From 1ebba93f833c12d6f1bbdf4a0ff7b2976fdba0bf Mon Sep 17 00:00:00 2001 From: Lukas Slebodnik Date: Fri, 11 Dec 2015 12:12:03 +0100 Subject: [PATCH] DEBUG: Add missing new lines --- src/p11_child/p11_child_nss.c | 8 ++++---- src/providers/ad/ad_gpo.c | 6 +++--- src/providers/data_provider_be.c | 2 +- src/providers/ldap/sdap_async.c | 4 ++-- src/providers/ldap/sdap_idmap.c | 2 +- src/sbus/sssd_dbus_request.c | 4 ++-- src/tools/common/sss_colondb.c | 2 +- 7 files changed, 14 insertions(+), 14 deletions(-) diff --git a/src/p11_child/p11_child_nss.c b/src/p11_child/p11_child_nss.c index fe092bb0550828e6427f09752ff2083e08db1c0e..8a8e68aeec078340b77f1245162f2183fc5aa63f 100644 --- a/src/p11_child/p11_child_nss.c +++ b/src/p11_child/p11_child_nss.c @@ -335,7 +335,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const char *slot_name_in, if (algtag == SEC_OID_UNKNOWN) { SECKEY_DestroyPrivateKey(priv_key); DEBUG(SSSDBG_OP_FAILURE, - "SEC_GetSignatureAlgorithmOidTag failed [%d].", + "SEC_GetSignatureAlgorithmOidTag failed [%d].\n", PR_GetError()); ret = EIO; goto done; @@ -346,7 +346,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const char *slot_name_in, priv_key, algtag); SECKEY_DestroyPrivateKey(priv_key); if (rv != SECSuccess) { - DEBUG(SSSDBG_OP_FAILURE, "SEC_SignData failed [%d].", + DEBUG(SSSDBG_OP_FAILURE, "SEC_SignData failed [%d].\n", PR_GetError()); ret = EIO; goto done; @@ -355,7 +355,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const char *slot_name_in, pub_key = CERT_ExtractPublicKey(found_cert); if (pub_key == NULL) { DEBUG(SSSDBG_OP_FAILURE, - "CERT_ExtractPublicKey failed [%d].", PR_GetError()); + "CERT_ExtractPublicKey failed [%d].\n", PR_GetError()); ret = EIO; goto done; } @@ -365,7 +365,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const char *slot_name_in, NULL); SECKEY_DestroyPublicKey(pub_key); if (rv != SECSuccess) { - DEBUG(SSSDBG_OP_FAILURE, "VFY_VerifyData failed [%d].", + DEBUG(SSSDBG_OP_FAILURE, "VFY_VerifyData failed [%d].\n", PR_GetError()); ret = EACCES; goto done; diff --git a/src/providers/ad/ad_gpo.c b/src/providers/ad/ad_gpo.c index bdf2776db9823906e75574187461607fa57f2121..cca5e58618bf861c0d754ef1916583a73c32141a 100644 --- a/src/providers/ad/ad_gpo.c +++ b/src/providers/ad/ad_gpo.c @@ -1845,7 +1845,7 @@ ad_gpo_target_dn_retrieval_done(struct tevent_req *subreq) if (!(uac & UAC_WORKSTATION_TRUST_ACCOUNT || uac & UAC_SERVER_TRUST_ACCOUNT)) { DEBUG(SSSDBG_OP_FAILURE, - "Invalid userAccountControl (%x) value for machine account.", + "Invalid userAccountControl (%x) value for machine account.\n", uac); ret = EINVAL; goto done; @@ -3598,7 +3598,7 @@ ad_gpo_get_gpo_attrs_done(struct tevent_req *subreq) const char *gpo_dn = state->candidate_gpos[state->gpo_index]->gpo_dn; DEBUG(SSSDBG_OP_FAILURE, - "No attrs found for GPO [%s].", gpo_dn); + "No attrs found for GPO [%s].\n", gpo_dn); ret = ENOENT; goto done; } @@ -4390,7 +4390,7 @@ ad_gpo_get_sd_referral_search_done(struct tevent_req *subreq) * we will do it later if it ever becomes necessary. */ DEBUG(SSSDBG_OP_FAILURE, - "No attrs found for referred GPO [%s].", state->gpo_dn); + "No attrs found for referred GPO [%s].\n", state->gpo_dn); ret = ENOENT; goto done; diff --git a/src/providers/data_provider_be.c b/src/providers/data_provider_be.c index 8e2baf27dd260b7d9197da8bfa6db2dad767de89..41680c73ae6305aa4c9379c7545ab88afdb7ba48 100644 --- a/src/providers/data_provider_be.c +++ b/src/providers/data_provider_be.c @@ -754,7 +754,7 @@ static void reactivate_subdoms(struct sss_domain_info *head) { struct sss_domain_info *dom; - DEBUG(SSSDBG_TRACE_LIBS, "Resetting all subdomains"); + DEBUG(SSSDBG_TRACE_LIBS, "Resetting all subdomains\n"); for (dom = head; dom; dom = get_next_domain(dom, true)) { if (sss_domain_get_state(dom) == DOM_INACTIVE) { diff --git a/src/providers/ldap/sdap_async.c b/src/providers/ldap/sdap_async.c index b614a7059a36681e5b7517b3c214d31e88f1673e..668bd7b465bbfefad13ab0b7061cd16a05dfbef1 100644 --- a/src/providers/ldap/sdap_async.c +++ b/src/providers/ldap/sdap_async.c @@ -1469,7 +1469,7 @@ static void sdap_get_generic_op_finished(struct sdap_op *op, ret = sdap_get_generic_ext_add_references(state, refs); if (ret != EOK) { DEBUG(SSSDBG_OP_FAILURE, - "sdap_get_generic_ext_add_references failed: %s(%d)", + "sdap_get_generic_ext_add_references failed: %s(%d)\n", sss_strerror(ret), ret); ldap_memvfree((void **)refs); tevent_req_error(req, ret); @@ -1537,7 +1537,7 @@ static void sdap_get_generic_op_finished(struct sdap_op *op, ret = sdap_get_generic_ext_add_references(state, refs); if (ret != EOK) { DEBUG(SSSDBG_OP_FAILURE, - "sdap_get_generic_ext_add_references failed: %s(%d)", + "sdap_get_generic_ext_add_references failed: %s(%d)\n", sss_strerror(ret), ret); tevent_req_error(req, ret); } diff --git a/src/providers/ldap/sdap_idmap.c b/src/providers/ldap/sdap_idmap.c index d33e5d06ded52857698de96177871bbecb128dea..4d9de8a447d46dedc8df49dc5663037248eb6996 100644 --- a/src/providers/ldap/sdap_idmap.c +++ b/src/providers/ldap/sdap_idmap.c @@ -507,7 +507,7 @@ sdap_idmap_sid_to_unix(struct sdap_idmap_ctx *idmap_ctx, DEBUG(SSSDBG_IMPORTANT_INFO, "Object SID [%s] has a RID that is larger than the " "ldap_idmap_range_size. See the \"ID MAPPING\" section of " - "sssd-ad(5) for an explanation of how to resolve this issue.", + "sssd-ad(5) for an explanation of how to resolve this issue.\n", sid_str); /* Fall through intentionally */ default: diff --git a/src/sbus/sssd_dbus_request.c b/src/sbus/sssd_dbus_request.c index db0a23fb71569e7ab3a7077d714bb60e060af9b0..aa57f6b6587183a9edd7764d123e82b01b5f6070 100644 --- a/src/sbus/sssd_dbus_request.c +++ b/src/sbus/sssd_dbus_request.c @@ -117,8 +117,8 @@ static int sbus_request_valist_check(va_list va, int first_arg_type) strlen(value->str)); if (!ok) { DEBUG(SSSDBG_MINOR_FAILURE, - "sbus message argument [%s] contains invalid " \ - "non-UTF8 characters", value->str); + "sbus message argument [%s] contains invalid " + "non-UTF8 characters\n", value->str); ret = EINVAL; break; } diff --git a/src/tools/common/sss_colondb.c b/src/tools/common/sss_colondb.c index 6b340c80e703342defb8582537db2e4ef3926155..a41b12fb9c097ff0e03da6d1c5cfe2fb24b63d54 100644 --- a/src/tools/common/sss_colondb.c +++ b/src/tools/common/sss_colondb.c @@ -123,7 +123,7 @@ errno_t sss_colondb_readline(TALLOC_CTX *mem_ctx, /* Nothing was read. */ if (errno != 0) { ret = errno; - DEBUG(SSSDBG_CRIT_FAILURE, "Unable to read line [%d]: %s", + DEBUG(SSSDBG_CRIT_FAILURE, "Unable to read line [%d]: %s\n", ret, sss_strerror(ret)); return ret; } -- 2.5.0