summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPavel Reichl <preichl@redhat.com>2015-01-22 07:22:42 -0500
committerJakub Hrozek <jhrozek@redhat.com>2015-01-27 10:58:30 +0100
commitb07a3b729892d2bc2ffa73d93de95e19003cc6c8 (patch)
tree2a8a61dd3552a80bdd6f6f0f1fc3531f16a8c661
parentab5f9b58ae740868cb09e92379ed41d30b9401ac (diff)
downloadsssd-b07a3b729892d2bc2ffa73d93de95e19003cc6c8.tar.gz
sssd-b07a3b729892d2bc2ffa73d93de95e19003cc6c8.tar.xz
sssd-b07a3b729892d2bc2ffa73d93de95e19003cc6c8.zip
add missing '\n' in debug messages
Also reformat debug strings not to exceed 80 columns long lines. Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
-rw-r--r--src/providers/data_provider_be.c2
-rw-r--r--src/providers/ipa/ipa_subdomains_ext_groups.c7
-rw-r--r--src/providers/ldap/sdap_access.c2
-rw-r--r--src/responder/pac/pacsrv_cmd.c19
-rw-r--r--src/tools/sss_cache.c9
-rw-r--r--src/util/domain_info_utils.c9
6 files changed, 26 insertions, 22 deletions
diff --git a/src/providers/data_provider_be.c b/src/providers/data_provider_be.c
index 53a0be258..02749035c 100644
--- a/src/providers/data_provider_be.c
+++ b/src/providers/data_provider_be.c
@@ -499,7 +499,7 @@ void be_mark_offline(struct be_ctx *ctx)
if (ret != EOK) {
DEBUG(SSSDBG_CRIT_FAILURE,
"Failed to get offline_timeout from confdb. "
- "Will use 60 seconds.");
+ "Will use 60 seconds.\n");
offline_timeout = 60;
}
ret = be_ptask_create_sync(ctx, ctx,
diff --git a/src/providers/ipa/ipa_subdomains_ext_groups.c b/src/providers/ipa/ipa_subdomains_ext_groups.c
index b9690bdb6..92889c270 100644
--- a/src/providers/ipa/ipa_subdomains_ext_groups.c
+++ b/src/providers/ipa/ipa_subdomains_ext_groups.c
@@ -847,9 +847,10 @@ static void ipa_add_ad_memberships_get_next(struct tevent_req *req)
}
if (missing_groups) {
- DEBUG(SSSDBG_CRIT_FAILURE, "There are unresolved external group " \
- "memberships even after all groups have " \
- "been looked up on the LDAP server.");
+ DEBUG(SSSDBG_CRIT_FAILURE, "There are unresolved external group "
+ "memberships even after all groups "
+ "have been looked up on the LDAP "
+ "server.\n");
}
tevent_req_done(req);
return;
diff --git a/src/providers/ldap/sdap_access.c b/src/providers/ldap/sdap_access.c
index e09e6b8fe..a6c882cae 100644
--- a/src/providers/ldap/sdap_access.c
+++ b/src/providers/ldap/sdap_access.c
@@ -276,7 +276,7 @@ static void sdap_access_done(struct tevent_req *subreq)
break;
default:
ret = EINVAL;
- DEBUG(SSSDBG_MINOR_FAILURE, "Unknown access control type: %d.",
+ DEBUG(SSSDBG_MINOR_FAILURE, "Unknown access control type: %d.\n",
state->ac_type);
break;
}
diff --git a/src/responder/pac/pacsrv_cmd.c b/src/responder/pac/pacsrv_cmd.c
index 07d2f0cf7..83609343b 100644
--- a/src/responder/pac/pacsrv_cmd.c
+++ b/src/responder/pac/pacsrv_cmd.c
@@ -584,15 +584,16 @@ static errno_t save_pac_user(struct pac_req_ctx *pr_ctx)
&msg);
if (ret == ENOENT) {
if (pwd->pw_gid == 0 && !pr_ctx->dom->mpg) {
- DEBUG(SSSDBG_CRIT_FAILURE, "Primary group RID from the PAC " \
- "cannot be translated into a GID for " \
- "user [%s]. Typically this happens " \
- "when UIDs and GIDs are read from AD " \
- "and the primary AD group does not " \
- "have a GID assigned. Make sure the " \
- "user is created by the ID provider " \
- "before GSSAPI based authentication " \
- "is used in this case.", pwd->pw_name);
+ DEBUG(SSSDBG_CRIT_FAILURE, "Primary group RID from the PAC "
+ "cannot be translated into a GID for "
+ "user [%s]. Typically this happens "
+ "when UIDs and GIDs are read from AD "
+ "and the primary AD group does not "
+ "have a GID assigned. Make sure the "
+ "user is created by the ID provider "
+ "before GSSAPI based authentication "
+ "is used in this case.\n",
+ pwd->pw_name);
ret = EINVAL;
goto done;
}
diff --git a/src/tools/sss_cache.c b/src/tools/sss_cache.c
index e6faf2d74..c9bf24914 100644
--- a/src/tools/sss_cache.c
+++ b/src/tools/sss_cache.c
@@ -426,15 +426,16 @@ static bool invalidate_entries(TALLOC_CTX *ctx,
c_name = ldb_msg_find_attr_as_string(msgs[i], SYSDB_NAME, NULL);
if (c_name == NULL) {
DEBUG(SSSDBG_MINOR_FAILURE,
- "Something bad happened, can't find attribute %s", SYSDB_NAME);
- ERROR("Couldn't invalidate %1$s", type_string);
+ "Something bad happened, can't find attribute %s\n",
+ SYSDB_NAME);
+ ERROR("Couldn't invalidate %1$s\n", type_string);
iret = false;
} else {
ret = invalidate_entry(ctx, dinfo, c_name, entry_type);
if (ret != EOK) {
DEBUG(SSSDBG_MINOR_FAILURE,
- "Couldn't invalidate %s %s", type_string, c_name);
- ERROR("Couldn't invalidate %1$s %2$s", type_string, c_name);
+ "Couldn't invalidate %s %s\n", type_string, c_name);
+ ERROR("Couldn't invalidate %1$s %2$s\n", type_string, c_name);
iret = false;
}
}
diff --git a/src/util/domain_info_utils.c b/src/util/domain_info_utils.c
index e0f1120e3..cbfc55b26 100644
--- a/src/util/domain_info_utils.c
+++ b/src/util/domain_info_utils.c
@@ -433,8 +433,9 @@ sss_write_domain_mappings(struct sss_domain_info *domain)
fd = mkstemp(tmp_file);
umask(old_mode);
if (fd < 0) {
- DEBUG(SSSDBG_OP_FAILURE, "creating the temp file [%s] for domain-realm "
- "mappings failed.", tmp_file);
+ DEBUG(SSSDBG_OP_FAILURE,
+ "creating the temp file [%s] for domain-realm mappings "
+ "failed.\n", tmp_file);
ret = EIO;
talloc_zfree(tmp_ctx);
goto done;
@@ -682,8 +683,8 @@ static errno_t sss_write_krb5_localauth_snippet(const char *path)
fd = mkstemp(tmp_file);
umask(old_mode);
if (fd < 0) {
- DEBUG(SSSDBG_OP_FAILURE, "creating the temp file [%s] for domain-realm "
- "mappings failed.", tmp_file);
+ DEBUG(SSSDBG_OP_FAILURE, "creating the temp file [%s] for "
+ "domain-realm mappings failed.\n", tmp_file);
ret = EIO;
talloc_zfree(tmp_ctx);
goto done;