror(errno));
ret = errno;
goto done;
}
hostname[HOST_NAME_MAX] = '\0';
- DEBUG(9, ("Setting ipa_hostname to [%s].\n", hostname));
+ DEBUG(9, "Setting ipa_hostname to [%s].\n", hostname);
ret = dp_opt_set_string(opts->basic, IPA_HOSTNAME, hostname);
if (ret != EOK) {
goto done;
@@ -150,7 +150,7 @@ static errno_t ipa_parse_search_base(TALLOC_CTX *mem_ctx,
break;
default:
DEBUG(SSSDBG_CONF_SETTINGS,
- ("Unknown search base type: [%d]\n", class));
+ "Unknown search base type: [%d]\n", class);
class_name = "UNKNOWN";
/* Non-fatal */
break;
@@ -224,9 +224,9 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(6, ("Option %s set to %s\n",
+ DEBUG(6, "Option %s set to %s\n",
ipa_opts->id->basic[SDAP_SEARCH_BASE].opt_name,
- dp_opt_get_string(ipa_opts->id->basic, SDAP_SEARCH_BASE)));
+ dp_opt_get_string(ipa_opts->id->basic, SDAP_SEARCH_BASE));
}
ret = sdap_parse_search_base(ipa_opts->id, ipa_opts->id->basic,
SDAP_SEARCH_BASE,
@@ -238,7 +238,7 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
realm = dp_opt_get_string(ipa_opts->basic, IPA_KRB5_REALM);
value = talloc_strdup(tmpctx, realm);
if (value == NULL) {
- DEBUG(1, ("talloc_strdup failed.\n"));
+ DEBUG(1, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -247,9 +247,9 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
if (ret != EOK) {
goto done;
}
- DEBUG(6, ("Option %s set to %s\n",
+ DEBUG(6, "Option %s set to %s\n",
ipa_opts->id->basic[SDAP_KRB5_REALM].opt_name,
- dp_opt_get_string(ipa_opts->id->basic, SDAP_KRB5_REALM)));
+ dp_opt_get_string(ipa_opts->id->basic, SDAP_KRB5_REALM));
}
ret = sdap_set_sasl_options(ipa_opts->id,
@@ -260,7 +260,7 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
dp_opt_get_string(ipa_opts->id->basic,
SDAP_KRB5_KEYTAB));
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot set the SASL-related options\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot set the SASL-related options\n");
goto done;
}
@@ -277,10 +277,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(6, ("Option %s set to %s\n",
+ DEBUG(6, "Option %s set to %s\n",
ipa_opts->id->basic[SDAP_USER_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->id->basic,
- SDAP_USER_SEARCH_BASE)));
+ SDAP_USER_SEARCH_BASE));
}
ret = sdap_parse_search_base(ipa_opts->id, ipa_opts->id->basic,
SDAP_USER_SEARCH_BASE,
@@ -296,10 +296,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(6, ("Option %s set to %s\n",
+ DEBUG(6, "Option %s set to %s\n",
ipa_opts->id->basic[SDAP_GROUP_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->id->basic,
- SDAP_GROUP_SEARCH_BASE)));
+ SDAP_GROUP_SEARCH_BASE));
}
ret = sdap_parse_search_base(ipa_opts->id, ipa_opts->id->basic,
SDAP_GROUP_SEARCH_BASE,
@@ -334,10 +334,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
}
#endif
- DEBUG(6, ("Option %s set to %s\n",
+ DEBUG(6, "Option %s set to %s\n",
ipa_opts->id->basic[SDAP_SUDO_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->id->basic,
- SDAP_SUDO_SEARCH_BASE)));
+ SDAP_SUDO_SEARCH_BASE));
}
ret = sdap_parse_search_base(ipa_opts->id, ipa_opts->id->basic,
SDAP_SUDO_SEARCH_BASE,
@@ -357,10 +357,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(6, ("Option %s set to %s\n",
+ DEBUG(6, "Option %s set to %s\n",
ipa_opts->id->basic[SDAP_NETGROUP_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->id->basic,
- SDAP_NETGROUP_SEARCH_BASE)));
+ SDAP_NETGROUP_SEARCH_BASE));
}
ret = sdap_parse_search_base(ipa_opts->id, ipa_opts->id->basic,
SDAP_NETGROUP_SEARCH_BASE,
@@ -376,10 +376,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(SSSDBG_CONF_SETTINGS, ("Option %s set to %s\n",
+ DEBUG(SSSDBG_CONF_SETTINGS, "Option %s set to %s\n",
ipa_opts->basic[IPA_HOST_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->basic,
- IPA_HOST_SEARCH_BASE)));
+ IPA_HOST_SEARCH_BASE));
}
ret = ipa_parse_search_base(ipa_opts->basic, ipa_opts->basic,
IPA_HOST_SEARCH_BASE,
@@ -399,10 +399,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(6, ("Option %s set to %s\n",
+ DEBUG(6, "Option %s set to %s\n",
ipa_opts->basic[IPA_HBAC_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->basic,
- IPA_HBAC_SEARCH_BASE)));
+ IPA_HBAC_SEARCH_BASE));
}
ret = ipa_parse_search_base(ipa_opts->basic, ipa_opts->basic,
IPA_HBAC_SEARCH_BASE,
@@ -422,10 +422,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(SSSDBG_CONF_SETTINGS, ("Option %s set to %s\n",
+ DEBUG(SSSDBG_CONF_SETTINGS, "Option %s set to %s\n",
ipa_opts->basic[IPA_SELINUX_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->basic,
- IPA_SELINUX_SEARCH_BASE)));
+ IPA_SELINUX_SEARCH_BASE));
}
ret = ipa_parse_search_base(ipa_opts->basic, ipa_opts->basic,
IPA_SELINUX_SEARCH_BASE,
@@ -436,7 +436,7 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
if (value != NULL) {
ret = deref_string_to_val(value, &i);
if (ret != EOK) {
- DEBUG(1, ("Failed to verify ldap_deref option.\n"));
+ DEBUG(1, "Failed to verify ldap_deref option.\n");
goto done;
}
}
@@ -450,10 +450,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(6, ("Option %s set to %s\n",
+ DEBUG(6, "Option %s set to %s\n",
ipa_opts->id->basic[SDAP_GROUP_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->id->basic,
- SDAP_GROUP_SEARCH_BASE)));
+ SDAP_GROUP_SEARCH_BASE));
}
ret = sdap_parse_search_base(ipa_opts->id, ipa_opts->id->basic,
SDAP_SERVICE_SEARCH_BASE,
@@ -473,10 +473,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(SSSDBG_CONF_SETTINGS, ("Option %s set to %s\n",
+ DEBUG(SSSDBG_CONF_SETTINGS, "Option %s set to %s\n",
ipa_opts->basic[IPA_SUBDOMAINS_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->basic,
- IPA_SUBDOMAINS_SEARCH_BASE)));
+ IPA_SUBDOMAINS_SEARCH_BASE));
}
ret = ipa_parse_search_base(ipa_opts, ipa_opts->basic,
IPA_SUBDOMAINS_SEARCH_BASE,
@@ -496,10 +496,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(SSSDBG_CONF_SETTINGS, ("Option %s set to %s\n",
+ DEBUG(SSSDBG_CONF_SETTINGS, "Option %s set to %s\n",
ipa_opts->basic[IPA_MASTER_DOMAIN_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->basic,
- IPA_MASTER_DOMAIN_SEARCH_BASE)));
+ IPA_MASTER_DOMAIN_SEARCH_BASE));
}
ret = ipa_parse_search_base(ipa_opts, ipa_opts->basic,
IPA_MASTER_DOMAIN_SEARCH_BASE,
@@ -519,10 +519,10 @@ int ipa_get_id_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(SSSDBG_CONF_SETTINGS, ("Option %s set to %s\n",
+ DEBUG(SSSDBG_CONF_SETTINGS, "Option %s set to %s\n",
ipa_opts->basic[IPA_RANGES_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->basic,
- IPA_RANGES_SEARCH_BASE)));
+ IPA_RANGES_SEARCH_BASE));
}
ret = ipa_parse_search_base(ipa_opts, ipa_opts->basic,
IPA_RANGES_SEARCH_BASE,
@@ -638,7 +638,7 @@ int ipa_get_auth_options(struct ipa_options *ipa_opts,
/* FIXME - this can be removed in a future version */
ret = krb5_try_kdcip(cdb, conf_path, ipa_opts->auth, KRB5_KDC);
if (ret != EOK) {
- DEBUG(1, ("sss_krb5_try_kdcip failed.\n"));
+ DEBUG(1, "sss_krb5_try_kdcip failed.\n");
goto done;
}
@@ -651,7 +651,7 @@ int ipa_get_auth_options(struct ipa_options *ipa_opts,
}
copy = talloc_strdup(ipa_opts->auth, value);
if (copy == NULL) {
- DEBUG(1, ("talloc_strdup failed.\n"));
+ DEBUG(1, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -659,9 +659,9 @@ int ipa_get_auth_options(struct ipa_options *ipa_opts,
if (ret != EOK) {
goto done;
}
- DEBUG(6, ("Option %s set to %s\n",
+ DEBUG(6, "Option %s set to %s\n",
ipa_opts->auth[KRB5_REALM].opt_name,
- dp_opt_get_string(ipa_opts->auth, KRB5_REALM)));
+ dp_opt_get_string(ipa_opts->auth, KRB5_REALM));
}
/* Set flag that controls whether we want to write the
@@ -669,9 +669,9 @@ int ipa_get_auth_options(struct ipa_options *ipa_opts,
*/
ipa_opts->service->krb5_service->write_kdcinfo = \
dp_opt_get_bool(ipa_opts->auth, KRB5_USE_KDCINFO);
- DEBUG(SSSDBG_CONF_SETTINGS, ("Option %s set to %s\n",
+ DEBUG(SSSDBG_CONF_SETTINGS, "Option %s set to %s\n",
ipa_opts->auth[KRB5_USE_KDCINFO].opt_name,
- ipa_opts->service->krb5_service->write_kdcinfo ? "true" : "false"));
+ ipa_opts->service->krb5_service->write_kdcinfo ? "true" : "false");
*_opts = ipa_opts->auth;
ret = EOK;
@@ -698,53 +698,53 @@ static void ipa_resolve_callback(void *private_data, struct fo_server *server)
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(1, ("talloc_new failed\n"));
+ DEBUG(1, "talloc_new failed\n");
return;
}
service = talloc_get_type(private_data, struct ipa_service);
if (!service) {
- DEBUG(1, ("FATAL: Bad private_data\n"));
+ DEBUG(1, "FATAL: Bad private_data\n");
talloc_free(tmp_ctx);
return;
}
srvaddr = fo_get_server_hostent(server);
if (!srvaddr) {
- DEBUG(1, ("FATAL: No hostent available for server (%s)\n",
- fo_get_server_str_name(server)));
+ DEBUG(1, "FATAL: No hostent available for server (%s)\n",
+ fo_get_server_str_name(server));
talloc_free(tmp_ctx);
return;
}
sockaddr = resolv_get_sockaddr_address(tmp_ctx, srvaddr, LDAP_PORT);
if (sockaddr == NULL) {
- DEBUG(1, ("resolv_get_sockaddr_address failed.\n"));
+ DEBUG(1, "resolv_get_sockaddr_address failed.\n");
talloc_free(tmp_ctx);
return;
}
address = resolv_get_string_address(tmp_ctx, srvaddr);
if (address == NULL) {
- DEBUG(1, ("resolv_get_string_address failed.\n"));
+ DEBUG(1, "resolv_get_string_address failed.\n");
talloc_free(tmp_ctx);
return;
}
srv_name = fo_get_server_name(server);
if (srv_name == NULL) {
- DEBUG(1, ("Could not get server host name\n"));
+ DEBUG(1, "Could not get server host name\n");
talloc_free(tmp_ctx);
return;
}
new_uri = talloc_asprintf(service, "ldap://%s", srv_name);
if (!new_uri) {
- DEBUG(2, ("Failed to copy URI ...\n"));
+ DEBUG(2, "Failed to copy URI ...\n");
talloc_free(tmp_ctx);
return;
}
- DEBUG(6, ("Constructed uri '%s'\n", new_uri));
+ DEBUG(6, "Constructed uri '%s'\n", new_uri);
/* free old one and replace with new one */
talloc_zfree(service->sdap->uri);
@@ -757,7 +757,7 @@ static void ipa_resolve_callback(void *private_data, struct fo_server *server)
srvaddr->family,
address);
if (safe_address == NULL) {
- DEBUG(1, ("sss_escape_ip_address failed.\n"));
+ DEBUG(1, "sss_escape_ip_address failed.\n");
talloc_free(tmp_ctx);
return;
}
@@ -765,7 +765,7 @@ static void ipa_resolve_callback(void *private_data, struct fo_server *server)
ret = write_krb5info_file(service->krb5_service->realm, safe_address,
SSS_KRB5KDC_FO_SRV);
if (ret != EOK) {
- DEBUG(2, ("write_krb5info_file failed, authentication might fail.\n"));
+ DEBUG(2, "write_krb5info_file failed, authentication might fail.\n");
}
}
@@ -792,7 +792,7 @@ static errno_t _ipa_servers_init(struct be_ctx *ctx,
/* split server parm into a list */
ret = split_on_separator(tmp_ctx, servers, ',', true, true, &list, NULL);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to parse server list!\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to parse server list!\n");
goto done;
}
@@ -804,9 +804,9 @@ static errno_t _ipa_servers_init(struct be_ctx *ctx,
if (be_fo_is_srv_identifier(list[i])) {
if (!primary) {
DEBUG(SSSDBG_MINOR_FAILURE,
- ("Failed to add server [%s] to failover service: "
+ "Failed to add server [%s] to failover service: "
"SRV resolution only allowed for primary servers!\n",
- list[i]));
+ list[i]);
continue;
}
@@ -814,11 +814,11 @@ static errno_t _ipa_servers_init(struct be_ctx *ctx,
ret = be_fo_add_srv_server(ctx, "IPA", "ldap", ipa_domain,
BE_FO_PROTO_TCP, false, NULL);
if (ret) {
- DEBUG(SSSDBG_FATAL_FAILURE, ("Failed to add server\n"));
+ DEBUG(SSSDBG_FATAL_FAILURE, "Failed to add server\n");
goto done;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("Added service lookup for service IPA\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "Added service lookup for service IPA\n");
continue;
}
@@ -831,11 +831,11 @@ static errno_t _ipa_servers_init(struct be_ctx *ctx,
ret = be_fo_add_server(ctx, "IPA", list[i], 0, NULL, primary);
if (ret && ret != EEXIST) {
- DEBUG(SSSDBG_FATAL_FAILURE, ("Failed to add server\n"));
+ DEBUG(SSSDBG_FATAL_FAILURE, "Failed to add server\n");
goto done;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("Added Server %s\n", list[i]));
+ DEBUG(SSSDBG_TRACE_FUNC, "Added Server %s\n", list[i]);
}
done:
@@ -896,7 +896,7 @@ int ipa_service_init(TALLOC_CTX *memctx, struct be_ctx *ctx,
ret = be_fo_add_service(ctx, "IPA", ipa_user_data_cmp);
if (ret != EOK) {
- DEBUG(1, ("Failed to create failover service!\n"));
+ DEBUG(1, "Failed to create failover service!\n");
goto done;
}
@@ -915,7 +915,7 @@ int ipa_service_init(TALLOC_CTX *memctx, struct be_ctx *ctx,
realm = dp_opt_get_string(options->basic, IPA_KRB5_REALM);
if (!realm) {
- DEBUG(1, ("No Kerberos realm set\n"));
+ DEBUG(1, "No Kerberos realm set\n");
ret = EINVAL;
goto done;
}
@@ -928,7 +928,7 @@ int ipa_service_init(TALLOC_CTX *memctx, struct be_ctx *ctx,
if (!primary_servers) {
DEBUG(SSSDBG_CONF_SETTINGS,
- ("No primary servers defined, using service discovery\n"));
+ "No primary servers defined, using service discovery\n");
primary_servers = BE_SRV_IDENTIFIER;
}
@@ -947,7 +947,7 @@ int ipa_service_init(TALLOC_CTX *memctx, struct be_ctx *ctx,
ret = be_fo_service_add_callback(memctx, ctx, "IPA",
ipa_resolve_callback, service);
if (ret != EOK) {
- DEBUG(1, ("Failed to add failover callback!\n"));
+ DEBUG(1, "Failed to add failover callback!\n");
goto done;
}
@@ -1002,17 +1002,17 @@ int ipa_get_autofs_options(struct ipa_options *ipa_opts,
goto done;
}
- DEBUG(SSSDBG_TRACE_LIBS, ("Option %s set to %s\n",
+ DEBUG(SSSDBG_TRACE_LIBS, "Option %s set to %s\n",
ipa_opts->id->basic[SDAP_AUTOFS_SEARCH_BASE].opt_name,
dp_opt_get_string(ipa_opts->id->basic,
- SDAP_AUTOFS_SEARCH_BASE)));
+ SDAP_AUTOFS_SEARCH_BASE));
}
ret = sdap_parse_search_base(ipa_opts->id, ipa_opts->id->basic,
SDAP_AUTOFS_SEARCH_BASE,
&ipa_opts->id->sdom->autofs_search_bases);
if (ret != EOK && ret != ENOENT) {
- DEBUG(SSSDBG_OP_FAILURE, ("Could not parse autofs search base\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Could not parse autofs search base\n");
goto done;
}
@@ -1022,7 +1022,7 @@ int ipa_get_autofs_options(struct ipa_options *ipa_opts,
&ipa_opts->id->autofs_mobject_map);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Could not get autofs map object attribute map\n"));
+ "Could not get autofs map object attribute map\n");
goto done;
}
@@ -1032,7 +1032,7 @@ int ipa_get_autofs_options(struct ipa_options *ipa_opts,
&ipa_opts->id->autofs_entry_map);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Could not get autofs entry object attribute map\n"));
+ "Could not get autofs entry object attribute map\n");
goto done;
}
@@ -1054,14 +1054,14 @@ errno_t ipa_get_dyndns_options(struct be_ctx *be_ctx,
ret = be_nsupdate_init(ctx, be_ctx, ipa_dyndns_opts, &ctx->dyndns_ctx);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Cannot initialize IPA dyndns opts [%d]: %s\n",
- ret, sss_strerror(ret)));
+ "Cannot initialize IPA dyndns opts [%d]: %s\n",
+ ret, sss_strerror(ret));
return ret;
}
if (ctx->basic == NULL) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("IPA basic options not (yet) "
- "initialized, cannot copy legacy options\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "IPA basic options not (yet) "
+ "initialized, cannot copy legacy options\n");
return EOK;
}
@@ -1069,8 +1069,8 @@ errno_t ipa_get_dyndns_options(struct be_ctx *be_ctx,
ret = confdb_get_string(be_ctx->cdb, ctx, be_ctx->conf_path,
"ipa_dyndns_update", NULL, &val);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot get the value of %s\n",
- "ipa_dyndns_update"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot get the value of %s\n",
+ "ipa_dyndns_update");
/* Not fatal */
} else if (ret == EOK && val) {
if (strcasecmp(val, "FALSE") == 0) {
@@ -1079,20 +1079,20 @@ errno_t ipa_get_dyndns_options(struct be_ctx *be_ctx,
update = true;
} else {
DEBUG(SSSDBG_MINOR_FAILURE,
- ("ipa_dyndns_update value is not a boolean!\n"));
+ "ipa_dyndns_update value is not a boolean!\n");
talloc_free(val);
return EINVAL;
}
- DEBUG(SSSDBG_MINOR_FAILURE, ("Deprecation warning: The option %s is "
+ DEBUG(SSSDBG_MINOR_FAILURE, "Deprecation warning: The option %s is "
"deprecated and should not be used in favor of %s\n",
- "ipa_dyndns_update", "dyndns_update"));
+ "ipa_dyndns_update", "dyndns_update");
ret = dp_opt_set_bool(ctx->dyndns_ctx->opts,
DP_OPT_DYNDNS_UPDATE, update);
talloc_free(val);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot set option value\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot set option value\n");
return ret;
}
}
@@ -1100,17 +1100,17 @@ errno_t ipa_get_dyndns_options(struct be_ctx *be_ctx,
ret = confdb_get_int(be_ctx->cdb, be_ctx->conf_path,
"ipa_dyndns_ttl", -1, &ttl);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot get the value of %s\n",
- "ipa_dyndns_ttl"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot get the value of %s\n",
+ "ipa_dyndns_ttl");
/* Not fatal */
} else if (ret == EOK && ttl != -1) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Deprecation warning: The option %s is "
+ DEBUG(SSSDBG_MINOR_FAILURE, "Deprecation warning: The option %s is "
"deprecated and should not be used in favor of %s\n",
- "ipa_dyndns_ttl", "dyndns_ttl"));
+ "ipa_dyndns_ttl", "dyndns_ttl");
ret = dp_opt_set_int(ctx->dyndns_ctx->opts, DP_OPT_DYNDNS_TTL, ttl);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot set option value\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot set option value\n");
return ret;
}
}
@@ -1119,18 +1119,18 @@ errno_t ipa_get_dyndns_options(struct be_ctx *be_ctx,
ret = confdb_get_string(be_ctx->cdb, ctx, be_ctx->conf_path,
"ipa_dyndns_iface", NULL, &val);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot get the value of %s\n",
- "ipa_dyndns_iface"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot get the value of %s\n",
+ "ipa_dyndns_iface");
/* Not fatal */
} else if (ret == EOK && val) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Deprecation warning: The option %s is "
+ DEBUG(SSSDBG_MINOR_FAILURE, "Deprecation warning: The option %s is "
"deprecated and should not be used in favor of %s\n",
- "ipa_dyndns_iface", "dyndns_iface"));
+ "ipa_dyndns_iface", "dyndns_iface");
ret = dp_opt_set_string(ctx->dyndns_ctx->opts,
DP_OPT_DYNDNS_IFACE, val);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot set option value\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot set option value\n");
return ret;
}
}
diff --git a/src/providers/ipa/ipa_config.c b/src/providers/ipa/ipa_config.c
index 0b392f512..0d564f5b5 100644
--- a/src/providers/ipa/ipa_config.c
+++ b/src/providers/ipa/ipa_config.c
@@ -70,14 +70,14 @@ ipa_get_config_send(TALLOC_CTX *mem_ctx,
ret = domain_to_basedn(state, domain, &ldap_basedn);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("domain_to_basedn failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "domain_to_basedn failed.\n");
goto done;
}
state->base = talloc_asprintf(state, IPA_CONFIG_SEARCH_BASE_TEMPLATE,
ldap_basedn);
if (state->base == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_asprintf failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_asprintf failed.\n");
ret = ENOMEM;
goto done;
}
@@ -124,8 +124,8 @@ static void ipa_get_config_done(struct tevent_req *subreq)
}
if (reply_count != 1) {
- DEBUG(SSSDBG_OP_FAILURE, ("Unexpected number of results, expected 1, "
- "got %zu.\n", reply_count));
+ DEBUG(SSSDBG_OP_FAILURE, "Unexpected number of results, expected 1, "
+ "got %zu.\n", reply_count);
ret = EINVAL;
goto done;
}
diff --git a/src/providers/ipa/ipa_dyndns.c b/src/providers/ipa/ipa_dyndns.c
index a74a3cc18..ca11c00c7 100644
--- a/src/providers/ipa/ipa_dyndns.c
+++ b/src/providers/ipa/ipa_dyndns.c
@@ -39,15 +39,15 @@ errno_t ipa_dyndns_init(struct be_ctx *be_ctx,
ctx->be_res = be_ctx->be_res;
if (ctx->be_res == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("Resolver must be initialized in order "
- "to use the IPA dynamic DNS updates\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Resolver must be initialized in order "
+ "to use the IPA dynamic DNS updates\n");
return EINVAL;
}
ret = be_nsupdate_init_timer(ctx->dyndns_ctx, be_ctx->ev,
ipa_dyndns_timer, ctx);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Could not set up periodic update\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Could not set up periodic update\n");
return ret;
}
@@ -55,7 +55,7 @@ errno_t ipa_dyndns_init(struct be_ctx *be_ctx,
ipa_dyndns_update,
ctx, NULL);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Could not set up online callback\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Could not set up online callback\n");
return ret;
}
@@ -80,7 +80,7 @@ void ipa_dyndns_timer(void *pvt)
req = sdap_dyndns_timer_conn_send(ctx, sdap_ctx->be->ev, sdap_ctx,
ctx->dyndns_ctx);
if (req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Out of memory\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Out of memory\n");
/* Not much we can do. Just attempt to reschedule */
be_nsupdate_timer_schedule(sdap_ctx->be->ev, ctx->dyndns_ctx);
return;
@@ -98,8 +98,8 @@ static void ipa_dyndns_timer_connected(struct tevent_req *req)
talloc_zfree(req);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Failed to connect to IPA: [%d](%s)\n",
- ret, sss_strerror(ret)));
+ "Failed to connect to IPA: [%d](%s)\n",
+ ret, sss_strerror(ret));
return;
}
@@ -121,7 +121,7 @@ void ipa_dyndns_update(void *pvt)
struct tevent_req *req = ipa_dyndns_update_send(ctx);
if (req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Could not update DNS\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Could not update DNS\n");
return;
}
tevent_req_set_callback(req, ipa_dyndns_nsupdate_done, NULL);
@@ -132,12 +132,12 @@ static void ipa_dyndns_nsupdate_done(struct tevent_req *req)
int ret = ipa_dyndns_update_recv(req);
talloc_free(req);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Updating DNS entry failed [%d]: %s\n",
- ret, sss_strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "Updating DNS entry failed [%d]: %s\n",
+ ret, sss_strerror(ret));
return;
}
- DEBUG(SSSDBG_OP_FAILURE, ("DNS update finished\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "DNS update finished\n");
}
struct ipa_dyndns_update_state {
@@ -157,7 +157,7 @@ ipa_dyndns_update_send(struct ipa_options *ctx)
const char *servername;
int i;
- DEBUG(SSSDBG_TRACE_FUNC, ("Performing update\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "Performing update\n");
req = tevent_req_create(ctx, &state, struct ipa_dyndns_update_state);
if (req == NULL) {
@@ -167,8 +167,8 @@ ipa_dyndns_update_send(struct ipa_options *ctx)
if (ctx->dyndns_ctx->last_refresh + 60 > time(NULL) ||
ctx->dyndns_ctx->timer_in_progress) {
- DEBUG(SSSDBG_FUNC_DATA, ("Last periodic update ran recently or timer"
- "in progress, not scheduling another update\n"));
+ DEBUG(SSSDBG_FUNC_DATA, "Last periodic update ran recently or timer"
+ "in progress, not scheduling another update\n");
tevent_req_done(req);
tevent_req_post(req, sdap_ctx->be->ev);
return req;
@@ -190,7 +190,7 @@ ipa_dyndns_update_send(struct ipa_options *ctx)
if (strncmp(ctx->service->sdap->uri,
"ldap://", 7) != 0) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Unexpected format of LDAP URI.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Unexpected format of LDAP URI.\n");
ret = EIO;
goto done;
}
@@ -219,8 +219,8 @@ ipa_dyndns_update_send(struct ipa_options *ctx)
if (!subreq) {
ret = EIO;
DEBUG(SSSDBG_OP_FAILURE,
- ("sdap_id_op_connect_send failed: [%d](%s)\n",
- ret, sss_strerror(ret)));
+ "sdap_id_op_connect_send failed: [%d](%s)\n",
+ ret, sss_strerror(ret));
goto done;
}
tevent_req_set_callback(subreq, ipa_dyndns_sdap_update_done, req);
@@ -243,7 +243,7 @@ static void ipa_dyndns_sdap_update_done(struct tevent_req *subreq)
talloc_zfree(subreq);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Dynamic DNS update failed [%d]: %s\n", ret, sss_strerror(ret)));
+ "Dynamic DNS update failed [%d]: %s\n", ret, sss_strerror(ret));
tevent_req_error(req, ret);
return;
}
diff --git a/src/providers/ipa/ipa_hbac_common.c b/src/providers/ipa/ipa_hbac_common.c
index 09bfc5eb0..55062c8f0 100644
--- a/src/providers/ipa/ipa_hbac_common.c
+++ b/src/providers/ipa/ipa_hbac_common.c
@@ -39,7 +39,7 @@ ipa_hbac_save_list(struct sss_domain_info *domain,
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(1, ("talloc_new failed.\n"));
+ DEBUG(1, "talloc_new failed.\n");
return ENOMEM;
}
@@ -52,7 +52,7 @@ ipa_hbac_save_list(struct sss_domain_info *domain,
ret = sysdb_delete_recursive(domain->sysdb, base_dn, true);
if (ret != EOK) {
- DEBUG(1, ("sysdb_delete_recursive failed.\n"));
+ DEBUG(1, "sysdb_delete_recursive failed.\n");
goto done;
}
}
@@ -60,26 +60,26 @@ ipa_hbac_save_list(struct sss_domain_info *domain,
for (c = 0; c < count; c++) {
ret = sysdb_attrs_get_el(list[c], naming_attribute, &el);
if (ret != EOK) {
- DEBUG(1, ("sysdb_attrs_get_el failed.\n"));
+ DEBUG(1, "sysdb_attrs_get_el failed.\n");
goto done;
}
if (el->num_values == 0) {
- DEBUG(1, ("[%s] not found.\n", naming_attribute));
+ DEBUG(1, "[%s] not found.\n", naming_attribute);
ret = EINVAL;
goto done;
}
object_name = talloc_strndup(tmp_ctx, (const char *)el->values[0].data,
el->values[0].length);
if (object_name == NULL) {
- DEBUG(1, ("talloc_strndup failed.\n"));
+ DEBUG(1, "talloc_strndup failed.\n");
ret = ENOMEM;
goto done;
}
- DEBUG(9, ("Object name: [%s].\n", object_name));
+ DEBUG(9, "Object name: [%s].\n", object_name);
ret = sysdb_store_custom(domain, object_name, subdir, list[c]);
if (ret != EOK) {
- DEBUG(1, ("sysdb_store_custom failed.\n"));
+ DEBUG(1, "sysdb_store_custom failed.\n");
goto done;
}
}
@@ -112,7 +112,7 @@ ipa_hbac_sysdb_save(struct sss_domain_info *domain,
/* Save the entries and groups to the cache */
ret = sysdb_transaction_start(domain->sysdb);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to start transaction\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to start transaction\n");
goto done;
};
in_transaction = true;
@@ -121,8 +121,8 @@ ipa_hbac_sysdb_save(struct sss_domain_info *domain,
ret = ipa_hbac_save_list(domain, true, primary_subdir,
attr_name, primary_count, primary);
if (ret != EOK) {
- DEBUG(1, ("Could not save %s. [%d][%s]\n",
- primary_subdir, ret, strerror(ret)));
+ DEBUG(1, "Could not save %s. [%d][%s]\n",
+ primary_subdir, ret, strerror(ret));
goto done;
}
@@ -131,15 +131,15 @@ ipa_hbac_sysdb_save(struct sss_domain_info *domain,
ret = ipa_hbac_save_list(domain, true, group_subdir,
groupattr_name, group_count, groups);
if (ret != EOK) {
- DEBUG(1, ("Could not save %s. [%d][%s]\n",
- group_subdir, ret, strerror(ret)));
+ DEBUG(1, "Could not save %s. [%d][%s]\n",
+ group_subdir, ret, strerror(ret));
goto done;
}
}
ret = sysdb_transaction_commit(domain->sysdb);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to commit transaction\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to commit transaction\n");
goto done;
}
in_transaction = false;
@@ -148,12 +148,12 @@ done:
if (in_transaction) {
sret = sysdb_transaction_cancel(domain->sysdb);
if (sret != EOK) {
- DEBUG(0, ("Could not cancel sysdb transaction\n"));
+ DEBUG(0, "Could not cancel sysdb transaction\n");
}
}
if (ret != EOK) {
- DEBUG(3, ("Error [%d][%s]\n", ret, strerror(ret)));
+ DEBUG(3, "Error [%d][%s]\n", ret, strerror(ret));
}
return ret;
}
@@ -169,7 +169,7 @@ replace_attribute_name(const char *old_name,
for (i = 0; i < count; i++) {
ret = sysdb_attrs_replace_name(list[i], old_name, new_name);
if (ret != EOK) {
- DEBUG(1, ("sysdb_attrs_replace_name failed.\n"));
+ DEBUG(1, "sysdb_attrs_replace_name failed.\n");
return ret;
}
}
@@ -234,7 +234,7 @@ hbac_ctx_to_rules(TALLOC_CTX *mem_ctx,
if (ret == EPERM) {
goto done;
} else if (ret != EOK) {
- DEBUG(1, ("Could not construct rules\n"));
+ DEBUG(1, "Could not construct rules\n");
goto done;
}
}
@@ -243,7 +243,7 @@ hbac_ctx_to_rules(TALLOC_CTX *mem_ctx,
/* Create the eval request */
ret = hbac_ctx_to_eval_request(tmp_ctx, hbac_ctx, &new_request);
if (ret != EOK) {
- DEBUG(1, ("Could not construct eval request\n"));
+ DEBUG(1, "Could not construct eval request\n");
goto done;
}
@@ -274,7 +274,7 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
ret = sysdb_attrs_get_el(hbac_ctx->rules[idx],
IPA_CN, &el);
if (ret != EOK || el->num_values == 0) {
- DEBUG(4, ("rule has no name, assuming '(none)'.\n"));
+ DEBUG(4, "rule has no name, assuming '(none)'.\n");
new_rule->name = talloc_strdup(new_rule, "(none)");
} else {
new_rule->name = talloc_strndup(new_rule,
@@ -282,7 +282,7 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
el->values[0].length);
}
- DEBUG(7, ("Processing rule [%s]\n", new_rule->name));
+ DEBUG(7, "Processing rule [%s]\n", new_rule->name);
ret = sysdb_attrs_get_bool(hbac_ctx->rules[idx], IPA_ENABLED_FLAG,
&new_rule->enabled);
@@ -299,7 +299,7 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
if (ret != EOK) goto done;
if (strcasecmp(rule_type, IPA_HBAC_ALLOW) != 0) {
- DEBUG(7, ("Rule [%s] is not an ALLOW rule\n", new_rule->name));
+ DEBUG(7, "Rule [%s] is not an ALLOW rule\n", new_rule->name);
ret = EPERM;
goto done;
}
@@ -310,8 +310,8 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
hbac_ctx->rules[idx],
&new_rule->users);
if (ret != EOK) {
- DEBUG(1, ("Could not parse users for rule [%s]\n",
- new_rule->name));
+ DEBUG(1, "Could not parse users for rule [%s]\n",
+ new_rule->name);
goto done;
}
@@ -321,8 +321,8 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
hbac_ctx->rules[idx],
&new_rule->services);
if (ret != EOK) {
- DEBUG(1, ("Could not parse services for rule [%s]\n",
- new_rule->name));
+ DEBUG(1, "Could not parse services for rule [%s]\n",
+ new_rule->name);
goto done;
}
@@ -332,8 +332,8 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
hbac_ctx->rules[idx],
&new_rule->targethosts);
if (ret != EOK) {
- DEBUG(1, ("Could not parse target hosts for rule [%s]\n",
- new_rule->name));
+ DEBUG(1, "Could not parse target hosts for rule [%s]\n",
+ new_rule->name);
goto done;
}
@@ -346,8 +346,8 @@ hbac_attrs_to_rule(TALLOC_CTX *mem_ctx,
IPA_HBAC_SUPPORT_SRCHOST),
&new_rule->srchosts);
if (ret != EOK) {
- DEBUG(1, ("Could not parse source hosts for rule [%s]\n",
- new_rule->name));
+ DEBUG(1, "Could not parse source hosts for rule [%s]\n",
+ new_rule->name);
goto done;
}
@@ -379,12 +379,12 @@ hbac_get_category(struct sysdb_attrs *attrs,
if (ret != ENOENT) {
for (i = 0; categories[i]; i++) {
if (strcasecmp("all", categories[i]) == 0) {
- DEBUG(5, ("Category is set to 'all'.\n"));
+ DEBUG(5, "Category is set to 'all'.\n");
cats |= HBAC_CATEGORY_ALL;
continue;
}
- DEBUG(9, ("Unsupported user category [%s].\n",
- categories[i]));
+ DEBUG(9, "Unsupported user category [%s].\n",
+ categories[i]);
}
}
@@ -448,7 +448,7 @@ hbac_ctx_to_eval_request(TALLOC_CTX *mem_ctx,
if (strcasecmp(pd->domain, domain->name) != 0) {
user_dom = find_subdomain_by_name(domain, pd->domain, true);
if (user_dom == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("find_subdomain_by_name failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "find_subdomain_by_name failed.\n");
ret = ENOMEM;
goto done;
}
@@ -484,7 +484,7 @@ hbac_ctx_to_eval_request(TALLOC_CTX *mem_ctx,
/* The target host is always the current machine */
thost = dp_opt_get_cstring(hbac_ctx->ipa_options, IPA_HOSTNAME);
if (thost == NULL) {
- DEBUG(1, ("Missing ipa_hostname, this should never happen.\n"));
+ DEBUG(1, "Missing ipa_hostname, this should never happen.\n");
ret = EINVAL;
goto done;
}
@@ -537,18 +537,18 @@ hbac_eval_user_element(TALLOC_CTX *mem_ctx,
ret = sysdb_search_user_by_name(tmp_ctx, domain, users->name,
attrs, &msg);
if (ret != EOK) {
- DEBUG(1, ("Could not determine user memberships for [%s]\n",
- users->name));
+ DEBUG(1, "Could not determine user memberships for [%s]\n",
+ users->name);
goto done;
}
el = ldb_msg_find_element(msg, SYSDB_ORIG_MEMBEROF);
if (el == NULL || el->num_values == 0) {
- DEBUG(7, ("No groups for [%s]\n", users->name));
+ DEBUG(7, "No groups for [%s]\n", users->name);
ret = create_empty_grouplist(users);
goto done;
}
- DEBUG(7, ("[%d] groups for [%s]\n", el->num_values, users->name));
+ DEBUG(7, "[%d] groups for [%s]\n", el->num_values, users->name);
users->groups = talloc_array(users, const char *, el->num_values + 1);
if (users->groups == NULL) {
@@ -562,16 +562,16 @@ hbac_eval_user_element(TALLOC_CTX *mem_ctx,
ret = get_ipa_groupname(users->groups, sysdb, member_dn,
&users->groups[num_groups]);
if (ret != EOK && ret != ENOENT) {
- DEBUG(3, ("Parse error on [%s]\n", member_dn));
+ DEBUG(3, "Parse error on [%s]\n", member_dn);
goto done;
} else if (ret == EOK) {
- DEBUG(7, ("Added group [%s] for user [%s]\n",
- users->groups[num_groups], users->name));
+ DEBUG(7, "Added group [%s] for user [%s]\n",
+ users->groups[num_groups], users->name);
num_groups++;
continue;
}
/* Skip entries that are not groups */
- DEBUG(8, ("Skipping non-group memberOf [%s]\n", member_dn));
+ DEBUG(8, "Skipping non-group memberOf [%s]\n", member_dn);
}
users->groups[num_groups] = NULL;
@@ -643,7 +643,7 @@ hbac_eval_service_element(TALLOC_CTX *mem_ctx,
} else if (ret != EOK) {
goto done;
} else if (count > 1) {
- DEBUG(1, ("More than one result for a BASE search!\n"));
+ DEBUG(1, "More than one result for a BASE search!\n");
ret = EIO;
goto done;
}
@@ -750,7 +750,7 @@ hbac_eval_host_element(TALLOC_CTX *mem_ctx,
} else if (ret != EOK) {
goto done;
} else if (count > 1) {
- DEBUG(1, ("More than one result for a BASE search!\n"));
+ DEBUG(1, "More than one result for a BASE search!\n");
ret = EIO;
goto done;
}
diff --git a/src/providers/ipa/ipa_hbac_hosts.c b/src/providers/ipa/ipa_hbac_hosts.c
index dbc02b865..00f705d7b 100644
--- a/src/providers/ipa/ipa_hbac_hosts.c
+++ b/src/providers/ipa/ipa_hbac_hosts.c
@@ -63,7 +63,7 @@ static errno_t hbac_host_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* First check for host category */
ret = hbac_get_category(rule_attrs, category_attr, &new_hosts->category);
if (ret != EOK) {
- DEBUG(1, ("Could not identify host categories\n"));
+ DEBUG(1, "Could not identify host categories\n");
goto done;
}
if (new_hosts->category & HBAC_CATEGORY_ALL) {
@@ -75,12 +75,12 @@ static errno_t hbac_host_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Get the list of DNs from the member_attr */
ret = sysdb_attrs_get_el(rule_attrs, member_attr, &el);
if (ret != EOK && ret != ENOENT) {
- DEBUG(1, ("sysdb_attrs_get_el failed.\n"));
+ DEBUG(1, "sysdb_attrs_get_el failed.\n");
goto done;
}
if (ret == ENOENT || el->num_values == 0) {
el->num_values = 0;
- DEBUG(4, ("No host specified, rule will never apply.\n"));
+ DEBUG(4, "No host specified, rule will never apply.\n");
}
/* Assume maximum size; We'll trim it later */
@@ -124,7 +124,7 @@ static errno_t hbac_host_attrs_to_rule(TALLOC_CTX *mem_ctx,
if (ret == EOK) {
if (count > 1) {
- DEBUG(1, ("Original DN matched multiple hosts. Skipping \n"));
+ DEBUG(1, "Original DN matched multiple hosts. Skipping \n");
talloc_zfree(member_dn);
continue;
}
@@ -134,7 +134,7 @@ static errno_t hbac_host_attrs_to_rule(TALLOC_CTX *mem_ctx,
SYSDB_FQDN,
NULL);
if (name == NULL) {
- DEBUG(1, ("FQDN is missing!\n"));
+ DEBUG(1, "FQDN is missing!\n");
ret = EFAULT;
goto done;
}
@@ -145,8 +145,8 @@ static errno_t hbac_host_attrs_to_rule(TALLOC_CTX *mem_ctx,
ret = ENOMEM;
goto done;
}
- DEBUG(8, ("Added host [%s] to rule [%s]\n",
- name, rule_name));
+ DEBUG(8, "Added host [%s] to rule [%s]\n",
+ name, rule_name);
num_hosts++;
} else { /* ret == ENOENT */
/* Check if this is a hostgroup */
@@ -160,8 +160,8 @@ static errno_t hbac_host_attrs_to_rule(TALLOC_CTX *mem_ctx,
if (ret == EOK) {
if (count > 1) {
- DEBUG(1, ("Original DN matched multiple hostgroups. "
- "Skipping\n"));
+ DEBUG(1, "Original DN matched multiple hostgroups. "
+ "Skipping\n");
talloc_zfree(member_dn);
continue;
}
@@ -169,7 +169,7 @@ static errno_t hbac_host_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Original DN matched a single group. Get the groupname */
name = ldb_msg_find_attr_as_string(msgs[0], SYSDB_NAME, NULL);
if (name == NULL) {
- DEBUG(1, ("Hostgroup name is missing!\n"));
+ DEBUG(1, "Hostgroup name is missing!\n");
ret = EFAULT;
goto done;
}
@@ -181,14 +181,14 @@ static errno_t hbac_host_attrs_to_rule(TALLOC_CTX *mem_ctx,
goto done;
}
- DEBUG(8, ("Added hostgroup [%s] to rule [%s]\n",
- name, rule_name));
+ DEBUG(8, "Added hostgroup [%s] to rule [%s]\n",
+ name, rule_name);
num_hostgroups++;
} else { /* ret == ENOENT */
/* Neither a host nor a hostgroup? Skip it */
DEBUG(SSSDBG_TRACE_LIBS,
- ("[%s] does not map to either a host or hostgroup. "
- "Skipping\n", member_dn));
+ "[%s] does not map to either a host or hostgroup. "
+ "Skipping\n", member_dn);
}
}
talloc_zfree(member_dn);
@@ -229,7 +229,7 @@ hbac_thost_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct sysdb_attrs *rule_attrs,
struct hbac_rule_element **thosts)
{
- DEBUG(7, ("Processing target hosts for rule [%s]\n", rule_name));
+ DEBUG(7, "Processing target hosts for rule [%s]\n", rule_name);
return hbac_host_attrs_to_rule(mem_ctx, domain,
rule_name, rule_attrs,
@@ -255,10 +255,10 @@ hbac_shost_attrs_to_rule(TALLOC_CTX *mem_ctx,
tmp_ctx = talloc_new(mem_ctx);
if (tmp_ctx == NULL) return ENOMEM;
- DEBUG(SSSDBG_TRACE_FUNC, ("Processing source hosts for rule [%s]\n", rule_name));
+ DEBUG(SSSDBG_TRACE_FUNC, "Processing source hosts for rule [%s]\n", rule_name);
if (!support_srchost) {
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Source hosts disabled, setting ALL\n"));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Source hosts disabled, setting ALL\n");
shosts = talloc_zero(tmp_ctx, struct hbac_rule_element);
if (shosts == NULL) {
ret = ENOMEM;
@@ -269,8 +269,8 @@ hbac_shost_attrs_to_rule(TALLOC_CTX *mem_ctx,
ret = EOK;
goto done;
} else {
- DEBUG(SSSDBG_MINOR_FAILURE, ("WARNING: Using deprecated option "
- "ipa_hbac_support_srchost.\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "WARNING: Using deprecated option "
+ "ipa_hbac_support_srchost.\n");
sss_log(SSS_LOG_NOTICE, "WARNING: Using deprecated option "
"ipa_hbac_support_srchost.\n");
}
@@ -311,8 +311,8 @@ hbac_shost_attrs_to_rule(TALLOC_CTX *mem_ctx,
ret = ENOMEM;
goto done;
}
- DEBUG(8, ("Added external source host [%s] to rule [%s]\n",
- shosts->names[idx], rule_name));
+ DEBUG(8, "Added external source host [%s] to rule [%s]\n",
+ shosts->names[idx], rule_name);
}
shosts->names[idx] = NULL;
}
diff --git a/src/providers/ipa/ipa_hbac_rules.c b/src/providers/ipa/ipa_hbac_rules.c
index 24caf1fd4..dcc5e7634 100644
--- a/src/providers/ipa/ipa_hbac_rules.c
+++ b/src/providers/ipa/ipa_hbac_rules.c
@@ -68,7 +68,7 @@ ipa_hbac_rule_info_send(TALLOC_CTX *mem_ctx,
const char **memberof_list;
if (ipa_host == NULL) {
- DEBUG(1, ("Missing host\n"));
+ DEBUG(1, "Missing host\n");
return NULL;
}
@@ -77,7 +77,7 @@ ipa_hbac_rule_info_send(TALLOC_CTX *mem_ctx,
ret = sysdb_attrs_get_string(ipa_host, SYSDB_ORIG_DN, &host_dn);
if (ret != EOK) {
- DEBUG(1, ("Could not identify IPA hostname\n"));
+ DEBUG(1, "Could not identify IPA hostname\n");
goto error;
}
@@ -86,7 +86,7 @@ ipa_hbac_rule_info_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct ipa_hbac_rule_state);
if (req == NULL) {
- DEBUG(1, ("tevent_req_create failed.\n"));
+ DEBUG(1, "tevent_req_create failed.\n");
return NULL;
}
@@ -144,7 +144,7 @@ ipa_hbac_rule_info_send(TALLOC_CTX *mem_ctx,
ret = sysdb_attrs_get_string_array(ipa_host, SYSDB_ORIG_MEMBEROF,
tmp_ctx, &memberof_list);
if (ret != EOK && ret != ENOENT) {
- DEBUG(1, ("Could not identify "));
+ DEBUG(1, "Could not identify ");
} if (ret == ENOENT) {
/* This host is not a member of any hostgroups */
memberof_list = talloc_array(tmp_ctx, const char *, 1);
@@ -224,9 +224,9 @@ ipa_hbac_rule_info_next(struct tevent_req *req,
return ENOMEM;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("Sending request for next search base: "
+ DEBUG(SSSDBG_TRACE_FUNC, "Sending request for next search base: "
"[%s][%d][%s]\n", base->basedn, base->scope,
- state->cur_filter));
+ state->cur_filter);
subreq = sdap_get_generic_send(state, state->ev, state->opts, state->sh,
base->basedn, base->scope,
@@ -236,7 +236,7 @@ ipa_hbac_rule_info_next(struct tevent_req *req,
SDAP_ENUM_SEARCH_TIMEOUT),
true);
if (subreq == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("sdap_get_generic_send failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "sdap_get_generic_send failed.\n");
return ENOMEM;
}
tevent_req_set_callback(subreq, ipa_hbac_rule_info_done, req);
@@ -262,7 +262,7 @@ ipa_hbac_rule_info_done(struct tevent_req *subreq)
&rule_count,
&rules);
if (ret != EOK) {
- DEBUG(3, ("Could not retrieve HBAC rules\n"));
+ DEBUG(3, "Could not retrieve HBAC rules\n");
goto fail;
}
@@ -293,7 +293,7 @@ ipa_hbac_rule_info_done(struct tevent_req *subreq)
} else if (ret != EOK) {
goto fail;
} else if (ret == EOK && state->rule_count == 0) {
- DEBUG(3, ("No rules apply to this host\n"));
+ DEBUG(3, "No rules apply to this host\n");
tevent_req_error(req, ENOENT);
return;
}
diff --git a/src/providers/ipa/ipa_hbac_services.c b/src/providers/ipa/ipa_hbac_services.c
index b1cc524da..f4a9591b6 100644
--- a/src/providers/ipa/ipa_hbac_services.c
+++ b/src/providers/ipa/ipa_hbac_services.c
@@ -69,7 +69,7 @@ ipa_hbac_service_info_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct ipa_hbac_service_state);
if (req == NULL) {
- DEBUG(1, ("tevent_req_create failed.\n"));
+ DEBUG(1, "tevent_req_create failed.\n");
return NULL;
}
@@ -92,7 +92,7 @@ ipa_hbac_service_info_send(TALLOC_CTX *mem_ctx,
state->attrs = talloc_array(state, const char *, 6);
if (state->attrs == NULL) {
- DEBUG(1, ("Failed to allocate service attribute list.\n"));
+ DEBUG(1, "Failed to allocate service attribute list.\n");
ret = ENOMEM;
goto immediate;
}
@@ -143,9 +143,9 @@ static errno_t ipa_hbac_service_info_next(struct tevent_req *req,
return ENOMEM;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("Sending request for next search base: "
+ DEBUG(SSSDBG_TRACE_FUNC, "Sending request for next search base: "
"[%s][%d][%s]\n", base->basedn, base->scope,
- state->cur_filter));
+ state->cur_filter);
subreq = sdap_get_generic_send(state, state->ev, state->opts, state->sh,
base->basedn, base->scope,
state->cur_filter,
@@ -154,7 +154,7 @@ static errno_t ipa_hbac_service_info_next(struct tevent_req *req,
SDAP_ENUM_SEARCH_TIMEOUT),
true);
if (subreq == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Error requesting service info\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Error requesting service info\n");
return EIO;
}
tevent_req_set_callback(subreq, ipa_hbac_service_info_done, req);
@@ -203,7 +203,7 @@ ipa_hbac_service_info_done(struct tevent_req *subreq)
state->service_count,
state->services);
if (ret != EOK) {
- DEBUG(1, ("Could not replace attribute names\n"));
+ DEBUG(1, "Could not replace attribute names\n");
goto done;
}
@@ -258,9 +258,9 @@ ipa_hbac_servicegroup_info_next(struct tevent_req *req,
}
/* Look up service groups */
- DEBUG(SSSDBG_TRACE_FUNC, ("Sending request for next search base: "
+ DEBUG(SSSDBG_TRACE_FUNC, "Sending request for next search base: "
"[%s][%d][%s]\n", base->basedn, base->scope,
- state->cur_filter));
+ state->cur_filter);
subreq = sdap_get_generic_send(state, state->ev, state->opts, state->sh,
base->basedn, base->scope,
state->cur_filter, state->attrs, NULL, 0,
@@ -268,7 +268,7 @@ ipa_hbac_servicegroup_info_next(struct tevent_req *req,
SDAP_ENUM_SEARCH_TIMEOUT),
true);
if (subreq == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Error requesting servicegroup info\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Error requesting servicegroup info\n");
return EIO;
}
tevent_req_set_callback(subreq, ipa_hbac_servicegroup_info_done, req);
@@ -303,7 +303,7 @@ ipa_hbac_servicegroup_info_done(struct tevent_req *subreq)
group_count,
groups);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Could not replace attribute names\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Could not replace attribute names\n");
goto done;
}
@@ -311,7 +311,7 @@ ipa_hbac_servicegroup_info_done(struct tevent_req *subreq)
state->servicegroup_count,
state->servicegroups);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Could not replace attribute names\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Could not replace attribute names\n");
goto done;
}
@@ -346,7 +346,7 @@ done:
if (ret == EOK) {
tevent_req_done(req);
} else {
- DEBUG(3, ("Error [%d][%s]\n", ret, strerror(ret)));
+ DEBUG(3, "Error [%d][%s]\n", ret, strerror(ret));
tevent_req_error(req, ret);
}
}
@@ -399,7 +399,7 @@ hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
struct ldb_message **msgs;
const char *name;
- DEBUG(7, ("Processing PAM services for rule [%s]\n", rule_name));
+ DEBUG(7, "Processing PAM services for rule [%s]\n", rule_name);
tmp_ctx = talloc_new(mem_ctx);
if (tmp_ctx == NULL) return ENOMEM;
@@ -414,7 +414,7 @@ hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
ret = hbac_get_category(rule_attrs, IPA_SERVICE_CATEGORY,
&new_services->category);
if (ret != EOK) {
- DEBUG(1, ("Could not identify service categories\n"));
+ DEBUG(1, "Could not identify service categories\n");
goto done;
}
if (new_services->category & HBAC_CATEGORY_ALL) {
@@ -426,12 +426,12 @@ hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Get the list of DNs from the member attr */
ret = sysdb_attrs_get_el(rule_attrs, IPA_MEMBER_SERVICE, &el);
if (ret != EOK && ret != ENOENT) {
- DEBUG(1, ("sysdb_attrs_get_el failed.\n"));
+ DEBUG(1, "sysdb_attrs_get_el failed.\n");
goto done;
}
if (ret == ENOENT || el->num_values == 0) {
el->num_values = 0;
- DEBUG(4, ("No services specified, rule will never apply.\n"));
+ DEBUG(4, "No services specified, rule will never apply.\n");
}
/* Assume maximum size; We'll trim it later */
@@ -475,8 +475,8 @@ hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
if (ret == EOK) {
if (count > 1) {
- DEBUG(1, ("Original DN matched multiple services. "
- "Skipping \n"));
+ DEBUG(1, "Original DN matched multiple services. "
+ "Skipping \n");
talloc_zfree(member_dn);
continue;
}
@@ -484,7 +484,7 @@ hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Original DN matched a single service. Get the service name */
name = ldb_msg_find_attr_as_string(msgs[0], IPA_CN, NULL);
if (name == NULL) {
- DEBUG(1, ("Attribute is missing!\n"));
+ DEBUG(1, "Attribute is missing!\n");
ret = EFAULT;
goto done;
}
@@ -495,8 +495,8 @@ hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
ret = ENOMEM;
goto done;
}
- DEBUG(8, ("Added service [%s] to rule [%s]\n",
- name, rule_name));
+ DEBUG(8, "Added service [%s] to rule [%s]\n",
+ name, rule_name);
num_services++;
} else { /* ret == ENOENT */
/* Check if this is a service group */
@@ -510,8 +510,8 @@ hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
if (ret == EOK) {
if (count > 1) {
- DEBUG(1, ("Original DN matched multiple service groups. "
- "Skipping\n"));
+ DEBUG(1, "Original DN matched multiple service groups. "
+ "Skipping\n");
talloc_zfree(member_dn);
continue;
}
@@ -519,7 +519,7 @@ hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Original DN matched a single group. Get the groupname */
name = ldb_msg_find_attr_as_string(msgs[0], IPA_CN, NULL);
if (name == NULL) {
- DEBUG(1, ("Attribute is missing!\n"));
+ DEBUG(1, "Attribute is missing!\n");
ret = EFAULT;
goto done;
}
@@ -531,13 +531,13 @@ hbac_service_attrs_to_rule(TALLOC_CTX *mem_ctx,
goto done;
}
- DEBUG(8, ("Added service group [%s] to rule [%s]\n",
- name, rule_name));
+ DEBUG(8, "Added service group [%s] to rule [%s]\n",
+ name, rule_name);
num_servicegroups++;
} else { /* ret == ENOENT */
/* Neither a service nor a service group? Skip it */
- DEBUG(1, ("[%s] does not map to either a service or "
- "service group. Skipping\n", member_dn));
+ DEBUG(1, "[%s] does not map to either a service or "
+ "service group. Skipping\n", member_dn);
}
}
talloc_zfree(member_dn);
diff --git a/src/providers/ipa/ipa_hbac_users.c b/src/providers/ipa/ipa_hbac_users.c
index cd56e1913..1ca00d5c3 100644
--- a/src/providers/ipa/ipa_hbac_users.c
+++ b/src/providers/ipa/ipa_hbac_users.c
@@ -172,12 +172,12 @@ hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
goto done;
}
- DEBUG(7, ("Processing users for rule [%s]\n", rule_name));
+ DEBUG(7, "Processing users for rule [%s]\n", rule_name);
ret = hbac_get_category(rule_attrs, IPA_USER_CATEGORY,
&new_users->category);
if (ret != EOK) {
- DEBUG(1, ("Could not identify user categories\n"));
+ DEBUG(1, "Could not identify user categories\n");
goto done;
}
if (new_users->category & HBAC_CATEGORY_ALL) {
@@ -188,12 +188,12 @@ hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
ret = sysdb_attrs_get_el(rule_attrs, IPA_MEMBER_USER, &el);
if (ret != EOK && ret != ENOENT) {
- DEBUG(1, ("sysdb_attrs_get_el failed.\n"));
+ DEBUG(1, "sysdb_attrs_get_el failed.\n");
goto done;
}
if (ret == ENOENT || el->num_values == 0) {
el->num_values = 0;
- DEBUG(4, ("No user specified, rule will never apply.\n"));
+ DEBUG(4, "No user specified, rule will never apply.\n");
}
new_users->names = talloc_array(new_users,
@@ -234,7 +234,7 @@ hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
if (ret == EOK) {
if (count > 1) {
- DEBUG(1, ("Original DN matched multiple users. Skipping \n"));
+ DEBUG(1, "Original DN matched multiple users. Skipping \n");
talloc_zfree(member_dn);
continue;
}
@@ -242,7 +242,7 @@ hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Original DN matched a single user. Get the username */
name = ldb_msg_find_attr_as_string(msgs[0], SYSDB_NAME, NULL);
if (name == NULL) {
- DEBUG(1, ("Attribute is missing!\n"));
+ DEBUG(1, "Attribute is missing!\n");
ret = EFAULT;
goto done;
}
@@ -253,8 +253,8 @@ hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
ret = ENOMEM;
goto done;
}
- DEBUG(8, ("Added user [%s] to rule [%s]\n",
- name, rule_name));
+ DEBUG(8, "Added user [%s] to rule [%s]\n",
+ name, rule_name);
num_users++;
} else {
/* Check if it is a group instead */
@@ -267,8 +267,8 @@ hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
if (ret == EOK) {
if (count > 1) {
- DEBUG(1, ("Original DN matched multiple groups. "
- "Skipping\n"));
+ DEBUG(1, "Original DN matched multiple groups. "
+ "Skipping\n");
talloc_zfree(member_dn);
continue;
}
@@ -276,7 +276,7 @@ hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
/* Original DN matched a single group. Get the groupname */
name = ldb_msg_find_attr_as_string(msgs[0], SYSDB_NAME, NULL);
if (name == NULL) {
- DEBUG(1, ("Attribute is missing!\n"));
+ DEBUG(1, "Attribute is missing!\n");
ret = EFAULT;
goto done;
}
@@ -287,8 +287,8 @@ hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
ret = ENOMEM;
goto done;
}
- DEBUG(8, ("Added POSIX group [%s] to rule [%s]\n",
- name, rule_name));
+ DEBUG(8, "Added POSIX group [%s] to rule [%s]\n",
+ name, rule_name);
num_groups++;
} else {
/* If the group still matches the group pattern,
@@ -298,13 +298,13 @@ hbac_user_attrs_to_rule(TALLOC_CTX *mem_ctx,
member_user,
&new_users->groups[num_groups]);
if (ret == EOK) {
- DEBUG(8, ("Added non-POSIX group [%s] to rule [%s]\n",
- new_users->groups[num_groups], rule_name));
+ DEBUG(8, "Added non-POSIX group [%s] to rule [%s]\n",
+ new_users->groups[num_groups], rule_name);
num_groups++;
} else {
/* Not a group, so we don't care about it */
- DEBUG(1, ("[%s] does not map to either a user or group. "
- "Skipping\n", member_dn));
+ DEBUG(1, "[%s] does not map to either a user or group. "
+ "Skipping\n", member_dn);
}
}
}
diff --git a/src/providers/ipa/ipa_hostid.c b/src/providers/ipa/ipa_hostid.c
index 2ebe98688..905454d2e 100644
--- a/src/providers/ipa/ipa_hostid.c
+++ b/src/providers/ipa/ipa_hostid.c
@@ -110,7 +110,7 @@ ipa_host_info_complete(struct be_req *breq, int dp_error,
error_text = NULL;
} else {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Bug: dp_error is OK on failed request"));
+ "Bug: dp_error is OK on failed request");
dp_error = DP_ERR_FATAL;
error_text = default_error_text;
}
@@ -167,7 +167,7 @@ hosts_get_send(TALLOC_CTX *memctx,
state->op = sdap_id_op_create(state, ctx->conn->conn_cache);
if (!state->op) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_create failed\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_create failed\n");
ret = ENOMEM;
goto fail;
}
@@ -270,7 +270,7 @@ hosts_get_done(struct tevent_req *subreq)
if (state->count == 0) {
DEBUG(SSSDBG_OP_FAILURE,
- ("No host with name [%s] found.\n", state->name));
+ "No host with name [%s] found.\n", state->name);
ret = sysdb_delete_ssh_host(state->domain, state->name);
if (ret != EOK && ret != ENOENT) {
@@ -283,7 +283,7 @@ hosts_get_done(struct tevent_req *subreq)
if (state->count > 1) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Found more than one host with name [%s].\n", state->name));
+ "Found more than one host with name [%s].\n", state->name);
ret = EINVAL;
goto done;
}
diff --git a/src/providers/ipa/ipa_hosts.c b/src/providers/ipa/ipa_hosts.c
index 1323cac60..64f80f082 100644
--- a/src/providers/ipa/ipa_hosts.c
+++ b/src/providers/ipa/ipa_hosts.c
@@ -122,7 +122,7 @@ ipa_host_info_send(TALLOC_CTX *mem_ctx,
ret = ipa_host_info_next(req, state);
if (ret == EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("No host search base configured?\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "No host search base configured?\n");
ret = EINVAL;
}
@@ -169,7 +169,7 @@ static errno_t ipa_host_info_next(struct tevent_req *req,
SDAP_ENUM_SEARCH_TIMEOUT),
true);
if (subreq == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Error requesting host info\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Error requesting host info\n");
talloc_zfree(state->cur_filter);
return EIO;
}
@@ -232,7 +232,7 @@ ipa_host_info_done(struct tevent_req *subreq)
ret = ipa_hostgroup_info_next(req, state);
if (ret == EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("No host search base configured?\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "No host search base configured?\n");
tevent_req_error(req, EINVAL);
return;
} else if (ret != EAGAIN) {
@@ -255,7 +255,7 @@ ipa_host_info_done(struct tevent_req *subreq)
}
if (!sdap_has_deref_support(state->sh, state->opts)) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Server does not support deref\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Server does not support deref\n");
tevent_req_error(req, EIO);
return;
}
@@ -268,7 +268,7 @@ ipa_host_info_done(struct tevent_req *subreq)
dp_opt_get_int(state->opts->basic,
SDAP_ENUM_SEARCH_TIMEOUT));
if (subreq == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Error requesting host info\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Error requesting host info\n");
tevent_req_error(req, EIO);
return;
}
@@ -307,7 +307,7 @@ static errno_t ipa_hostgroup_info_next(struct tevent_req *req,
SDAP_ENUM_SEARCH_TIMEOUT),
true);
if (subreq == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Error requesting hostgroup info\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Error requesting hostgroup info\n");
talloc_zfree(state->cur_filter);
return EIO;
}
@@ -340,7 +340,7 @@ ipa_hostgroup_info_done(struct tevent_req *subreq)
talloc_zfree(subreq);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("sdap_get_generic_recv failed: [%d]\n", ret));
+ "sdap_get_generic_recv failed: [%d]\n", ret);
tevent_req_error(req, ret);
return;
}
@@ -385,7 +385,7 @@ ipa_hostgroup_info_done(struct tevent_req *subreq)
if (ret != EOK) goto done;
if (state->hostgroup_count == 0) {
- DEBUG(SSSDBG_FUNC_DATA, ("No host groups were dereferenced\n"));
+ DEBUG(SSSDBG_FUNC_DATA, "No host groups were dereferenced\n");
} else {
state->hostgroups = talloc_zero_array(state, struct sysdb_attrs *,
state->hostgroup_count);
@@ -411,8 +411,8 @@ ipa_hostgroup_info_done(struct tevent_req *subreq)
&hostgroup_name);
if (ret != EOK) goto done;
- DEBUG(SSSDBG_FUNC_DATA, ("Dereferenced host group: %s\n",
- hostgroup_name));
+ DEBUG(SSSDBG_FUNC_DATA, "Dereferenced host group: %s\n",
+ hostgroup_name);
state->hostgroups[j] = talloc_steal(state->hostgroups,
deref_result[i]->attrs);
j++;
@@ -425,7 +425,7 @@ done:
if (ret == EOK) {
tevent_req_done(req);
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("Error [%d][%s]\n", ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "Error [%d][%s]\n", ret, strerror(ret));
tevent_req_error(req, ret);
}
}
diff --git a/src/providers/ipa/ipa_id.c b/src/providers/ipa/ipa_id.c
index 56b8c9f05..5f9c84bab 100644
--- a/src/providers/ipa/ipa_id.c
+++ b/src/providers/ipa/ipa_id.c
@@ -39,7 +39,7 @@ static const char *ipa_account_info_error_text(int ret, int *dp_error,
return NULL;
}
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Bug: dp_error is OK on failed request\n"));
+ "Bug: dp_error is OK on failed request\n");
*dp_error = DP_ERR_FATAL;
break;
case DP_ERR_OFFLINE:
@@ -191,7 +191,7 @@ static struct tevent_req *ipa_id_get_netgroup_send(TALLOC_CTX *memctx,
state->op = sdap_id_op_create(state, ctx->conn->conn_cache);
if (!state->op) {
- DEBUG(2, ("sdap_id_op_create failed\n"));
+ DEBUG(2, "sdap_id_op_create failed\n");
ret = ENOMEM;
goto fail;
}
@@ -211,7 +211,7 @@ static struct tevent_req *ipa_id_get_netgroup_send(TALLOC_CTX *memctx,
clean_name,
ctx->opts->netgroup_map[IPA_OC_NETGROUP].name);
if (!state->filter) {
- DEBUG(2, ("Failed to build filter\n"));
+ DEBUG(2, "Failed to build filter\n");
ret = ENOMEM;
goto fail;
}
@@ -302,8 +302,8 @@ static void ipa_id_get_netgroup_done(struct tevent_req *subreq)
}
if (ret == EOK && state->count > 1) {
- DEBUG(1, ("Found more than one netgroup with the name [%s].\n",
- state->name));
+ DEBUG(1, "Found more than one netgroup with the name [%s].\n",
+ state->name);
tevent_req_error(req, EINVAL);
return;
}
diff --git a/src/providers/ipa/ipa_idmap.c b/src/providers/ipa/ipa_idmap.c
index eaca0ed3c..ee7a6fd47 100644
--- a/src/providers/ipa/ipa_idmap.c
+++ b/src/providers/ipa/ipa_idmap.c
@@ -48,8 +48,8 @@ static errno_t ipa_idmap_check_posix_child(struct sdap_idmap_ctx *idmap_ctx,
&has_algorithmic_mapping);
if (err == IDMAP_SUCCESS) {
DEBUG(SSSDBG_TRACE_ALL,
- ("Idmap of domain [%s] already known, nothing to do.\n",
- dom_sid_str));
+ "Idmap of domain [%s] already known, nothing to do.\n",
+ dom_sid_str);
return EOK;
} else {
err = sss_idmap_domain_by_name_has_algorithmic_mapping(idmap_ctx->map,
@@ -57,30 +57,30 @@ static errno_t ipa_idmap_check_posix_child(struct sdap_idmap_ctx *idmap_ctx,
&has_algorithmic_mapping);
if (err == IDMAP_SUCCESS) {
DEBUG(SSSDBG_TRACE_ALL,
- ("Idmap of domain [%s] already known, nothing to do.\n",
- dom_sid_str));
+ "Idmap of domain [%s] already known, nothing to do.\n",
+ dom_sid_str);
return EOK;
}
}
- DEBUG(SSSDBG_TRACE_ALL, ("Trying to add idmap for domain [%s].\n",
- dom_sid_str));
+ DEBUG(SSSDBG_TRACE_ALL, "Trying to add idmap for domain [%s].\n",
+ dom_sid_str);
if (err != IDMAP_SID_UNKNOWN && err != IDMAP_NAME_UNKNOWN) {
DEBUG(SSSDBG_OP_FAILURE,
- ("sss_idmap_domain_has_algorithmic_mapping failed.\n"));
+ "sss_idmap_domain_has_algorithmic_mapping failed.\n");
return EINVAL;
}
dom = find_subdomain_by_sid(idmap_ctx->id_ctx->be->domain, dom_sid_str);
if (dom == NULL) {
DEBUG(SSSDBG_OP_FAILURE,
- ("find_subdomain_by_sid failed with SID [%s].\n", dom_sid_str));
+ "find_subdomain_by_sid failed with SID [%s].\n", dom_sid_str);
return EINVAL;
}
if (dom->forest == NULL) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("No forest available for domain [%s].\n",
- dom_sid_str));
+ DEBUG(SSSDBG_MINOR_FAILURE, "No forest available for domain [%s].\n",
+ dom_sid_str);
return EINVAL;
}
@@ -88,20 +88,20 @@ static errno_t ipa_idmap_check_posix_child(struct sdap_idmap_ctx *idmap_ctx,
dom->forest, true);
if (forest_root == NULL) {
DEBUG(SSSDBG_OP_FAILURE,
- ("find_subdomain_by_name failed to find forest root [%s].\n",
- dom->forest));
+ "find_subdomain_by_name failed to find forest root [%s].\n",
+ dom->forest);
return ENOENT;
}
if (forest_root->domain_id == NULL) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Forest root [%s] does not have a SID.\n",
- dom->forest));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Forest root [%s] does not have a SID.\n",
+ dom->forest);
return EINVAL;
}
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_new failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_new failed.\n");
return ENOMEM;
}
@@ -113,8 +113,8 @@ static errno_t ipa_idmap_check_posix_child(struct sdap_idmap_ctx *idmap_ctx,
if (r->range_type == NULL
|| strcmp(r->range_type, IPA_RANGE_AD_TRUST_POSIX) != 0) {
DEBUG(SSSDBG_MINOR_FAILURE,
- ("Forest root does not have range type [%s].\n",
- IPA_RANGE_AD_TRUST_POSIX));
+ "Forest root does not have range type [%s].\n",
+ IPA_RANGE_AD_TRUST_POSIX);
ret = EINVAL;
goto done;
}
@@ -123,7 +123,7 @@ static errno_t ipa_idmap_check_posix_child(struct sdap_idmap_ctx *idmap_ctx,
range.max = r->base_id + r->id_range_size -1;
range_id = talloc_asprintf(tmp_ctx, "%s-%s", dom_sid_str, r->name);
if (range_id == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_asprintf failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_asprintf failed.\n");
ret = ENOMEM;
goto done;
}
@@ -132,7 +132,7 @@ static errno_t ipa_idmap_check_posix_child(struct sdap_idmap_ctx *idmap_ctx,
&range, range_id, 0, true);
if (err != IDMAP_SUCCESS && err != IDMAP_COLLISION) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Could not add range [%s] to ID map\n", range_id));
+ "Could not add range [%s] to ID map\n", range_id);
ret = EIO;
goto done;
}
@@ -142,8 +142,8 @@ static errno_t ipa_idmap_check_posix_child(struct sdap_idmap_ctx *idmap_ctx,
}
if (!found) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("No idrange found for forest root [%s].\n",
- forest_root->domain_id));
+ DEBUG(SSSDBG_MINOR_FAILURE, "No idrange found for forest root [%s].\n",
+ forest_root->domain_id);
ret = ENOENT;
goto done;
}
@@ -175,14 +175,14 @@ errno_t ipa_idmap_find_new_domain(struct sdap_idmap_ctx *idmap_ctx,
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_new failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_new failed.\n");
return ENOMEM;
}
ret = sysdb_get_ranges(tmp_ctx, idmap_ctx->id_ctx->be->domain->sysdb,
&range_count, &range_list);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_get_ranges failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_get_ranges failed.\n");
goto done;
}
@@ -207,9 +207,9 @@ errno_t ipa_idmap_find_new_domain(struct sdap_idmap_ctx *idmap_ctx,
name = r->trusted_dom_sid;
sid = r->trusted_dom_sid;
} else {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Cannot determine range type, " \
+ DEBUG(SSSDBG_MINOR_FAILURE, "Cannot determine range type, " \
"skipping id ange [%s].\n",
- r->name));
+ r->name);
continue;
}
} else {
@@ -229,9 +229,9 @@ errno_t ipa_idmap_find_new_domain(struct sdap_idmap_ctx *idmap_ctx,
name = r->trusted_dom_sid;
sid = r->trusted_dom_sid;
} else {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Range type [%s] not supported, " \
+ DEBUG(SSSDBG_MINOR_FAILURE, "Range type [%s] not supported, " \
"skipping id range [%s].\n",
- r->range_type, r->name));
+ r->range_type, r->name);
continue;
}
}
@@ -241,8 +241,8 @@ errno_t ipa_idmap_find_new_domain(struct sdap_idmap_ctx *idmap_ctx,
err = sss_idmap_add_domain_ex(idmap_ctx->map, name, sid, &range,
r->name, rid, external_mapping);
if (err != IDMAP_SUCCESS && err != IDMAP_COLLISION) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Could not add range [%s] to ID map\n",
- r->name));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Could not add range [%s] to ID map\n",
+ r->name);
ret = EIO;
goto done;
}
@@ -251,7 +251,7 @@ errno_t ipa_idmap_find_new_domain(struct sdap_idmap_ctx *idmap_ctx,
ret = ipa_idmap_check_posix_child(idmap_ctx, dom_name, dom_sid_str,
range_count, range_list);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_idmap_check_posix_child failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_idmap_check_posix_child failed.\n");
goto done;
}
@@ -299,8 +299,8 @@ errno_t ipa_idmap_init(TALLOC_CTX *mem_ctx,
&idmap_ctx->map);
if (err != IDMAP_SUCCESS) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Could not initialize the ID map: [%s]\n",
- idmap_error_string(err)));
+ "Could not initialize the ID map: [%s]\n",
+ idmap_error_string(err));
if (err == IDMAP_OUT_OF_MEMORY) {
ret = ENOMEM;
} else {
@@ -314,13 +314,13 @@ errno_t ipa_idmap_init(TALLOC_CTX *mem_ctx,
ret = sysdb_get_ranges(tmp_ctx, sysdb, &range_count, &range_list);
if (ret != EOK && ret != ENOENT) {
DEBUG(SSSDBG_FATAL_FAILURE,
- ("Could not read ranges from the cache: [%s]\n",
- strerror(ret)));
+ "Could not read ranges from the cache: [%s]\n",
+ strerror(ret));
goto done;
}
DEBUG(SSSDBG_CONF_SETTINGS,
- ("Initializing [%zu] domains for ID-mapping\n", range_count));
+ "Initializing [%zu] domains for ID-mapping\n", range_count);
for (c = 0; c < range_count; c++) {
@@ -344,9 +344,9 @@ errno_t ipa_idmap_init(TALLOC_CTX *mem_ctx,
sid = r->trusted_dom_sid;
name = sid;
} else {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Cannot determine range type, " \
+ DEBUG(SSSDBG_MINOR_FAILURE, "Cannot determine range type, " \
"skipping id ange [%s].\n",
- r->name));
+ r->name);
continue;
}
} else {
@@ -366,9 +366,9 @@ errno_t ipa_idmap_init(TALLOC_CTX *mem_ctx,
sid = r->trusted_dom_sid;
name = sid;
} else {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Range type [%s] not supported, " \
+ DEBUG(SSSDBG_MINOR_FAILURE, "Range type [%s] not supported, " \
"skipping id range [%s].\n",
- r->range_type, r->name));
+ r->range_type, r->name);
continue;
}
}
@@ -378,8 +378,8 @@ errno_t ipa_idmap_init(TALLOC_CTX *mem_ctx,
err = sss_idmap_add_domain_ex(idmap_ctx->map, name, sid, &range,
r->name, rid, external_mapping);
if (err != IDMAP_SUCCESS) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Could not add range [%s] to ID map\n",
- r->name));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Could not add range [%s] to ID map\n",
+ r->name);
ret = EIO;
goto done;
}
diff --git a/src/providers/ipa/ipa_init.c b/src/providers/ipa/ipa_init.c
index 54293698b..51b6e1885 100644
--- a/src/providers/ipa/ipa_init.c
+++ b/src/providers/ipa/ipa_init.c
@@ -96,7 +96,7 @@ static bool srv_in_server_list(const char *servers)
/* split server parm into a list */
ret = split_on_separator(tmp_ctx, servers, ',', true, true, &list, NULL);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to parse server list!\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to parse server list!\n");
goto done;
}
@@ -132,7 +132,7 @@ int common_ipa_init(struct be_ctx *bectx)
ipa_backup_servers, ipa_options,
&ipa_options->service);
if (ret != EOK) {
- DEBUG(0, ("Failed to init IPA failover service!\n"));
+ DEBUG(0, "Failed to init IPA failover service!\n");
return ret;
}
@@ -200,7 +200,7 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
*/
DEBUG(SSSDBG_CONF_SETTINGS,
- ("Dynamic DNS updates are on. Checking for nsupdate..\n"));
+ "Dynamic DNS updates are on. Checking for nsupdate..\n");
ret = be_nsupdate_check();
if (ret == EOK) {
/* nsupdate is available. Dynamic updates
@@ -208,7 +208,7 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
*/
ret = ipa_dyndns_init(sdap_ctx->be, ipa_options);
if (ret != EOK) {
- DEBUG(1, ("Failure setting up automatic DNS update\n"));
+ DEBUG(1, "Failure setting up automatic DNS update\n");
/* We will continue without DNS updating */
}
}
@@ -216,8 +216,8 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
ret = setup_tls_config(sdap_ctx->opts->basic);
if (ret != EOK) {
- DEBUG(1, ("setup_tls_config failed [%d][%s].\n",
- ret, strerror(ret)));
+ DEBUG(1, "setup_tls_config failed [%d][%s].\n",
+ ret, strerror(ret));
goto done;
}
@@ -233,8 +233,8 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
ret = sdap_setup_child();
if (ret != EOK) {
- DEBUG(1, ("setup_child failed [%d][%s].\n",
- ret, strerror(ret)));
+ DEBUG(1, "setup_child failed [%d][%s].\n",
+ ret, strerror(ret));
goto done;
}
@@ -247,9 +247,9 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
if (srv_in_server_list(ipa_servers) == true
|| dp_opt_get_bool(ipa_options->basic,
IPA_ENABLE_DNS_SITES) == true) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("SRV resolution or IPA sites enabled "
+ DEBUG(SSSDBG_MINOR_FAILURE, "SRV resolution or IPA sites enabled "
"on the IPA server. Site discovery of trusted AD servers "
- "might not work\n"));
+ "might not work\n");
/* If SRV discovery is enabled on the server and
* dns_discovery_domain is set explicitly, then
@@ -264,18 +264,18 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
"It is recommended not to use SRV discovery or the "
"dns_discovery_domain option for the IPA domain while "
"running on the server itself\n"));
- DEBUG(SSSDBG_CRIT_FAILURE, ("SRV discovery is enabled on IPA "
+ DEBUG(SSSDBG_CRIT_FAILURE, "SRV discovery is enabled on IPA "
"server while using custom dns_discovery_domain. "
"DNS discovery of trusted AD domain will likely fail. "
"It is recommended not to use SRV discovery or the "
"dns_discovery_domain option for the IPA domain while "
- "running on the server itself\n"));
+ "running on the server itself\n");
}
ret = be_fo_set_dns_srv_lookup_plugin(bectx, hostname);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Unable to set SRV lookup plugin "
- "[%d]: %s\n", ret, strerror(ret)));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Unable to set SRV lookup plugin "
+ "[%d]: %s\n", ret, strerror(ret));
goto done;
}
} else {
@@ -285,13 +285,13 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
ret = dp_opt_set_string(bectx->be_res->opts, DP_RES_OPT_DNS_DOMAIN,
NULL);
if (ret != EOK) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Could not reset the "
+ DEBUG(SSSDBG_MINOR_FAILURE, "Could not reset the "
"dns_discovery_domain, trusted AD domains discovery "
"might fail. Please remove dns_discovery_domain "
- "from the config file and restart the SSSD\n"));
+ "from the config file and restart the SSSD\n");
} else {
- DEBUG(SSSDBG_CONF_SETTINGS, ("The value of dns_discovery_domain "
- "will be ignored in ipa_server_mode\n"));
+ DEBUG(SSSDBG_CONF_SETTINGS, "The value of dns_discovery_domain "
+ "will be ignored in ipa_server_mode\n");
}
}
} else if (dp_opt_get_bool(ipa_options->basic, IPA_ENABLE_DNS_SITES)) {
@@ -300,7 +300,7 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
srv_ctx = ipa_srv_plugin_ctx_init(bectx, bectx->be_res->resolv,
hostname, ipa_domain);
if (srv_ctx == NULL) {
- DEBUG(SSSDBG_FATAL_FAILURE, ("Out of memory?\n"));
+ DEBUG(SSSDBG_FATAL_FAILURE, "Out of memory?\n");
ret = ENOMEM;
goto done;
}
@@ -311,8 +311,8 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
/* fall back to standard plugin on clients. */
ret = be_fo_set_dns_srv_lookup_plugin(bectx, hostname);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Unable to set SRV lookup plugin "
- "[%d]: %s\n", ret, strerror(ret)));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Unable to set SRV lookup plugin "
+ "[%d]: %s\n", ret, strerror(ret));
goto done;
}
}
@@ -323,8 +323,8 @@ int sssm_ipa_id_init(struct be_ctx *bectx,
sdap_refresh_netgroups_recv,
sdap_ctx);
if (ret != EOK && ret != EEXIST) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Periodical refresh of netgroups "
- "will not work [%d]: %s\n", ret, strerror(ret)));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Periodical refresh of netgroups "
+ "will not work [%d]: %s\n", ret, strerror(ret));
}
*ops = &ipa_id_ops;
@@ -371,7 +371,7 @@ int sssm_ipa_auth_init(struct be_ctx *bectx,
ret = sssm_ipa_id_init(bectx, &id_ops, (void **) &id_ctx);
if (ret != EOK) {
- DEBUG(1, ("sssm_ipa_id_init failed.\n"));
+ DEBUG(1, "sssm_ipa_id_init failed.\n");
goto done;
}
ipa_auth_ctx->sdap_id_ctx = id_ctx->sdap_id_ctx;
@@ -379,7 +379,7 @@ int sssm_ipa_auth_init(struct be_ctx *bectx,
ret = dp_copy_options(ipa_auth_ctx, ipa_options->basic,
IPA_OPTS_BASIC, &ipa_auth_ctx->ipa_options);
if (ret != EOK) {
- DEBUG(1, ("dp_copy_options failed.\n"));
+ DEBUG(1, "dp_copy_options failed.\n");
goto done;
}
@@ -422,8 +422,8 @@ int sssm_ipa_auth_init(struct be_ctx *bectx,
ret = setup_tls_config(sdap_auth_ctx->opts->basic);
if (ret != EOK) {
- DEBUG(1, ("setup_tls_config failed [%d][%s].\n",
- ret, strerror(ret)));
+ DEBUG(1, "setup_tls_config failed [%d][%s].\n",
+ ret, strerror(ret));
goto done;
}
@@ -431,8 +431,8 @@ int sssm_ipa_auth_init(struct be_ctx *bectx,
ret = krb5_child_init(krb5_auth_ctx, bectx);
if (ret != EOK) {
DEBUG(SSSDBG_FATAL_FAILURE,
- ("Could not initialize krb5_child settings: [%s]\n",
- strerror(ret)));
+ "Could not initialize krb5_child settings: [%s]\n",
+ strerror(ret));
goto done;
}
@@ -467,13 +467,13 @@ int sssm_ipa_access_init(struct be_ctx *bectx,
ipa_access_ctx = talloc_zero(bectx, struct ipa_access_ctx);
if (ipa_access_ctx == NULL) {
- DEBUG(1, ("talloc_zero failed.\n"));
+ DEBUG(1, "talloc_zero failed.\n");
return ENOMEM;
}
ret = sssm_ipa_id_init(bectx, ops, (void **) &id_ctx);
if (ret != EOK) {
- DEBUG(1, ("sssm_ipa_id_init failed.\n"));
+ DEBUG(1, "sssm_ipa_id_init failed.\n");
goto done;
}
ipa_access_ctx->sdap_ctx = id_ctx->sdap_id_ctx;
@@ -485,7 +485,7 @@ int sssm_ipa_access_init(struct be_ctx *bectx,
ret = dp_copy_options(ipa_access_ctx, ipa_options->basic,
IPA_OPTS_BASIC, &ipa_access_ctx->ipa_options);
if (ret != EOK) {
- DEBUG(1, ("dp_copy_options failed.\n"));
+ DEBUG(1, "dp_copy_options failed.\n");
goto done;
}
@@ -519,13 +519,13 @@ int sssm_ipa_selinux_init(struct be_ctx *bectx,
selinux_ctx = talloc_zero(bectx, struct ipa_selinux_ctx);
if (selinux_ctx == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_zero failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "talloc_zero failed.\n");
return ENOMEM;
}
ret = sssm_ipa_id_init(bectx, ops, (void **) &selinux_ctx->id_ctx);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("sssm_ipa_id_init failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "sssm_ipa_id_init failed.\n");
goto done;
}
@@ -556,13 +556,13 @@ int sssm_ipa_hostid_init(struct be_ctx *bectx,
hostid_ctx = talloc_zero(bectx, struct ipa_hostid_ctx);
if (hostid_ctx == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_zero failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "talloc_zero failed.\n");
return ENOMEM;
}
ret = sssm_ipa_id_init(bectx, ops, (void **) &id_ctx);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("sssm_ipa_id_init failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "sssm_ipa_id_init failed.\n");
goto done;
}
hostid_ctx->sdap_id_ctx = id_ctx->sdap_id_ctx;
@@ -588,18 +588,18 @@ int sssm_ipa_autofs_init(struct be_ctx *bectx,
struct ipa_id_ctx *id_ctx;
int ret;
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Initializing IPA autofs handler\n"));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Initializing IPA autofs handler\n");
ret = sssm_ipa_id_init(bectx, ops, (void **) &id_ctx);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("sssm_ipa_id_init failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "sssm_ipa_id_init failed.\n");
return ret;
}
return ipa_autofs_init(bectx, id_ctx, ops, pvt_data);
#else
- DEBUG(SSSDBG_MINOR_FAILURE, ("Autofs init handler called but SSSD is "
- "built without autofs support, ignoring\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Autofs init handler called but SSSD is "
+ "built without autofs support, ignoring\n");
return EOK;
#endif
}
@@ -613,19 +613,19 @@ int sssm_ipa_subdomains_init(struct be_ctx *bectx,
ret = sssm_ipa_id_init(bectx, ops, (void **) &id_ctx);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("sssm_ipa_id_init failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "sssm_ipa_id_init failed.\n");
return ret;
}
ret = ipa_subdom_init(bectx, id_ctx, ops, pvt_data);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("ipa_subdom_init failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "ipa_subdom_init failed.\n");
return ret;
}
ret = ipa_ad_subdom_init(bectx, id_ctx);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("ipa_ad_subdom_init failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "ipa_ad_subdom_init failed.\n");
return ret;
}
@@ -640,18 +640,18 @@ int sssm_ipa_sudo_init(struct be_ctx *bectx,
struct ipa_id_ctx *id_ctx;
int ret;
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Initializing IPA sudo handler\n"));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Initializing IPA sudo handler\n");
ret = sssm_ipa_id_init(bectx, ops, (void **) &id_ctx);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("sssm_ipa_id_init failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "sssm_ipa_id_init failed.\n");
return ret;
}
return ipa_sudo_init(bectx, id_ctx, ops, pvt_data);
#else
- DEBUG(SSSDBG_MINOR_FAILURE, ("Sudo init handler called but SSSD is "
- "built without sudo support, ignoring\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Sudo init handler called but SSSD is "
+ "built without sudo support, ignoring\n");
return EOK;
#endif
}
diff --git a/src/providers/ipa/ipa_netgroups.c b/src/providers/ipa/ipa_netgroups.c
index 5bf7f9e5e..3d1c07a11 100644
--- a/src/providers/ipa/ipa_netgroups.c
+++ b/src/providers/ipa/ipa_netgroups.c
@@ -83,7 +83,7 @@ static errno_t ipa_save_netgroup(TALLOC_CTX *mem_ctx,
goto fail;
}
name = (const char *)el->values[0].data;
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Storing netgroup %s\n", name));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Storing netgroup %s\n", name);
netgroup_attrs = sysdb_new_attrs(mem_ctx);
if (!netgroup_attrs) {
@@ -96,10 +96,10 @@ static errno_t ipa_save_netgroup(TALLOC_CTX *mem_ctx,
goto fail;
}
if (el->num_values == 0) {
- DEBUG(7, ("Original DN is not available for [%s].\n", name));
+ DEBUG(7, "Original DN is not available for [%s].\n", name);
} else {
- DEBUG(7, ("Adding original DN [%s] to attributes of [%s].\n",
- el->values[0].data, name));
+ DEBUG(7, "Adding original DN [%s] to attributes of [%s].\n",
+ el->values[0].data, name);
ret = sysdb_attrs_add_string(netgroup_attrs, SYSDB_ORIG_DN,
(const char *)el->values[0].data);
if (ret) {
@@ -112,7 +112,7 @@ static errno_t ipa_save_netgroup(TALLOC_CTX *mem_ctx,
goto fail;
}
if (el->num_values == 0) {
- DEBUG(SSSDBG_TRACE_INTERNAL, ("No netgroup triples for netgroup [%s].\n", name));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "No netgroup triples for netgroup [%s].\n", name);
ret = sysdb_attrs_get_el(netgroup_attrs, SYSDB_NETGROUP_TRIPLE, &el);
if (ret != EOK) {
goto fail;
@@ -135,10 +135,10 @@ static errno_t ipa_save_netgroup(TALLOC_CTX *mem_ctx,
goto fail;
}
if (el->num_values == 0) {
- DEBUG(7, ("No original members for netgroup [%s]\n", name));
+ DEBUG(7, "No original members for netgroup [%s]\n", name);
} else {
- DEBUG(7, ("Adding original members to netgroup [%s]\n", name));
+ DEBUG(7, "Adding original members to netgroup [%s]\n", name);
for(c = 0; c < el->num_values; c++) {
ret = sysdb_attrs_add_string(netgroup_attrs,
opts->netgroup_map[IPA_AT_NETGROUP_MEMBER].sys_name,
@@ -155,10 +155,10 @@ static errno_t ipa_save_netgroup(TALLOC_CTX *mem_ctx,
goto fail;
}
if (el->num_values == 0) {
- DEBUG(7, ("No members for netgroup [%s]\n", name));
+ DEBUG(7, "No members for netgroup [%s]\n", name);
} else {
- DEBUG(7, ("Adding members to netgroup [%s]\n", name));
+ DEBUG(7, "Adding members to netgroup [%s]\n", name);
for(c = 0; c < el->num_values; c++) {
ret = sysdb_attrs_add_string(netgroup_attrs, SYSDB_NETGROUP_MEMBER,
(const char*)el->values[c].data);
@@ -168,7 +168,7 @@ static errno_t ipa_save_netgroup(TALLOC_CTX *mem_ctx,
}
}
- DEBUG(6, ("Storing info for netgroup %s\n", name));
+ DEBUG(6, "Storing info for netgroup %s\n", name);
ret = sysdb_add_netgroup(dom, name, NULL, netgroup_attrs, NULL,
dom->netgroup_timeout, 0);
@@ -177,7 +177,7 @@ static errno_t ipa_save_netgroup(TALLOC_CTX *mem_ctx,
return EOK;
fail:
- DEBUG(2, ("Failed to save netgroup %s\n", name));
+ DEBUG(2, "Failed to save netgroup %s\n", name);
return ret;
}
@@ -216,7 +216,7 @@ struct tevent_req *ipa_get_netgroups_send(TALLOC_CTX *memctx,
if (!ipa_options->id->sdom->netgroup_search_bases) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Netgroup lookup request without a search base\n"));
+ "Netgroup lookup request without a search base\n");
ret = EINVAL;
goto done;
}
@@ -259,8 +259,8 @@ static errno_t ipa_netgr_next_base(struct tevent_req *req)
}
DEBUG(SSSDBG_TRACE_FUNC,
- ("Searching for netgroups with base [%s]\n",
- netgr_bases[state->netgr_base_iter]->basedn));
+ "Searching for netgroups with base [%s]\n",
+ netgr_bases[state->netgr_base_iter]->basedn);
subreq = sdap_get_generic_send(
state, state->ev, state->opts, state->sh,
@@ -314,8 +314,8 @@ static void ipa_get_netgroups_process(struct tevent_req *subreq)
goto done;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("Search for netgroups, returned %zu results.\n",
- netgroups_count));
+ DEBUG(SSSDBG_TRACE_FUNC, "Search for netgroups, returned %zu results.\n",
+ netgroups_count);
if (netgroups_count == 0) {
/* No netgroups found in this search */
@@ -575,8 +575,8 @@ static void ipa_netgr_members_process(struct tevent_req *subreq)
goto fail;
}
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Found %zu members in current search base\n",
- count));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Found %zu members in current search base\n",
+ count);
next_call = NULL;
/* While processing a batch of entities from one search base,
@@ -612,8 +612,8 @@ static void ipa_netgr_members_process(struct tevent_req *subreq)
table = state->new_hosts;
} else {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Invalid entity type given for processing: %d\n",
- state->current_entity));
+ "Invalid entity type given for processing: %d\n",
+ state->current_entity);
ret = EINVAL;
goto fail;
}
@@ -868,7 +868,7 @@ static int ipa_netgr_process_all(struct ipa_get_netgroups_state *state)
hash_iterate(state->new_netgroups, extract_netgroups, state);
for (i = 0; i < state->netgroups_count; i++) {
/* load all its member netgroups, translate */
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Extracting netgroup members of netgroup %d\n", i));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Extracting netgroup members of netgroup %d\n", i);
ret = sysdb_attrs_get_string_array(state->netgroups[i],
SYSDB_ORIG_NETGROUP_MEMBER,
state, &members);
@@ -901,10 +901,10 @@ static int ipa_netgr_process_all(struct ipa_get_netgroups_state *state)
}
talloc_zfree(members);
}
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Extracted %d netgroup members\n", j));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Extracted %d netgroup members\n", j);
/* Load all UIDs */
- DEBUG(SSSDBG_TRACE_ALL, ("Extracting user members of netgroup %d\n", i));
+ DEBUG(SSSDBG_TRACE_ALL, "Extracting user members of netgroup %d\n", i);
ret = extract_members(state, state->netgroups[i],
SYSDB_ORIG_MEMBER_USER,
state->new_users,
@@ -912,9 +912,9 @@ static int ipa_netgr_process_all(struct ipa_get_netgroups_state *state)
if (ret != EOK) {
goto done;
}
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Extracted %d user members\n", uids_count));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Extracted %d user members\n", uids_count);
- DEBUG(SSSDBG_TRACE_ALL, ("Extracting host members of netgroup %d\n", i));
+ DEBUG(SSSDBG_TRACE_ALL, "Extracting host members of netgroup %d\n", i);
ret = extract_members(state, state->netgroups[i],
SYSDB_ORIG_MEMBER_HOST,
state->new_hosts,
@@ -922,7 +922,7 @@ static int ipa_netgr_process_all(struct ipa_get_netgroups_state *state)
if (ret != EOK) {
goto done;
}
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Extracted %d host members\n", hosts_count));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Extracted %d host members\n", hosts_count);
ret = sysdb_attrs_get_el(state->netgroups[i],
SYSDB_ORIG_NETGROUP_EXTERNAL_HOST,
@@ -966,8 +966,8 @@ static int ipa_netgr_process_all(struct ipa_get_netgroups_state *state)
hosts = dash;
}
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Putting together triples of "
- "netgroup %d\n", i));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Putting together triples of "
+ "netgroup %d\n", i);
for (j = 0; j < uids_count; j++) {
for (k = 0; k < hosts_count; k++) {
triple = talloc_asprintf(state, "(%s,%s,%s)",
diff --git a/src/providers/ipa/ipa_s2n_exop.c b/src/providers/ipa/ipa_s2n_exop.c
index 628880f4f..59a99061a 100644
--- a/src/providers/ipa/ipa_s2n_exop.c
+++ b/src/providers/ipa/ipa_s2n_exop.c
@@ -79,22 +79,22 @@ static struct tevent_req *ipa_s2n_exop_send(TALLOC_CTX *mem_ctx,
state->retoid = NULL;
state->retdata = NULL;
- DEBUG(SSSDBG_TRACE_FUNC, ("Executing extended operation\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "Executing extended operation\n");
ret = ldap_extended_operation(state->sh->ldap, EXOP_SID2NAME_OID,
bv, NULL, NULL, &msgid);
if (ret == -1 || msgid == -1) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("ldap_extended_operation failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "ldap_extended_operation failed\n");
ret = ERR_NETWORK_IO;
goto fail;
}
- DEBUG(SSSDBG_TRACE_INTERNAL, ("ldap_extended_operation sent, msgid = %d\n", msgid));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "ldap_extended_operation sent, msgid = %d\n", msgid);
/* FIXME: get timeouts from configuration, for now 10 secs. */
ret = sdap_op_add(state, ev, state->sh, msgid, ipa_s2n_exop_done, req, 10,
&state->op);
if (ret) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to set up operation!\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to set up operation!\n");
ret = ERR_INTERNAL;
goto fail;
}
@@ -129,13 +129,13 @@ static void ipa_s2n_exop_done(struct sdap_op *op,
&result, &errmsg, NULL, NULL,
NULL, 0);
if (ret != LDAP_SUCCESS) {
- DEBUG(SSSDBG_OP_FAILURE, ("ldap_parse_result failed (%d)\n", state->op->msgid));
+ DEBUG(SSSDBG_OP_FAILURE, "ldap_parse_result failed (%d)\n", state->op->msgid);
ret = ERR_NETWORK_IO;
goto done;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("ldap_extended_operation result: %s(%d), %s\n",
- sss_ldap_err2string(result), result, errmsg));
+ DEBUG(SSSDBG_TRACE_FUNC, "ldap_extended_operation result: %s(%d), %s\n",
+ sss_ldap_err2string(result), result, errmsg);
if (result != LDAP_SUCCESS) {
ret = ERR_NETWORK_IO;
@@ -145,21 +145,21 @@ static void ipa_s2n_exop_done(struct sdap_op *op,
ret = ldap_parse_extended_result(state->sh->ldap, reply->msg,
&retoid, &retdata, 0);
if (ret != LDAP_SUCCESS) {
- DEBUG(SSSDBG_OP_FAILURE, ("ldap_parse_extendend_result failed (%d)\n", ret));
+ DEBUG(SSSDBG_OP_FAILURE, "ldap_parse_extendend_result failed (%d)\n", ret);
ret = ERR_NETWORK_IO;
goto done;
}
state->retoid = talloc_strdup(state, retoid);
if (state->retoid == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
state->retdata = talloc(state, struct berval);
if (state->retdata == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc failed.\n");
ret = ENOMEM;
goto done;
}
@@ -167,7 +167,7 @@ static void ipa_s2n_exop_done(struct sdap_op *op,
state->retdata->bv_val = talloc_memdup(state->retdata, retdata->bv_val,
retdata->bv_len);
if (state->retdata->bv_val == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_memdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_memdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -306,8 +306,8 @@ static errno_t s2n_encode_request(TALLOC_CTX *mem_ctx,
domain_name,
req_input->inp.id);
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("Unexpected input type [%d].\n",
- req_input->type == REQ_INP_ID));
+ DEBUG(SSSDBG_OP_FAILURE, "Unexpected input type [%d].\n",
+ req_input->type == REQ_INP_ID);
ret = EINVAL;
goto done;
}
@@ -322,8 +322,8 @@ static errno_t s2n_encode_request(TALLOC_CTX *mem_ctx,
domain_name,
req_input->inp.id);
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("Unexpected input type [%d].\n",
- req_input->type == REQ_INP_ID));
+ DEBUG(SSSDBG_OP_FAILURE, "Unexpected input type [%d].\n",
+ req_input->type == REQ_INP_ID);
ret = EINVAL;
goto done;
}
@@ -333,8 +333,8 @@ static errno_t s2n_encode_request(TALLOC_CTX *mem_ctx,
ret = ber_printf(ber, "{ees}", INP_SID, request_type,
req_input->inp.secid);
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("Unexpected input type [%d].\n",
- req_input->type == REQ_INP_ID));
+ DEBUG(SSSDBG_OP_FAILURE, "Unexpected input type [%d].\n",
+ req_input->type == REQ_INP_ID);
ret = EINVAL;
goto done;
}
@@ -430,33 +430,33 @@ static errno_t s2n_response_to_attrs(TALLOC_CTX *mem_ctx,
char *sid_str;
if (retoid == NULL || retdata == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("Missing OID or data.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Missing OID or data.\n");
return EINVAL;
}
if (strcmp(retoid, EXOP_SID2NAME_OID) != 0) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Result has wrong OID, expected [%s], got [%s].\n",
- EXOP_SID2NAME_OID, retoid));
+ "Result has wrong OID, expected [%s], got [%s].\n",
+ EXOP_SID2NAME_OID, retoid);
return EINVAL;
}
ber = ber_init(retdata);
if (ber == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("ber_init failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ber_init failed.\n");
return EINVAL;
}
tag = ber_scanf(ber, "{e", &type);
if (tag == LBER_ERROR) {
- DEBUG(SSSDBG_OP_FAILURE, ("ber_scanf failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ber_scanf failed.\n");
ret = EINVAL;
goto done;
}
attrs = talloc_zero(mem_ctx, struct resp_attrs);
if (attrs == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_zero failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_zero failed.\n");
ret = ENOMEM;
goto done;
}
@@ -465,7 +465,7 @@ static errno_t s2n_response_to_attrs(TALLOC_CTX *mem_ctx,
case RESP_USER:
tag = ber_scanf(ber, "{aaii}}", &domain_name, &name, &uid, &gid);
if (tag == LBER_ERROR) {
- DEBUG(SSSDBG_OP_FAILURE, ("ber_scanf failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ber_scanf failed.\n");
ret = EINVAL;
goto done;
}
@@ -477,7 +477,7 @@ static errno_t s2n_response_to_attrs(TALLOC_CTX *mem_ctx,
* lowercase the name. */
attrs->a.user.pw_name = sss_tc_utf8_str_tolower(attrs, name);
if (attrs->a.user.pw_name == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -489,7 +489,7 @@ static errno_t s2n_response_to_attrs(TALLOC_CTX *mem_ctx,
case RESP_GROUP:
tag = ber_scanf(ber, "{aai}}", &domain_name, &name, &gid);
if (tag == LBER_ERROR) {
- DEBUG(SSSDBG_OP_FAILURE, ("ber_scanf failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ber_scanf failed.\n");
ret = EINVAL;
goto done;
}
@@ -501,7 +501,7 @@ static errno_t s2n_response_to_attrs(TALLOC_CTX *mem_ctx,
* lowercase the name. */
attrs->a.group.gr_name = sss_tc_utf8_str_tolower(attrs, name);
if (attrs->a.group.gr_name == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -512,14 +512,14 @@ static errno_t s2n_response_to_attrs(TALLOC_CTX *mem_ctx,
case RESP_SID:
tag = ber_scanf(ber, "a}", &sid_str);
if (tag == LBER_ERROR) {
- DEBUG(SSSDBG_OP_FAILURE, ("ber_scanf failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ber_scanf failed.\n");
ret = EINVAL;
goto done;
}
attrs->a.sid_str = talloc_strdup(attrs, sid_str);
if (attrs->a.sid_str == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -527,21 +527,21 @@ static errno_t s2n_response_to_attrs(TALLOC_CTX *mem_ctx,
case RESP_NAME:
tag = ber_scanf(ber, "{aa}", &domain_name, &name);
if (tag == LBER_ERROR) {
- DEBUG(SSSDBG_OP_FAILURE, ("ber_scanf failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ber_scanf failed.\n");
ret = EINVAL;
goto done;
}
attrs->a.name = sss_tc_utf8_str_tolower(attrs, name);
if (attrs->a.name == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sss_tc_utf8_str_tolower failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sss_tc_utf8_str_tolower failed.\n");
ret = ENOMEM;
goto done;
}
break;
default:
- DEBUG(SSSDBG_OP_FAILURE, ("Unexpected response type [%d].\n",
- type));
+ DEBUG(SSSDBG_OP_FAILURE, "Unexpected response type [%d].\n",
+ type);
ret = EINVAL;
goto done;
}
@@ -550,7 +550,7 @@ static errno_t s2n_response_to_attrs(TALLOC_CTX *mem_ctx,
if (type != RESP_SID) {
attrs->domain_name = talloc_strdup(attrs, domain_name);
if (attrs->domain_name == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -620,7 +620,7 @@ struct tevent_req *ipa_s2n_get_acct_info_send(TALLOC_CTX *mem_ctx,
subreq = ipa_s2n_exop_send(state, state->ev, state->sh, bv_req);
if (subreq == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_s2n_exop_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_s2n_exop_send failed.\n");
ret = ENOMEM;
goto fail;
}
@@ -660,7 +660,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
ret = ipa_s2n_exop_recv(subreq, state, &retoid, &retdata);
talloc_zfree(subreq);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("s2n exop request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "s2n exop request failed.\n");
goto done;
}
@@ -668,19 +668,19 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
case REQ_FULL:
ret = s2n_response_to_attrs(state, retoid, retdata, &attrs);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("s2n_response_to_attrs failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "s2n_response_to_attrs failed.\n");
goto done;
}
if (!(strcasecmp(state->dom->name, attrs->domain_name) == 0 ||
(state->dom->flat_name != NULL &&
strcasecmp(state->dom->flat_name, attrs->domain_name) == 0))) {
- DEBUG(SSSDBG_OP_FAILURE, ("Unexpected domain name returned, "
+ DEBUG(SSSDBG_OP_FAILURE, "Unexpected domain name returned, "
"expected [%s] or [%s], got [%s].\n",
state->dom->name,
state->dom->flat_name == NULL ? "" :
state->dom->flat_name,
- attrs->domain_name));
+ attrs->domain_name);
ret = EINVAL;
goto done;
}
@@ -703,7 +703,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
subreq = ipa_s2n_exop_send(state, state->ev, state->sh, bv_req);
if (subreq == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_s2n_exop_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_s2n_exop_send failed.\n");
ret = ENOMEM;
goto done;
}
@@ -714,19 +714,19 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
case REQ_SIMPLE:
ret = s2n_response_to_attrs(state, retoid, retdata, &simple_attrs);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("s2n_response_to_attrs failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "s2n_response_to_attrs failed.\n");
goto done;
}
break;
default:
- DEBUG(SSSDBG_CRIT_FAILURE, ("Unexpected request type.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Unexpected request type.\n");
ret = EINVAL;
goto done;
}
if (state->attrs == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Missing data of full request.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Missing data of full request.\n");
ret = EINVAL;
goto done;
} else {
@@ -753,7 +753,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
user_attrs = sysdb_new_attrs(state);
if (user_attrs == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_new_attrs failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_new_attrs failed.\n");
ret = ENOMEM;
goto done;
}
@@ -762,7 +762,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
name = sss_tc_fqname(state, state->dom->names, state->dom,
attrs->a.user.pw_name);
if (!name) {
- DEBUG(SSSDBG_OP_FAILURE, ("failed to format user name.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "failed to format user name.\n");
ret = ENOMEM;
goto done;
}
@@ -770,7 +770,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
ret = sysdb_attrs_add_lc_name_alias(user_attrs, name);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("sysdb_attrs_add_lc_name_alias failed.\n"));
+ "sysdb_attrs_add_lc_name_alias failed.\n");
goto done;
}
@@ -782,21 +782,21 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
* it from there. */
realm = get_uppercase_realm(state, state->dom->name);
if (!realm) {
- DEBUG(SSSDBG_OP_FAILURE, ("failed to get realm.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "failed to get realm.\n");
ret = ENOMEM;
goto done;
}
upn = talloc_asprintf(state, "%s@%s",
attrs->a.user.pw_name, realm);
if (!upn) {
- DEBUG(SSSDBG_OP_FAILURE, ("failed to format UPN.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "failed to format UPN.\n");
ret = ENOMEM;
goto done;
}
ret = sysdb_attrs_add_string(user_attrs, SYSDB_UPN, upn);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_add_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_add_string failed.\n");
goto done;
}
@@ -804,7 +804,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
ret = sysdb_attrs_add_string(user_attrs, SYSDB_SID_STR,
state->req_input->inp.secid);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_add_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_add_string failed.\n");
goto done;
}
}
@@ -813,7 +813,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
ret = sysdb_attrs_add_string(user_attrs, SYSDB_SID_STR,
simple_attrs->a.sid_str);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_add_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_add_string failed.\n");
goto done;
}
}
@@ -834,14 +834,14 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
name = sss_tc_fqname(state, state->dom->names, state->dom,
attrs->a.group.gr_name);
if (!name) {
- DEBUG(SSSDBG_OP_FAILURE, ("failed to format user name,\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "failed to format user name,\n");
ret = ENOMEM;
goto done;
}
group_attrs = sysdb_new_attrs(state);
if (group_attrs == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_new_attrs failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_new_attrs failed.\n");
ret = ENOMEM;
goto done;
}
@@ -849,7 +849,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
ret = sysdb_attrs_add_lc_name_alias(group_attrs, name);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("sysdb_attrs_add_lc_name_alias failed.\n"));
+ "sysdb_attrs_add_lc_name_alias failed.\n");
goto done;
}
@@ -857,7 +857,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
ret = sysdb_attrs_add_string(group_attrs, SYSDB_SID_STR,
state->req_input->inp.secid);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_add_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_add_string failed.\n");
goto done;
}
}
@@ -866,7 +866,7 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
ret = sysdb_attrs_add_string(group_attrs, SYSDB_SID_STR,
simple_attrs->a.sid_str);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_add_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_add_string failed.\n");
goto done;
}
}
@@ -875,8 +875,8 @@ static void ipa_s2n_get_user_done(struct tevent_req *subreq)
group_attrs, timeout, now);
break;
default:
- DEBUG(SSSDBG_OP_FAILURE, ("Unexpected response type [%d].\n",
- attrs->response_type));
+ DEBUG(SSSDBG_OP_FAILURE, "Unexpected response type [%d].\n",
+ attrs->response_type);
ret = EINVAL;
goto done;
}
diff --git a/src/providers/ipa/ipa_selinux.c b/src/providers/ipa/ipa_selinux.c
index 10dc872cb..d371d3c1d 100644
--- a/src/providers/ipa/ipa_selinux.c
+++ b/src/providers/ipa/ipa_selinux.c
@@ -105,23 +105,23 @@ void ipa_selinux_handler(struct be_req *be_req)
hostname = dp_opt_get_string(selinux_ctx->id_ctx->ipa_options->basic,
IPA_HOSTNAME);
if (!hostname) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot determine this machine's host name\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot determine this machine's host name\n");
goto fail;
}
if (strcasecmp(pd->domain, be_ctx->domain->name) != 0) {
subdom_be_ctx = ipa_get_subdomains_be_ctx(be_ctx);
if (subdom_be_ctx == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("Subdomains are not configured, " \
+ DEBUG(SSSDBG_OP_FAILURE, "Subdomains are not configured, " \
"cannot lookup domain [%s].\n",
- pd->domain));
+ pd->domain);
goto fail;
} else {
user_domain = find_subdomain_by_name(subdom_be_ctx->domain,
pd->domain, true);
if (user_domain == NULL) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("No domain entry found " \
- "for [%s].\n", pd->domain));
+ DEBUG(SSSDBG_MINOR_FAILURE, "No domain entry found " \
+ "for [%s].\n", pd->domain);
goto fail;
}
}
@@ -134,14 +134,14 @@ void ipa_selinux_handler(struct be_req *be_req)
be_req, pd->user, hostname,
selinux_ctx);
if (op_ctx == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot create op context\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot create op context\n");
goto fail;
}
req = ipa_get_selinux_send(be_req, be_ctx,
op_ctx->user, op_ctx->host, selinux_ctx);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot initiate the search\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot initiate the search\n");
goto fail;
}
@@ -165,7 +165,7 @@ ipa_save_user_maps(struct sysdb_ctx *sysdb,
ret = sysdb_transaction_start(sysdb);
if (ret) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to start transaction\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to start transaction\n");
goto done;
}
in_transaction = true;
@@ -173,16 +173,16 @@ ipa_save_user_maps(struct sysdb_ctx *sysdb,
for (i = 0; i < map_count; i++) {
ret = sysdb_store_selinux_usermap(domain, maps[i]);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Failed to store user map %d. "
- "Ignoring.\n", i));
+ DEBUG(SSSDBG_OP_FAILURE, "Failed to store user map %d. "
+ "Ignoring.\n", i);
} else {
- DEBUG(SSSDBG_TRACE_FUNC, ("User map %d processed.\n", i));
+ DEBUG(SSSDBG_TRACE_FUNC, "User map %d processed.\n", i);
}
}
ret = sysdb_transaction_commit(sysdb);
if (ret) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to commit transaction!\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to commit transaction!\n");
goto done;
}
in_transaction = false;
@@ -192,7 +192,7 @@ done:
if (in_transaction) {
sret = sysdb_transaction_cancel(sysdb);
if (sret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to cancel transaction"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to cancel transaction");
}
}
return ret;
@@ -243,7 +243,7 @@ ipa_selinux_create_op_ctx(TALLOC_CTX *mem_ctx, struct sysdb_ctx *sysdb,
} else if (ret != EOK) {
goto fail;
} else if (count > 1) {
- DEBUG(SSSDBG_OP_FAILURE, ("More than one result for a BASE search!\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "More than one result for a BASE search!\n");
goto fail;
}
@@ -312,7 +312,7 @@ static void ipa_selinux_handler_done(struct tevent_req *req)
&order_array, &order_count);
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Failed to create ordered SELinux users array.\n"));
+ "Failed to create ordered SELinux users array.\n");
goto fail;
}
@@ -320,13 +320,13 @@ static void ipa_selinux_handler_done(struct tevent_req *req)
default_user);
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Failed to evaluate ordered SELinux users array.\n"));
+ "Failed to evaluate ordered SELinux users array.\n");
goto fail;
}
ret = sysdb_transaction_start(sysdb);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to start transaction\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to start transaction\n");
goto fail;
}
in_transaction = true;
@@ -334,7 +334,7 @@ static void ipa_selinux_handler_done(struct tevent_req *req)
ret = sysdb_delete_usermaps(op_ctx->domain);
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Cannot delete existing maps from sysdb\n"));
+ "Cannot delete existing maps from sysdb\n");
goto fail;
}
@@ -353,7 +353,7 @@ static void ipa_selinux_handler_done(struct tevent_req *req)
ret = sysdb_transaction_commit(sysdb);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Could not commit transaction\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Could not commit transaction\n");
goto fail;
}
in_transaction = false;
@@ -371,7 +371,7 @@ fail:
if (in_transaction) {
sret = sysdb_transaction_cancel(sysdb);
if (sret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Could not cancel transaction\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Could not cancel transaction\n");
}
}
if (ret == EAGAIN) {
@@ -518,10 +518,10 @@ ipa_selinux_process_seealso_maps(struct sysdb_attrs *user,
el->name = SYSDB_ORIG_MEMBER_USER;
DEBUG(SSSDBG_TRACE_ALL,
- ("Matching HBAC rule %s with SELinux mappings\n", hbac_dn));
+ "Matching HBAC rule %s with SELinux mappings\n", hbac_dn);
if (!sss_selinux_match(hbac_rules[i], user, host, &priority)) {
- DEBUG(SSSDBG_TRACE_ALL, ("Rule did not match\n"));
+ DEBUG(SSSDBG_TRACE_ALL, "Rule did not match\n");
continue;
}
@@ -538,9 +538,9 @@ ipa_selinux_process_seealso_maps(struct sysdb_attrs *user,
}
if (strcasecmp(hbac_dn, seealso_dn) == 0) {
- DEBUG(SSSDBG_TRACE_FUNC, ("HBAC rule [%s] matched, copying its"
+ DEBUG(SSSDBG_TRACE_FUNC, "HBAC rule [%s] matched, copying its"
"attributes to SELinux user map [%s]\n",
- hbac_dn, seealso_dn));
+ hbac_dn, seealso_dn);
/* Selinux maps priority evaluation removed --DELETE this comment before pushing*/
if (priority < top_priority) {
@@ -658,7 +658,7 @@ static errno_t choose_best_seuser(struct sysdb_attrs **usermaps,
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_new() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "talloc_new() failed\n");
return ENOMEM;
}
@@ -732,7 +732,7 @@ static errno_t write_selinux_login_file(const char *username, char *string)
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_new() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "talloc_new() failed\n");
return ENOMEM;
}
@@ -764,8 +764,8 @@ static errno_t write_selinux_login_file(const char *username, char *string)
/* continue if we can't get enforce mode or selinux is enabled */
}
- DEBUG(SSSDBG_OP_FAILURE, ("unable to create temp file [%s] "
- "for SELinux data [%d]: %s\n", tmp_path, ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "unable to create temp file [%s] "
+ "for SELinux data [%d]: %s\n", tmp_path, ret, strerror(ret));
goto done;
}
@@ -781,15 +781,15 @@ static errno_t write_selinux_login_file(const char *username, char *string)
written = sss_atomic_write_s(fd, full_string, len);
if (written == -1) {
ret = errno;
- DEBUG(SSSDBG_OP_FAILURE, ("writing to SELinux data file %s"
+ DEBUG(SSSDBG_OP_FAILURE, "writing to SELinux data file %s"
"failed [%d]: %s", tmp_path, ret,
- strerror(ret)));
+ strerror(ret));
goto done;
}
if (written != len) {
- DEBUG(SSSDBG_OP_FAILURE, ("Expected to write %zd bytes, wrote %zu",
- written, len));
+ DEBUG(SSSDBG_OP_FAILURE, "Expected to write %zd bytes, wrote %zu",
+ written, len);
ret = EIO;
goto done;
}
@@ -807,8 +807,8 @@ done:
if (fd != -1) {
close(fd);
if (unlink(tmp_path) < 0) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Could not remove file [%s]",
- tmp_path));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Could not remove file [%s]",
+ tmp_path);
}
}
@@ -833,8 +833,8 @@ static errno_t remove_selinux_login_file(const char *username)
ret = EOK;
} else {
DEBUG(SSSDBG_OP_FAILURE,
- ("Could not remove login file %s [%d]: %s\n",
- path, ret, strerror(ret)));
+ "Could not remove login file %s [%d]: %s\n",
+ path, ret, strerror(ret));
}
}
@@ -881,7 +881,7 @@ ipa_get_selinux_send(TALLOC_CTX *mem_ctx,
time_t refresh_interval;
struct ipa_options *ipa_options = selinux_ctx->id_ctx->ipa_options;
- DEBUG(SSSDBG_TRACE_FUNC, ("Retrieving SELinux user mapping\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "Retrieving SELinux user mapping\n");
req = tevent_req_create(mem_ctx, &state, struct ipa_get_selinux_state);
if (req == NULL) {
return NULL;
@@ -893,8 +893,8 @@ ipa_get_selinux_send(TALLOC_CTX *mem_ctx,
state->host = host;
offline = be_is_offline(be_ctx);
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Connection status is [%s].\n",
- offline ? "offline" : "online"));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Connection status is [%s].\n",
+ offline ? "offline" : "online");
if (!offline) {
refresh_interval = dp_opt_get_int(ipa_options->basic,
@@ -903,7 +903,7 @@ ipa_get_selinux_send(TALLOC_CTX *mem_ctx,
if (now < selinux_ctx->last_update + refresh_interval) {
/* SELinux maps were recently updated -> force offline */
DEBUG(SSSDBG_TRACE_INTERNAL,
- ("Performing cached SELinux processing\n"));
+ "Performing cached SELinux processing\n");
offline = true;
}
}
@@ -912,15 +912,15 @@ ipa_get_selinux_send(TALLOC_CTX *mem_ctx,
state->op = sdap_id_op_create(state,
selinux_ctx->id_ctx->sdap_id_ctx->conn->conn_cache);
if (!state->op) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_create failed\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_create failed\n");
ret = ENOMEM;
goto immediate;
}
subreq = sdap_id_op_connect_send(state->op, state, &ret);
if (!subreq) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("sdap_id_op_connect_send failed: "
- "%d(%s).\n", ret, strerror(ret)));
+ DEBUG(SSSDBG_CRIT_FAILURE, "sdap_id_op_connect_send failed: "
+ "%d(%s).\n", ret, strerror(ret));
talloc_zfree(state->op);
goto immediate;
}
@@ -986,7 +986,7 @@ static void ipa_get_selinux_connect_done(struct tevent_req *subreq)
hostname = dp_opt_get_string(state->selinux_ctx->id_ctx->ipa_options->basic,
IPA_HOSTNAME);
if (hostname == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Cannot determine the host name\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Cannot determine the host name\n");
goto fail;
}
@@ -1034,8 +1034,8 @@ ipa_get_selinux_maps_offline(struct tevent_req *req)
ret = sysdb_search_selinux_config(state, state->be_ctx->domain,
NULL, &defaults);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_search_selinux_config failed [%d]: %s\n",
- ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_search_selinux_config failed [%d]: %s\n",
+ ret, strerror(ret));
return ret;
}
@@ -1067,8 +1067,8 @@ ipa_get_selinux_maps_offline(struct tevent_req *req)
ret = sysdb_get_selinux_usermaps(state, state->be_ctx->domain,
attrs, &nmaps, &maps);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_get_selinux_usermaps failed [%d]: %s\n",
- ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_get_selinux_usermaps failed [%d]: %s\n",
+ ret, strerror(ret));
return ret;
}
@@ -1082,8 +1082,8 @@ ipa_get_selinux_maps_offline(struct tevent_req *req)
ret = hbac_get_cached_rules(state, state->be_ctx->domain,
&state->hbac_rule_count, &state->hbac_rules);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("hbac_get_cached_rules failed [%d]: %s\n",
- ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "hbac_get_cached_rules failed [%d]: %s\n",
+ ret, strerror(ret));
return ret;
}
@@ -1149,7 +1149,7 @@ static void ipa_get_selinux_config_done(struct tevent_req *subreq)
ret = ipa_get_config_recv(subreq, state, &state->defaults);
talloc_free(subreq);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Could not get IPA config\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Could not get IPA config\n");
goto done;
}
@@ -1207,7 +1207,7 @@ static void ipa_get_selinux_maps_done(struct tevent_req *subreq)
}
DEBUG(SSSDBG_TRACE_FUNC,
- ("Found %zu SELinux user maps\n", state->nmaps));
+ "Found %zu SELinux user maps\n", state->nmaps);
check_hbac = false;
for (i = 0; i < state->nmaps; i++) {
@@ -1230,8 +1230,8 @@ static void ipa_get_selinux_maps_done(struct tevent_req *subreq)
goto done;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("SELinux maps referenced an HBAC rule. "
- "Need to refresh HBAC rules\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "SELinux maps referenced an HBAC rule. "
+ "Need to refresh HBAC rules\n");
subreq = ipa_hbac_rule_info_send(state, false, state->be_ctx->ev,
sdap_id_op_handle(state->op),
id_ctx->sdap_id_ctx->opts,
@@ -1266,7 +1266,7 @@ static void ipa_get_selinux_hbac_done(struct tevent_req *subreq)
ret = ipa_hbac_rule_info_recv(subreq, state, &state->hbac_rule_count,
&state->hbac_rules);
DEBUG(SSSDBG_TRACE_INTERNAL,
- ("Received %zu HBAC rules\n", state->hbac_rule_count));
+ "Received %zu HBAC rules\n", state->hbac_rule_count);
talloc_free(subreq);
if (ret != EOK) {
diff --git a/src/providers/ipa/ipa_selinux_maps.c b/src/providers/ipa/ipa_selinux_maps.c
index 1a210689b..315cc7de4 100644
--- a/src/providers/ipa/ipa_selinux_maps.c
+++ b/src/providers/ipa/ipa_selinux_maps.c
@@ -127,9 +127,9 @@ ipa_selinux_get_maps_next(struct tevent_req *req,
return ENOMEM;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("Trying to fetch SELinux maps with following "
+ DEBUG(SSSDBG_TRACE_FUNC, "Trying to fetch SELinux maps with following "
"parameters: [%d][%s][%s]\n", base->scope,
- state->cur_filter, base->basedn));
+ state->cur_filter, base->basedn);
subreq = sdap_get_generic_send(state, state->ev, state->opts,
state->sh, base->basedn,
base->scope, state->cur_filter,
@@ -166,7 +166,7 @@ static void ipa_selinux_get_maps_done(struct tevent_req *subreq)
if (count > 0) {
DEBUG(SSSDBG_TRACE_FUNC,
- ("Found %zu user maps in current search base\n", count));
+ "Found %zu user maps in current search base\n", count);
total_count = count + state->map_count;
state->maps = talloc_realloc(state, state->maps, struct sysdb_attrs *, total_count);
@@ -192,7 +192,7 @@ static void ipa_selinux_get_maps_done(struct tevent_req *subreq)
}
if (state->map_count == 0) {
- DEBUG(SSSDBG_TRACE_FUNC, ("No SELinux user maps found!\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "No SELinux user maps found!\n");
ret = ENOENT;
}
diff --git a/src/providers/ipa/ipa_srv.c b/src/providers/ipa/ipa_srv.c
index 21c754076..4be5f3317 100644
--- a/src/providers/ipa/ipa_srv.c
+++ b/src/providers/ipa/ipa_srv.c
@@ -100,7 +100,7 @@ struct tevent_req *ipa_srv_plugin_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state,
struct ipa_srv_plugin_state);
if (req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("tevent_req_create() failed\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "tevent_req_create() failed\n");
return NULL;
}
@@ -133,8 +133,8 @@ struct tevent_req *ipa_srv_plugin_send(TALLOC_CTX *mem_ctx,
goto immediately;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("About to discover primary and "
- "backup servers\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "About to discover primary and "
+ "backup servers\n");
subreq = fo_discover_servers_send(state, ev, ctx->resolv_ctx, service,
protocol, primary_domain, backup_domain);
@@ -174,8 +174,8 @@ static void ipa_srv_plugin_done(struct tevent_req *subreq)
return;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("Got %zu primary and %zu backup servers\n",
- state->num_primary_servers, state->num_backup_servers));
+ DEBUG(SSSDBG_TRACE_FUNC, "Got %zu primary and %zu backup servers\n",
+ state->num_primary_servers, state->num_backup_servers);
tevent_req_done(req);
}
diff --git a/src/providers/ipa/ipa_subdomains.c b/src/providers/ipa/ipa_subdomains.c
index 88b6ba525..b9d9ceb6f 100644
--- a/src/providers/ipa/ipa_subdomains.c
+++ b/src/providers/ipa/ipa_subdomains.c
@@ -84,7 +84,7 @@ struct be_ctx *ipa_get_subdomains_be_ctx(struct be_ctx *be_ctx)
subdom_ctx = talloc_get_type(be_ctx->bet_info[BET_SUBDOMAINS].pvt_bet_data,
struct ipa_subdomains_ctx);
if (subdom_ctx == NULL) {
- DEBUG(SSSDBG_TRACE_ALL, ("Subdomains are not configured.\n"));
+ DEBUG(SSSDBG_TRACE_ALL, "Subdomains are not configured.\n");
return NULL;
}
@@ -108,7 +108,7 @@ ipa_ad_ctx_new(struct be_ctx *be_ctx,
ad_options = ad_create_default_options(id_ctx, id_ctx->server_mode->realm,
id_ctx->server_mode->hostname);
if (ad_options == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot initialize AD options\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot initialize AD options\n");
talloc_free(ad_options);
return ENOMEM;
}
@@ -117,7 +117,7 @@ ipa_ad_ctx_new(struct be_ctx *be_ctx,
ret = dp_opt_set_string(ad_options->basic, AD_DOMAIN, ad_domain);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot set AD domain\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot set AD domain\n");
talloc_free(ad_options);
return ret;
}
@@ -125,7 +125,7 @@ ipa_ad_ctx_new(struct be_ctx *be_ctx,
ret = dp_opt_set_string(ad_options->basic, AD_KRB5_REALM,
id_ctx->server_mode->realm);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot set AD realm\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot set AD realm\n");
talloc_free(ad_options);
return ret;
}
@@ -143,7 +143,7 @@ ipa_ad_ctx_new(struct be_ctx *be_ctx,
subdom->name, gc_service_name,
subdom->name, &ad_options->service);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot initialize AD failover\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot initialize AD failover\n");
talloc_free(ad_options);
return ret;
}
@@ -163,7 +163,7 @@ ipa_ad_ctx_new(struct be_ctx *be_ctx,
id_ctx->server_mode->hostname,
ad_domain);
if (srv_ctx == NULL) {
- DEBUG(SSSDBG_FATAL_FAILURE, ("Out of memory?\n"));
+ DEBUG(SSSDBG_FATAL_FAILURE, "Out of memory?\n");
return ENOMEM;
}
be_fo_set_srv_lookup_plugin(be_ctx, ad_srv_plugin_send,
@@ -173,7 +173,7 @@ ipa_ad_ctx_new(struct be_ctx *be_ctx,
ad_id_ctx->sdap_id_ctx->opts->sdom,
subdom->parent);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot initialize sdap domain\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot initialize sdap domain\n");
talloc_free(ad_options);
return ret;
}
@@ -216,7 +216,7 @@ ipa_server_trust_add(struct be_ctx *be_ctx,
ret = ipa_ad_ctx_new(be_ctx, id_ctx, subdom, &ad_id_ctx);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Cannot create ad_id_ctx for subdomain %s\n", subdom->name));
+ "Cannot create ad_id_ctx for subdomain %s\n", subdom->name);
return ret;
}
@@ -261,8 +261,8 @@ ipa_ad_subdom_refresh(struct be_ctx *be_ctx,
ret = ipa_server_trust_add(be_ctx, id_ctx, dom);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Cannot create ad_id_ctx for subdomain %s\n",
- dom->name));
+ "Cannot create ad_id_ctx for subdomain %s\n",
+ dom->name);
continue;
}
}
@@ -278,7 +278,7 @@ ipa_subdom_reinit(struct ipa_subdomains_ctx *ctx)
ret = sysdb_update_subdomains(ctx->be_ctx->domain);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_update_subdomains failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_update_subdomains failed.\n");
return ret;
}
@@ -287,7 +287,7 @@ ipa_subdom_reinit(struct ipa_subdomains_ctx *ctx)
IPA_SERVER_MODE));
if (ret != EOK) {
DEBUG(SSSDBG_MINOR_FAILURE,
- ("sss_krb5_write_mappings failed.\n"));
+ "sss_krb5_write_mappings failed.\n");
/* Just continue */
}
@@ -311,8 +311,8 @@ ipa_ad_subdom_remove(struct ipa_subdomains_ctx *ctx,
}
if (iter == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("No IPA-AD context for subdomain %s\n",
- subdom->name));
+ DEBUG(SSSDBG_CRIT_FAILURE, "No IPA-AD context for subdomain %s\n",
+ subdom->name);
return;
}
@@ -338,7 +338,7 @@ const char *get_flat_name_from_subdomain_name(struct be_ctx *be_ctx,
ctx = talloc_get_type(be_ctx->bet_info[BET_SUBDOMAINS].pvt_bet_data,
struct ipa_subdomains_ctx);
if (ctx == NULL) {
- DEBUG(SSSDBG_TRACE_ALL, ("Subdomains are not configured.\n"));
+ DEBUG(SSSDBG_TRACE_ALL, "Subdomains are not configured.\n");
return NULL;
}
@@ -362,26 +362,26 @@ static errno_t ipa_ranges_parse_results(TALLOC_CTX *mem_ctx,
range_list = talloc_array(mem_ctx, struct range_info *, count + 1);
if (range_list == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_array failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_array failed.\n");
return ENOMEM;
}
for (c = 0; c < count; c++) {
range_list[c] = talloc_zero(range_list, struct range_info);
if (range_list[c] == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_zero failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_zero failed.\n");
ret = ENOMEM;
goto done;
}
ret = sysdb_attrs_get_string(reply[c], IPA_CN, &value);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
range_list[c]->name = talloc_strdup(range_list[c], value);
if (range_list[c]->name == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -391,40 +391,40 @@ static errno_t ipa_ranges_parse_results(TALLOC_CTX *mem_ctx,
range_list[c]->trusted_dom_sid = talloc_strdup(range_list[c],
value);
if (range_list[c]->trusted_dom_sid == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
} else if (ret != ENOENT) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
ret = sysdb_attrs_get_uint32_t(reply[c], IPA_BASE_ID,
&range_list[c]->base_id);
if (ret != EOK && ret != ENOENT) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
ret = sysdb_attrs_get_uint32_t(reply[c], IPA_ID_RANGE_SIZE,
&range_list[c]->id_range_size);
if (ret != EOK && ret != ENOENT) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
ret = sysdb_attrs_get_uint32_t(reply[c], IPA_BASE_RID,
&range_list[c]->base_rid);
if (ret != EOK && ret != ENOENT) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
ret = sysdb_attrs_get_uint32_t(reply[c], IPA_SECONDARY_BASE_RID,
&range_list[c]->secondary_base_rid);
if (ret != EOK && ret != ENOENT) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
@@ -432,7 +432,7 @@ static errno_t ipa_ranges_parse_results(TALLOC_CTX *mem_ctx,
if (ret == EOK) {
range_list[c]->range_type = talloc_strdup(range_list[c], value);
if (range_list[c]->range_type == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -447,11 +447,11 @@ static errno_t ipa_ranges_parse_results(TALLOC_CTX *mem_ctx,
IPA_RANGE_AD_TRUST);
}
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
if (range_list[c]->range_type == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -478,7 +478,7 @@ static errno_t ipa_subdom_enumerates(struct sss_domain_info *parent,
ret = sysdb_attrs_get_string(attrs, IPA_CN, &name);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
return ret;
}
@@ -499,21 +499,21 @@ static errno_t ipa_subdom_get_forest(TALLOC_CTX *mem_ctx,
ret = sysdb_attrs_get_string(attrs, SYSDB_ORIG_DN, &orig_dn);
if (ret) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
- DEBUG(SSSDBG_TRACE_ALL, ("Checking if we need the forest name for [%s].\n",
- orig_dn));
+ DEBUG(SSSDBG_TRACE_ALL, "Checking if we need the forest name for [%s].\n",
+ orig_dn);
dn = ldb_dn_new(mem_ctx, ldb_ctx, orig_dn);
if (dn == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("ldb_dn_new failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ldb_dn_new failed.\n");
goto done;
}
if (!ldb_dn_validate(dn)) {
- DEBUG(SSSDBG_OP_FAILURE, ("Original DN [%s] is not a valid DN.\n",
- orig_dn));
+ DEBUG(SSSDBG_OP_FAILURE, "Original DN [%s] is not a valid DN.\n",
+ orig_dn);
ret = EINVAL;
goto done;
}
@@ -533,7 +533,7 @@ static errno_t ipa_subdom_get_forest(TALLOC_CTX *mem_ctx,
val = ldb_dn_get_component_val(dn, 3);
if (strncasecmp("trusts", (const char *) val->data, val->length) != 0) {
DEBUG(SSSDBG_TRACE_FUNC,
- ("4th component is not 'trust', nothing to do.\n"));
+ "4th component is not 'trust', nothing to do.\n");
ret = EOK;
goto done;
}
@@ -541,7 +541,7 @@ static errno_t ipa_subdom_get_forest(TALLOC_CTX *mem_ctx,
val = ldb_dn_get_component_val(dn, 2);
if (strncasecmp("ad", (const char *) val->data, val->length) != 0) {
DEBUG(SSSDBG_TRACE_FUNC,
- ("3rd component is not 'ad', nothing to do.\n"));
+ "3rd component is not 'ad', nothing to do.\n");
ret = EOK;
goto done;
}
@@ -549,7 +549,7 @@ static errno_t ipa_subdom_get_forest(TALLOC_CTX *mem_ctx,
val = ldb_dn_get_component_val(dn, 1);
forest = talloc_strndup(mem_ctx, (const char *) val->data, val->length);
if (forest == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strndup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strndup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -585,7 +585,7 @@ static errno_t ipa_subdom_store(struct sss_domain_info *parent,
ret = sysdb_attrs_get_string(attrs, IPA_CN, &name);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
@@ -597,13 +597,13 @@ static errno_t ipa_subdom_store(struct sss_domain_info *parent,
ret = sysdb_attrs_get_string(attrs, IPA_FLATNAME, &flat);
if (ret) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
ret = sysdb_attrs_get_string(attrs, IPA_TRUSTED_DOMAIN_SID, &id);
if (ret) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
@@ -618,7 +618,7 @@ static errno_t ipa_subdom_store(struct sss_domain_info *parent,
ret = sysdb_subdomain_store(parent->sysdb, name, realm, flat,
id, mpg, enumerate, forest);
if (ret) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_subdomain_store failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_subdomain_store failed.\n");
goto done;
}
@@ -653,7 +653,7 @@ static errno_t ipa_subdomains_refresh(struct ipa_subdomains_ctx *ctx,
}
ret = sysdb_attrs_get_string(reply[c], IPA_CN, &value);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_get_string failed.\n");
goto done;
}
if (strcmp(value, dom->name) == 0) {
@@ -684,8 +684,8 @@ static errno_t ipa_subdomains_refresh(struct ipa_subdomains_ctx *ctx,
/* Nothing we can do about the errorr. Let's at least try
* to reuse the existing domain
*/
- DEBUG(SSSDBG_MINOR_FAILURE, ("Failed to parse subdom data, "
- "will try to use cached subdomain\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Failed to parse subdom data, "
+ "will try to use cached subdomain\n");
}
handled[c] = true;
h++;
@@ -716,8 +716,8 @@ static errno_t ipa_subdomains_refresh(struct ipa_subdomains_ctx *ctx,
ret = ipa_subdom_store(parent, ctx->sdap_id_ctx->opts->idmap_ctx,
reply[c], enumerate);
if (ret) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Failed to parse subdom data, "
- "will try to use cached subdomain\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Failed to parse subdom data, "
+ "will try to use cached subdomain\n");
}
}
@@ -797,15 +797,15 @@ static void ipa_subdomains_retrieve(struct ipa_subdomains_ctx *ctx, struct be_re
req_ctx->sdap_op = sdap_id_op_create(req_ctx,
ctx->sdap_id_ctx->conn->conn_cache);
if (req_ctx->sdap_op == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_create failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_create failed.\n");
ret = ENOMEM;
goto done;
}
req = sdap_id_op_connect_send(req_ctx->sdap_op, req_ctx, &ret);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_connect_send failed: %d(%s).\n",
- ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_connect_send failed: %d(%s).\n",
+ ret, strerror(ret));
goto done;
}
@@ -834,12 +834,12 @@ static void ipa_subdomains_get_conn_done(struct tevent_req *req)
if (ret) {
if (dp_error == DP_ERR_OFFLINE) {
DEBUG(SSSDBG_MINOR_FAILURE,
- ("No IPA server is available, cannot get the "
- "subdomain list while offline\n"));
+ "No IPA server is available, cannot get the "
+ "subdomain list while offline\n");
} else {
DEBUG(SSSDBG_OP_FAILURE,
- ("Failed to connect to IPA server: [%d](%s)\n",
- ret, strerror(ret)));
+ "Failed to connect to IPA server: [%d](%s)\n",
+ ret, strerror(ret));
}
goto fail;
@@ -891,7 +891,7 @@ ipa_subdomains_handler_get(struct ipa_subdomains_req_ctx *ctx,
SDAP_SEARCH_TIMEOUT), false);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_get_generic_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_get_generic_send failed.\n");
return ENOMEM;
}
@@ -916,7 +916,7 @@ static void ipa_subdomains_handler_done(struct tevent_req *req)
ret = sdap_get_generic_recv(req, ctx, &reply_count, &reply);
talloc_zfree(req);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_get_generic_send request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_get_generic_send request failed.\n");
goto done;
}
@@ -943,21 +943,21 @@ static void ipa_subdomains_handler_done(struct tevent_req *req)
ret = ipa_subdomains_refresh(ctx->sd_ctx, ctx->reply_count, ctx->reply,
&refresh_has_changes);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Failed to refresh subdomains.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Failed to refresh subdomains.\n");
goto done;
}
if (refresh_has_changes) {
ret = ipa_subdom_reinit(ctx->sd_ctx);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Could not reinitialize subdomains\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Could not reinitialize subdomains\n");
goto done;
}
ret = ipa_ad_subdom_refresh(ctx->sd_ctx->be_ctx, ctx->sd_ctx->id_ctx,
domain);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_ad_subdom_refresh failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_ad_subdom_refresh failed.\n");
goto done;
}
}
@@ -1009,21 +1009,21 @@ static void ipa_subdomains_handler_ranges_done(struct tevent_req *req)
ret = sdap_get_generic_recv(req, ctx, &reply_count, &reply);
talloc_zfree(req);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_get_generic_send request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_get_generic_send request failed.\n");
goto done;
}
ret = ipa_ranges_parse_results(ctx, reply_count, reply, &range_list);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("ipa_ranges_parse_results request failed.\n"));
+ "ipa_ranges_parse_results request failed.\n");
goto done;
}
ret = sysdb_update_ranges(sysdb, range_list);
talloc_free(range_list);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_update_ranges failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_update_ranges failed.\n");
goto done;
}
@@ -1036,7 +1036,7 @@ static void ipa_subdomains_handler_ranges_done(struct tevent_req *req)
goto done;
}
- DEBUG(SSSDBG_OP_FAILURE, ("No search base for ranges available.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "No search base for ranges available.\n");
ret = EINVAL;
done:
@@ -1059,7 +1059,7 @@ static void ipa_subdomains_handler_master_done(struct tevent_req *req)
ret = sdap_get_generic_recv(req, ctx, &reply_count, &reply);
talloc_zfree(req);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_get_generic_send request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_get_generic_send request failed.\n");
goto done;
}
@@ -1091,7 +1091,7 @@ static void ipa_subdomains_handler_master_done(struct tevent_req *req)
/* Right now we know there has been an error
* and we don't have the master domain record
*/
- DEBUG(SSSDBG_CRIT_FAILURE, ("Master domain record not found!\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Master domain record not found!\n");
if (!ctx->sd_ctx->configured_explicit) {
ctx->sd_ctx->disabled_until = time(NULL) +
@@ -1131,11 +1131,11 @@ static void ipa_subdom_reset_timeouts_cb(void *pvt)
ctx = talloc_get_type(pvt, struct ipa_subdomains_ctx);
if (ctx == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Bad private pointer\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Bad private pointer\n");
return;
}
- DEBUG(SSSDBG_TRACE_ALL, ("Resetting last_refreshed and disabled_until.\n"));
+ DEBUG(SSSDBG_TRACE_ALL, "Resetting last_refreshed and disabled_until.\n");
ctx->last_refreshed = 0;
ctx->disabled_until = 0;
}
@@ -1149,7 +1149,7 @@ static void ipa_subdom_online_cb(void *pvt)
ctx = talloc_get_type(pvt, struct ipa_subdomains_ctx);
if (!ctx) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Bad private pointer\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Bad private pointer\n");
return;
}
@@ -1160,7 +1160,7 @@ static void ipa_subdom_online_cb(void *pvt)
be_req = be_req_create(ctx, NULL, ctx->be_ctx,
ipa_subdom_be_req_callback, NULL);
if (be_req == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("be_req_create() failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "be_req_create() failed.\n");
return;
}
@@ -1170,7 +1170,7 @@ static void ipa_subdom_online_cb(void *pvt)
ctx->timer_event = tevent_add_timer(ctx->be_ctx->ev, ctx, tv,
ipa_subdom_timer_refresh, ctx);
if (!ctx->timer_event) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Failed to add subdom timer event\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom timer event\n");
}
}
@@ -1194,7 +1194,7 @@ static errno_t get_config_status(struct be_ctx *be_ctx,
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_new failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_new failed.\n");
return ENOMEM;
}
@@ -1202,7 +1202,7 @@ static errno_t get_config_status(struct be_ctx *be_ctx,
CONFDB_DOMAIN_SUBDOMAINS_PROVIDER, NULL,
&tmp_str);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("confdb_get_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "confdb_get_string failed.\n");
goto done;
}
@@ -1212,8 +1212,8 @@ static errno_t get_config_status(struct be_ctx *be_ctx,
*configured_explicit = true;
}
- DEBUG(SSSDBG_TRACE_ALL, ("IPA subdomain provider is configured %s.\n",
- *configured_explicit ? "explicit" : "implicit"));
+ DEBUG(SSSDBG_TRACE_ALL, "IPA subdomain provider is configured %s.\n",
+ *configured_explicit ? "explicit" : "implicit");
ret = EOK;
@@ -1239,7 +1239,7 @@ void ipa_subdomains_handler(struct be_req *be_req)
now = time(NULL);
if (ctx->disabled_until > now) {
- DEBUG(SSSDBG_TRACE_ALL, ("Subdomain provider disabled.\n"));
+ DEBUG(SSSDBG_TRACE_ALL, "Subdomain provider disabled.\n");
be_req_terminate(be_req, DP_ERR_OK, EOK, NULL);
return;
}
@@ -1268,13 +1268,13 @@ int ipa_subdom_init(struct be_ctx *be_ctx,
ret = get_config_status(be_ctx, &configured_explicit);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("get_config_status failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "get_config_status failed.\n");
return ret;
}
ctx = talloc_zero(id_ctx, struct ipa_subdomains_ctx);
if (ctx == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_zero failed.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "talloc_zero failed.\n");
return ENOMEM;
}
@@ -1294,23 +1294,23 @@ int ipa_subdom_init(struct be_ctx *be_ctx,
NULL);
if (ret != EOK) {
DEBUG(SSSDBG_MINOR_FAILURE,
- ("Failed to add subdom reset timeouts callback"));
+ "Failed to add subdom reset timeouts callback");
}
ret = be_add_online_cb(ctx, be_ctx, ipa_subdom_online_cb, ctx, NULL);
if (ret != EOK) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Failed to add subdom online callback"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom online callback");
}
ret = be_add_offline_cb(ctx, be_ctx, ipa_subdom_offline_cb, ctx, NULL);
if (ret != EOK) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Failed to add subdom offline callback"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Failed to add subdom offline callback");
}
ret = ipa_subdom_reinit(ctx);
if (ret != EOK) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Could not load the list of subdomains. "
- "Users from trusted domains might not be resolved correctly\n"));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Could not load the list of subdomains. "
+ "Users from trusted domains might not be resolved correctly\n");
}
return EOK;
@@ -1336,9 +1336,9 @@ int ipa_ad_subdom_init(struct be_ctx *be_ctx,
CONFDB_DEFAULT_FULL_NAME_FORMAT) != 0)
&& (strcmp(be_ctx->domain->names->fq_fmt,
CONFDB_DEFAULT_FULL_NAME_FORMAT_INTERNAL) != 0)) {
- DEBUG(SSSDBG_FATAL_FAILURE, ("%s is set to a non-default value [%s] " \
+ DEBUG(SSSDBG_FATAL_FAILURE, "%s is set to a non-default value [%s] " \
"lookups of subdomain users will likely fail!\n",
- CONFDB_FULL_NAME_FORMAT, be_ctx->domain->names->fq_fmt));
+ CONFDB_FULL_NAME_FORMAT, be_ctx->domain->names->fq_fmt);
sss_log(SSS_LOG_ERR, "%s is set to a non-default value [%s] " \
"lookups of subdomain users will likely fail!\n",
CONFDB_FULL_NAME_FORMAT, be_ctx->domain->names->fq_fmt);
@@ -1347,13 +1347,13 @@ int ipa_ad_subdom_init(struct be_ctx *be_ctx,
realm = dp_opt_get_string(id_ctx->ipa_options->basic, IPA_KRB5_REALM);
if (realm == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("No Kerberos realm for IPA?\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "No Kerberos realm for IPA?\n");
return EINVAL;
}
hostname = dp_opt_get_string(id_ctx->ipa_options->basic, IPA_HOSTNAME);
if (hostname == NULL) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("No host name for IPA?\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "No host name for IPA?\n");
return EINVAL;
}
@@ -1368,7 +1368,7 @@ int ipa_ad_subdom_init(struct be_ctx *be_ctx,
ret = ipa_ad_subdom_refresh(be_ctx, id_ctx, be_ctx->domain);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_ad_subdom_refresh failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_ad_subdom_refresh failed.\n");
return ret;
}
diff --git a/src/providers/ipa/ipa_subdomains_ext_groups.c b/src/providers/ipa/ipa_subdomains_ext_groups.c
index 7a65c1181..6feca44de 100644
--- a/src/providers/ipa/ipa_subdomains_ext_groups.c
+++ b/src/providers/ipa/ipa_subdomains_ext_groups.c
@@ -58,14 +58,14 @@ static errno_t process_ext_groups(TALLOC_CTX *mem_ctx, size_t reply_count,
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_new failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_new failed.\n");
ret = ENOMEM;
goto done;
}
ret = sss_hash_create(mem_ctx, reply_count, &ext_group_hash);
if (ret != HASH_SUCCESS) {
- DEBUG(SSSDBG_OP_FAILURE, ("sss_hash_create failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sss_hash_create failed.\n");
goto done;
}
@@ -83,7 +83,7 @@ static errno_t process_ext_groups(TALLOC_CTX *mem_ctx, size_t reply_count,
}
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("sysdb_attrs_get_string_array failed.\n"));
+ "sysdb_attrs_get_string_array failed.\n");
goto done;
}
@@ -95,7 +95,7 @@ static errno_t process_ext_groups(TALLOC_CTX *mem_ctx, size_t reply_count,
}
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("sysdb_attrs_get_string_array failed.\n"));
+ "sysdb_attrs_get_string_array failed.\n");
goto done;
}
@@ -105,7 +105,7 @@ static errno_t process_ext_groups(TALLOC_CTX *mem_ctx, size_t reply_count,
ret = hash_lookup(ext_group_hash, &key, &value);
if (ret == HASH_SUCCESS) {
if (value.type != HASH_VALUE_PTR) {
- DEBUG(SSSDBG_OP_FAILURE, ("Unexpected value type.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Unexpected value type.\n");
ret = EINVAL;
goto done;
}
@@ -113,18 +113,18 @@ static errno_t process_ext_groups(TALLOC_CTX *mem_ctx, size_t reply_count,
for (m = 0; mof[m] != NULL; m++) {
/* hash_enter does not modify m_key.str. */
m_key.str = discard_const(mof[m]);
- DEBUG(SSSDBG_TRACE_ALL, ("Adding group [%s] to SID [%s].\n",
- m_key.str, key.str));
+ DEBUG(SSSDBG_TRACE_ALL, "Adding group [%s] to SID [%s].\n",
+ m_key.str, key.str);
ret = hash_enter(value.ptr, &m_key, &m_value);
if (ret != HASH_SUCCESS) {
- DEBUG(SSSDBG_OP_FAILURE, ("hash_enter failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "hash_enter failed.\n");
goto done;
}
}
} else if (ret == HASH_ERROR_KEY_NOT_FOUND) {
ret = sss_hash_create(ext_group_hash, 5, &m_hash);
if (ret != HASH_SUCCESS) {
- DEBUG(SSSDBG_OP_FAILURE, ("sss_hash_create failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sss_hash_create failed.\n");
goto done;
}
@@ -132,26 +132,26 @@ static errno_t process_ext_groups(TALLOC_CTX *mem_ctx, size_t reply_count,
value.ptr = m_hash;
DEBUG(SSSDBG_TRACE_ALL,
- ("Adding SID [%s] to external group hash.\n", key.str));
+ "Adding SID [%s] to external group hash.\n", key.str);
ret = hash_enter(ext_group_hash, &key, &value);
if (ret != HASH_SUCCESS) {
- DEBUG(SSSDBG_OP_FAILURE, ("hash_enter failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "hash_enter failed.\n");
goto done;
}
for (m = 0; mof[m] != NULL; m++) {
/* hash_enter does not modify m_key.str. */
m_key.str = discard_const(mof[m]);
- DEBUG(SSSDBG_TRACE_ALL, ("Adding group [%s] to SID [%s].\n",
- m_key.str, key.str));
+ DEBUG(SSSDBG_TRACE_ALL, "Adding group [%s] to SID [%s].\n",
+ m_key.str, key.str);
ret = hash_enter(m_hash, &m_key, &m_value);
if (ret != HASH_SUCCESS) {
- DEBUG(SSSDBG_OP_FAILURE, ("hash_enter failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "hash_enter failed.\n");
goto done;
}
}
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("hash_lookup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "hash_lookup failed.\n");
goto done;
}
}
@@ -198,20 +198,20 @@ static errno_t find_ipa_ext_memberships(TALLOC_CTX *mem_ctx,
ret = sysdb_initgroups(tmp_ctx, user_dom, user_name, &result);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_initgroups failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_initgroups failed.\n");
goto done;
}
if (result->count == 0) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("User [%s] not found in cache.\n",
- user_name));
+ DEBUG(SSSDBG_MINOR_FAILURE, "User [%s] not found in cache.\n",
+ user_name);
ret = EOK;
goto done;
}
ret = sss_hash_create(tmp_ctx, 10, &group_hash);
if (ret != HASH_SUCCESS) {
- DEBUG(SSSDBG_OP_FAILURE, ("sss_hash_create failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sss_hash_create failed.\n");
goto done;
}
@@ -224,20 +224,20 @@ static errno_t find_ipa_ext_memberships(TALLOC_CTX *mem_ctx,
sid = ldb_msg_find_attr_as_string(result->msgs[c], SYSDB_SID_STR,
NULL);
if (sid == NULL) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Group [%s] does not have a SID.\n",
- ldb_dn_get_linearized(result->msgs[c]->dn)));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Group [%s] does not have a SID.\n",
+ ldb_dn_get_linearized(result->msgs[c]->dn));
continue;
}
key.str = discard_const(sid);
ret = hash_lookup(ext_group_hash, &key, &value);
if (ret == HASH_ERROR_KEY_NOT_FOUND) {
- DEBUG(SSSDBG_TRACE_ALL, ("SID [%s] not found in ext group hash.\n",
- sid));
+ DEBUG(SSSDBG_TRACE_ALL, "SID [%s] not found in ext group hash.\n",
+ sid);
} else if (ret == HASH_SUCCESS) {
iter = new_hash_iter_context(value.ptr);
if (iter == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("new_hash_iter_context failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "new_hash_iter_context failed.\n");
ret = EINVAL;
goto done;
}
@@ -245,35 +245,35 @@ static errno_t find_ipa_ext_memberships(TALLOC_CTX *mem_ctx,
while ((entry = iter->next(iter)) != NULL) {
ret = hash_enter(group_hash, &entry->key, &entry->value);
if (ret != HASH_SUCCESS) {
- DEBUG(SSSDBG_OP_FAILURE, ("Failed to add group [%s].\n",
- entry->key.str));
+ DEBUG(SSSDBG_OP_FAILURE, "Failed to add group [%s].\n",
+ entry->key.str);
}
}
talloc_free(iter);
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("hash_lookup failed for SID [%s].\n",
- sid));
+ DEBUG(SSSDBG_OP_FAILURE, "hash_lookup failed for SID [%s].\n",
+ sid);
}
}
g_count = hash_count(group_hash);
if (g_count == 0) {
- DEBUG(SSSDBG_TRACE_FUNC, ("No external groupmemberships found.\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "No external groupmemberships found.\n");
ret = EOK;
goto done;
}
groups = talloc_zero_array(mem_ctx, char *, g_count + 1);
if (groups == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_array failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_array failed.\n");
ret = ENOMEM;
goto done;
}
iter = new_hash_iter_context(group_hash);
if (iter == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("new_hash_iter_context failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "new_hash_iter_context failed.\n");
ret = EINVAL;
goto done;
}
@@ -282,7 +282,7 @@ static errno_t find_ipa_ext_memberships(TALLOC_CTX *mem_ctx,
while ((entry = iter->next(iter)) != NULL) {
groups[c] = talloc_strdup(groups, entry->key.str);
if (groups[c] == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -291,7 +291,7 @@ static errno_t find_ipa_ext_memberships(TALLOC_CTX *mem_ctx,
user_dn = ldb_dn_copy(mem_ctx, result->msgs[0]->dn);
if (user_dn == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("ldb_dn_copy failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ldb_dn_copy failed.\n");
ret = ENOMEM;
goto done;
}
@@ -324,7 +324,7 @@ static errno_t add_ad_user_to_cached_groups(struct ldb_dn *user_dn,
tmp_ctx = talloc_new(NULL);
if (tmp_ctx == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_new failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_new failed.\n");
return ENOMEM;
}
@@ -335,7 +335,7 @@ static errno_t add_ad_user_to_cached_groups(struct ldb_dn *user_dn,
subfilter = talloc_asprintf(tmp_ctx, "(%s=%s)", SYSDB_ORIG_DN, groups[c]);
if (subfilter == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_asprintf failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_asprintf failed.\n");
ret = ENOMEM;
goto done;
}
@@ -344,12 +344,12 @@ static errno_t add_ad_user_to_cached_groups(struct ldb_dn *user_dn,
&msgs_count, &msgs);
if (ret != EOK) {
if (ret == ENOENT) {
- DEBUG(SSSDBG_TRACE_ALL, ("Group [%s] not in the cache.\n",
- groups[c]));
+ DEBUG(SSSDBG_TRACE_ALL, "Group [%s] not in the cache.\n",
+ groups[c]);
*missing_groups = true;
continue;
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_search_entry failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_search_entry failed.\n");
goto done;
}
}
@@ -360,13 +360,13 @@ static errno_t add_ad_user_to_cached_groups(struct ldb_dn *user_dn,
ret = sysdb_mod_group_member(group_dom, user_dn, msgs[0]->dn,
LDB_FLAG_MOD_ADD);
if (ret != EOK && ret != EEXIST) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_mod_group_member failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_mod_group_member failed.\n");
goto done;
}
user_attrs = sysdb_new_attrs(tmp_ctx);
if (user_attrs == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_new_attrs failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_new_attrs failed.\n");
ret = ENOMEM;
goto done;
}
@@ -374,14 +374,14 @@ static errno_t add_ad_user_to_cached_groups(struct ldb_dn *user_dn,
ret = sysdb_attrs_add_string(user_attrs, SYSDB_ORIG_MEMBEROF,
groups[c]);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_add_string failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_attrs_add_string failed.\n");
goto done;
}
ret = sysdb_set_entry_attr(user_dom->sysdb, user_dn, user_attrs,
LDB_FLAG_MOD_ADD);
if (ret != EOK && ret != EEXIST) {
- DEBUG(SSSDBG_OP_FAILURE, ("sysdb_set_entry_attr failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sysdb_set_entry_attr failed.\n");
goto done;
}
@@ -441,7 +441,7 @@ struct tevent_req *ipa_get_ad_memberships_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct get_ad_membership_state);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("tevent_req_create failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "tevent_req_create failed.\n");
return NULL;
}
@@ -454,14 +454,14 @@ struct tevent_req *ipa_get_ad_memberships_send(TALLOC_CTX *mem_ctx,
if ((ar->entry_type & BE_REQ_TYPE_MASK) != BE_REQ_INITGROUPS
|| ar->filter_type != BE_FILTER_NAME) {
- DEBUG(SSSDBG_OP_FAILURE, ("Unsupported request type.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Unsupported request type.\n");
ret = EINVAL;
goto done;
}
state->user_name = talloc_strdup(state, ar->filter_value);
if (state->user_name == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_Strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_Strdup failed.\n");
ret = ENOMEM;
goto done;
}
@@ -469,7 +469,7 @@ struct tevent_req *ipa_get_ad_memberships_send(TALLOC_CTX *mem_ctx,
state->sdap_op = sdap_id_op_create(state,
state->sdap_id_ctx->conn->conn_cache);
if (state->sdap_op == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_create failed\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_create failed\n");
ret = ENOMEM;
goto done;
}
@@ -479,21 +479,21 @@ struct tevent_req *ipa_get_ad_memberships_send(TALLOC_CTX *mem_ctx,
server_mode->ext_groups = talloc_zero(server_mode,
struct ipa_ext_groups);
if (server_mode->ext_groups == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_zero failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_zero failed.\n");
ret = ENOMEM;
goto done;
}
}
if (server_mode->ext_groups->next_update > time(NULL)) {
- DEBUG(SSSDBG_TRACE_FUNC, ("External group information still valid.\n"));
+ DEBUG(SSSDBG_TRACE_FUNC, "External group information still valid.\n");
ret = ipa_add_ext_groups_step(req);
if (ret == EOK) {
goto done;
} else if (ret == EAGAIN) {
return req;
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_add_ext_groups_step failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_add_ext_groups_step failed.\n");
goto done;
}
@@ -501,8 +501,8 @@ struct tevent_req *ipa_get_ad_memberships_send(TALLOC_CTX *mem_ctx,
subreq = sdap_id_op_connect_send(state->sdap_op, state, &ret);
if (subreq == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_connect_send failed: %d(%s).\n",
- ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_connect_send failed: %d(%s).\n",
+ ret, strerror(ret));
goto done;
}
@@ -537,11 +537,11 @@ static void ipa_get_ad_memberships_connect_done(struct tevent_req *subreq)
if (ret != EOK) {
if (state->dp_error == DP_ERR_OFFLINE) {
DEBUG(SSSDBG_MINOR_FAILURE,
- ("No IPA server is available, going offline\n"));
+ "No IPA server is available, going offline\n");
} else {
DEBUG(SSSDBG_OP_FAILURE,
- ("Failed to connect to IPA server: [%d](%s)\n",
- ret, strerror(ret)));
+ "Failed to connect to IPA server: [%d](%s)\n",
+ ret, strerror(ret));
}
goto fail;
@@ -550,7 +550,7 @@ static void ipa_get_ad_memberships_connect_done(struct tevent_req *subreq)
ret = domain_to_basedn(state, state->domain, &basedn);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("domain_to_basedn failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "domain_to_basedn failed.\n");
goto fail;
}
@@ -562,7 +562,7 @@ static void ipa_get_ad_memberships_connect_done(struct tevent_req *subreq)
SDAP_ENUM_SEARCH_TIMEOUT),
false);
if (subreq == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_get_generic_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_get_generic_send failed.\n");
ret = ENOMEM;
goto fail;
}
@@ -588,18 +588,18 @@ static void ipa_get_ext_groups_done(struct tevent_req *subreq)
&state->reply_count, &state->reply);
talloc_zfree(subreq);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_get_ext_groups request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_get_ext_groups request failed.\n");
tevent_req_error(req, ret);
return;
}
- DEBUG(SSSDBG_TRACE_FUNC, ("[%zu] external groups found.\n",
- state->reply_count));
+ DEBUG(SSSDBG_TRACE_FUNC, "[%zu] external groups found.\n",
+ state->reply_count);
ret = process_ext_groups(state->server_mode->ext_groups,
state->reply_count, state->reply, &ext_group_hash);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("process_ext_groups failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "process_ext_groups failed.\n");
goto fail;
}
@@ -614,7 +614,7 @@ static void ipa_get_ext_groups_done(struct tevent_req *subreq)
} else if (ret == EAGAIN) {
return;
} else {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_add_ext_groups_step failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_add_ext_groups_step failed.\n");
goto fail;
}
@@ -636,12 +636,12 @@ static errno_t ipa_add_ext_groups_step(struct tevent_req *req)
state->server_mode->ext_groups->ext_groups,
&user_dn, &groups);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("find_ipa_ext_memberships failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "find_ipa_ext_memberships failed.\n");
goto fail;
}
if (groups == NULL) {
- DEBUG(SSSDBG_TRACE_ALL, ("No external groups memberships found.\n"));
+ DEBUG(SSSDBG_TRACE_ALL, "No external groups memberships found.\n");
state->dp_error = DP_ERR_OK;
return EOK;
}
@@ -650,7 +650,7 @@ static errno_t ipa_add_ext_groups_step(struct tevent_req *req)
user_dn, state->user_dom, groups,
state->sdap_id_ctx->be->domain);
if (subreq == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_add_ad_memberships_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_add_ad_memberships_send failed.\n");
ret = ENOMEM;
goto fail;
}
@@ -674,7 +674,7 @@ static void ipa_add_ad_memberships_done(struct tevent_req *subreq)
ret = ipa_add_ad_memberships_recv(subreq, &state->dp_error);
talloc_zfree(subreq);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("ipa_add_ad_memberships request failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ipa_add_ad_memberships request failed.\n");
tevent_req_error(req, ret);
return;
}
@@ -730,7 +730,7 @@ static struct tevent_req *ipa_add_ad_memberships_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct add_ad_membership_state);
if (req == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("tevent_req_create failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "tevent_req_create failed.\n");
return NULL;
}
@@ -751,12 +751,12 @@ static struct tevent_req *ipa_add_ad_memberships_send(TALLOC_CTX *mem_ctx,
ret = add_ad_user_to_cached_groups(user_dn, user_dom, group_dom, groups,
&missing_groups);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("add_ad_user_to_cached_groups failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "add_ad_user_to_cached_groups failed.\n");
goto done;
}
if (!missing_groups) {
- DEBUG(SSSDBG_TRACE_ALL, ("All groups found in cache.\n"));
+ DEBUG(SSSDBG_TRACE_ALL, "All groups found in cache.\n");
ret = EOK;
goto done;
}
@@ -764,15 +764,15 @@ static struct tevent_req *ipa_add_ad_memberships_send(TALLOC_CTX *mem_ctx,
state->sdap_op = sdap_id_op_create(state,
state->sdap_id_ctx->conn->conn_cache);
if (state->sdap_op == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_create failed\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_create failed\n");
ret = ENOMEM;
goto done;
}
subreq = sdap_id_op_connect_send(state->sdap_op, state, &ret);
if (subreq == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_connect_send failed: %d(%s).\n",
- ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_connect_send failed: %d(%s).\n",
+ ret, strerror(ret));
goto done;
}
@@ -806,11 +806,11 @@ static void ipa_add_ad_memberships_connect_done(struct tevent_req *subreq)
if (ret != EOK) {
if (state->dp_error == DP_ERR_OFFLINE) {
DEBUG(SSSDBG_MINOR_FAILURE,
- ("No IPA server is available, going offline\n"));
+ "No IPA server is available, going offline\n");
} else {
DEBUG(SSSDBG_OP_FAILURE,
- ("Failed to connect to IPA server: [%d](%s)\n",
- ret, strerror(ret)));
+ "Failed to connect to IPA server: [%d](%s)\n",
+ ret, strerror(ret));
}
tevent_req_error(req, ret);
@@ -841,14 +841,14 @@ static void ipa_add_ad_memberships_get_next(struct tevent_req *req)
state->group_dom, state->groups,
&missing_groups);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("add_ad_user_to_cached_groups failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "add_ad_user_to_cached_groups failed.\n");
goto fail;
}
if (missing_groups) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("There are unresolved external group " \
+ DEBUG(SSSDBG_CRIT_FAILURE, "There are unresolved external group " \
"memberships even after all groups have " \
- "been looked up on the LDAP server."));
+ "been looked up on the LDAP server.");
}
tevent_req_done(req);
return;
@@ -857,7 +857,7 @@ static void ipa_add_ad_memberships_get_next(struct tevent_req *req)
group_dn = ldb_dn_new(state, sysdb_ctx_get_ldb(state->group_dom->sysdb),
state->groups[state->iter]);
if (group_dn == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("ldb_dn_new failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "ldb_dn_new failed.\n");
ret = ENOMEM;
goto fail;
}
@@ -873,7 +873,7 @@ static void ipa_add_ad_memberships_get_next(struct tevent_req *req)
BE_FILTER_NAME, BE_ATTR_CORE,
false);
if (subreq == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("groups_get_send failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "groups_get_send failed.\n");
ret = ENOMEM;
goto fail;
}
@@ -896,8 +896,8 @@ static void ipa_add_ad_memberships_get_group_done(struct tevent_req *subreq)
ret = groups_get_recv(subreq, &state->dp_error, NULL);
talloc_zfree(subreq);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Failed to read group [%s] from LDAP [%d](%s)\n",
- state->groups[state->iter], ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "Failed to read group [%s] from LDAP [%d](%s)\n",
+ state->groups[state->iter], ret, strerror(ret));
tevent_req_error(req, ret);
return;
diff --git a/src/providers/ipa/ipa_subdomains_id.c b/src/providers/ipa/ipa_subdomains_id.c
index 91e0f2927..a09f2ac6c 100644
--- a/src/providers/ipa/ipa_subdomains_id.c
+++ b/src/providers/ipa/ipa_subdomains_id.c
@@ -70,7 +70,7 @@ struct tevent_req *ipa_get_subdom_acct_send(TALLOC_CTX *memctx,
state->op = sdap_id_op_create(state, state->ctx->conn->conn_cache);
if (!state->op) {
- DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_create failed\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "sdap_id_op_create failed\n");
ret = ENOMEM;
goto fail;
}
@@ -78,7 +78,7 @@ struct tevent_req *ipa_get_subdom_acct_send(TALLOC_CTX *memctx,
state->domain = find_subdomain_by_name(state->ctx->be->domain,
ar->domain, true);
if (state->domain == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("find_subdomain_by_name failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "find_subdomain_by_name failed.\n");
ret = ENOMEM;
goto fail;
}
@@ -97,14 +97,14 @@ struct tevent_req *ipa_get_subdom_acct_send(TALLOC_CTX *memctx,
break;
case BE_REQ_INITGROUPS:
ret = ENOTSUP;
- DEBUG(SSSDBG_TRACE_FUNC, ("Initgroups requests are not handled " \
+ DEBUG(SSSDBG_TRACE_FUNC, "Initgroups requests are not handled " \
"by the IPA provider but are resolved " \
"by the responder directly from the " \
- "cache.\n"));
+ "cache.\n");
break;
default:
ret = EINVAL;
- DEBUG(SSSDBG_OP_FAILURE, ("Invalid sub-domain request type.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Invalid sub-domain request type.\n");
}
if (ret != EOK) goto fail;
@@ -143,7 +143,7 @@ static void ipa_get_subdom_acct_connected(struct tevent_req *subreq)
req_input = talloc(state, struct req_input);
if (req_input == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc failed.\n");
tevent_req_error(req, ENOMEM);
return;
}
@@ -153,7 +153,7 @@ static void ipa_get_subdom_acct_connected(struct tevent_req *subreq)
req_input->type = REQ_INP_NAME;
req_input->inp.name = talloc_strdup(req_input, state->filter);
if (req_input->inp.name == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
tevent_req_error(req, ENOMEM);
return;
}
@@ -170,13 +170,13 @@ static void ipa_get_subdom_acct_connected(struct tevent_req *subreq)
req_input->type = REQ_INP_SECID;
req_input->inp.secid = talloc_strdup(req_input, state->filter);
if (req_input->inp.secid == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "talloc_strdup failed.\n");
tevent_req_error(req, ENOMEM);
return;
}
break;
default:
- DEBUG(SSSDBG_OP_FAILURE, ("Invalid sub-domain filter type.\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "Invalid sub-domain filter type.\n");
state->dp_error = dp_error;
tevent_req_error(req, EINVAL);
return;
@@ -376,7 +376,7 @@ get_subdomain_homedir_of_user(TALLOC_CTX *mem_ctx, struct sss_domain_info *dom,
uid, NULL, dom->name, dom->flat_name);
if (homedir == NULL) {
- DEBUG(SSSDBG_OP_FAILURE, ("expand_homedir_template failed\n"));
+ DEBUG(SSSDBG_OP_FAILURE, "expand_homedir_template failed\n");
ret = ENOMEM;
goto done;
}
@@ -417,14 +417,14 @@ store_homedir_of_user(struct sss_domain_info *domain,
ret = sysdb_attrs_add_string(attrs, SYSDB_HOMEDIR, homedir);
if (ret != EOK) {
- DEBUG(SSSDBG_MINOR_FAILURE, ("Error setting homedir: [%s]\n",
- strerror(ret)));
+ DEBUG(SSSDBG_MINOR_FAILURE, "Error setting homedir: [%s]\n",
+ strerror(ret));
goto done;
}
ret = sysdb_transaction_start(sysdb);
if (ret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to start transaction\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Failed to start transaction\n");
goto done;
}
@@ -433,15 +433,15 @@ store_homedir_of_user(struct sss_domain_info *domain,
ret = sysdb_set_user_attr(domain, fqname, attrs, SYSDB_MOD_REP);
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Failed to update homedir information!\n"));
+ "Failed to update homedir information!\n");
goto done;
}
ret = sysdb_transaction_commit(sysdb);
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE,
- ("Cannot commit sysdb transaction [%d]: %s.\n",
- ret, strerror(ret)));
+ "Cannot commit sysdb transaction [%d]: %s.\n",
+ ret, strerror(ret));
goto done;
}
@@ -451,7 +451,7 @@ done:
if (in_transaction) {
sret = sysdb_transaction_cancel(sysdb);
if (sret != EOK) {
- DEBUG(SSSDBG_CRIT_FAILURE, ("Could not cancel transaction.\n"));
+ DEBUG(SSSDBG_CRIT_FAILURE, "Could not cancel transaction.\n");
}
}
talloc_free(tmp_ctx);
@@ -480,15 +480,15 @@ apply_subdomain_homedir(TALLOC_CTX *mem_ctx, struct sss_domain_info *dom,
ret = sysdb_getpwuid(mem_ctx, dom, uid, &res);
} else {
DEBUG(SSSDBG_OP_FAILURE,
- ("Unsupported filter type: [%d].\n", filter_type));
+ "Unsupported filter type: [%d].\n", filter_type);
ret = EINVAL;
goto done;
}
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("Failed to make request to our cache: [%d]: [%s]\n",
- ret, sss_strerror(ret)));
+ "Failed to make request to our cache: [%d]: [%s]\n",
+ ret, sss_strerror(ret));
goto done;
}
@@ -504,8 +504,8 @@ apply_subdomain_homedir(TALLOC_CTX *mem_ctx, struct sss_domain_info *dom,
fqname = ldb_msg_find_attr_as_string(res->msgs[0], SYSDB_NAME, NULL);
uid = ldb_msg_find_attr_as_uint64(res->msgs[0], SYSDB_UIDNUM, 0);
if (uid == 0) {
- DEBUG(SSSDBG_OP_FAILURE, ("UID for user [%s] is not known.\n",
- filter_value));
+ DEBUG(SSSDBG_OP_FAILURE, "UID for user [%s] is not known.\n",
+ filter_value);
ret = ENOENT;
goto done;
}
@@ -513,16 +513,16 @@ apply_subdomain_homedir(TALLOC_CTX *mem_ctx, struct sss_domain_info *dom,
ret = get_subdomain_homedir_of_user(mem_ctx, dom, fqname, uid, &homedir);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("get_subdomain_homedir_of_user failed: [%d]: [%s]\n",
- ret, sss_strerror(ret)));
+ "get_subdomain_homedir_of_user failed: [%d]: [%s]\n",
+ ret, sss_strerror(ret));
goto done;
}
ret = store_homedir_of_user(dom, fqname, homedir);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("store_homedir_of_user failed: [%d]: [%s]\n",
- ret, sss_strerror(ret)));
+ "store_homedir_of_user failed: [%d]: [%s]\n",
+ ret, sss_strerror(ret));
goto done;
}
@@ -542,7 +542,7 @@ ipa_get_ad_acct_ad_part_done(struct tevent_req *subreq)
ret = ad_handle_acct_info_recv(subreq, &state->dp_error, NULL);
talloc_zfree(subreq);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("AD lookup failed: %d\n", ret));
+ DEBUG(SSSDBG_OP_FAILURE, "AD lookup failed: %d\n", ret);
tevent_req_error(req, ret);
return;
}
@@ -552,8 +552,8 @@ ipa_get_ad_acct_ad_part_done(struct tevent_req *subreq)
state->ar->filter_value);
if (ret != EOK) {
DEBUG(SSSDBG_OP_FAILURE,
- ("apply_subdomain_homedir failed: [%d]: [%s].\n",
- ret, sss_strerror(ret)));
+ "apply_subdomain_homedir failed: [%d]: [%s].\n",
+ ret, sss_strerror(ret));
goto fail;
}
@@ -596,8 +596,8 @@ ipa_get_ad_acct_done(struct tevent_req *subreq)
ret = ipa_get_ad_memberships_recv(subreq, &state->dp_error);
talloc_zfree(subreq);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("IPA external groups lookup failed: %d\n",
- ret));
+ DEBUG(SSSDBG_OP_FAILURE, "IPA external groups lookup failed: %d\n",
+ ret);
tevent_req_error(req, ret);
return;
}
diff --git a/src/providers/ipa/ipa_sudo.c b/src/providers/ipa/ipa_sudo.c
index 726b11685..4863aa559 100644
--- a/src/providers/ipa/ipa_sudo.c
+++ b/src/providers/ipa/ipa_sudo.c
@@ -34,7 +34,7 @@ int ipa_sudo_init(struct be_ctx *be_ctx,
struct ipa_options *ipa_options;
struct sdap_options *ldap_options;
- DEBUG(SSSDBG_TRACE_INTERNAL, ("Initializing sudo IPA back end\n"));
+ DEBUG(SSSDBG_TRACE_INTERNAL, "Initializing sudo IPA back end\n");
/*
* SDAP_SUDO_SEARCH_BASE has already been initialized in
@@ -42,8 +42,8 @@ int ipa_sudo_init(struct be_ctx *be_ctx,
*/
ret = sdap_sudo_init(be_ctx, id_ctx->sdap_id_ctx, ops, pvt_data);
if (ret != EOK) {
- DEBUG(SSSDBG_OP_FAILURE, ("Cannot initialize LDAP SUDO [%d]: %s\n",
- ret, strerror(ret)));
+ DEBUG(SSSDBG_OP_FAILURE, "Cannot initialize LDAP SUDO [%d]: %s\n",
+ ret, strerror(ret));
return ret;
}