ehlo,

I generated patch for master and 1.13 branch

LS
>From 1ebba93f833c12d6f1bbdf4a0ff7b2976fdba0bf Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lsleb...@redhat.com>
Date: Fri, 11 Dec 2015 12:12:03 +0100
Subject: [PATCH] DEBUG: Add missing new lines

---
 src/p11_child/p11_child_nss.c    | 8 ++++----
 src/providers/ad/ad_gpo.c        | 6 +++---
 src/providers/data_provider_be.c | 2 +-
 src/providers/ldap/sdap_async.c  | 4 ++--
 src/providers/ldap/sdap_idmap.c  | 2 +-
 src/sbus/sssd_dbus_request.c     | 4 ++--
 src/tools/common/sss_colondb.c   | 2 +-
 7 files changed, 14 insertions(+), 14 deletions(-)

diff --git a/src/p11_child/p11_child_nss.c b/src/p11_child/p11_child_nss.c
index 
fe092bb0550828e6427f09752ff2083e08db1c0e..8a8e68aeec078340b77f1245162f2183fc5aa63f
 100644
--- a/src/p11_child/p11_child_nss.c
+++ b/src/p11_child/p11_child_nss.c
@@ -335,7 +335,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const 
char *slot_name_in,
         if (algtag == SEC_OID_UNKNOWN) {
             SECKEY_DestroyPrivateKey(priv_key);
             DEBUG(SSSDBG_OP_FAILURE,
-                  "SEC_GetSignatureAlgorithmOidTag failed [%d].",
+                  "SEC_GetSignatureAlgorithmOidTag failed [%d].\n",
                   PR_GetError());
             ret = EIO;
             goto done;
@@ -346,7 +346,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const 
char *slot_name_in,
                           priv_key, algtag);
         SECKEY_DestroyPrivateKey(priv_key);
         if (rv != SECSuccess) {
-            DEBUG(SSSDBG_OP_FAILURE, "SEC_SignData failed [%d].",
+            DEBUG(SSSDBG_OP_FAILURE, "SEC_SignData failed [%d].\n",
                                      PR_GetError());
             ret = EIO;
             goto done;
@@ -355,7 +355,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const 
char *slot_name_in,
         pub_key = CERT_ExtractPublicKey(found_cert);
         if (pub_key == NULL) {
             DEBUG(SSSDBG_OP_FAILURE,
-                  "CERT_ExtractPublicKey failed [%d].", PR_GetError());
+                  "CERT_ExtractPublicKey failed [%d].\n", PR_GetError());
             ret = EIO;
             goto done;
         }
@@ -365,7 +365,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const 
char *slot_name_in,
                             NULL);
         SECKEY_DestroyPublicKey(pub_key);
         if (rv != SECSuccess) {
-            DEBUG(SSSDBG_OP_FAILURE, "VFY_VerifyData failed [%d].",
+            DEBUG(SSSDBG_OP_FAILURE, "VFY_VerifyData failed [%d].\n",
                                      PR_GetError());
             ret = EACCES;
             goto done;
diff --git a/src/providers/ad/ad_gpo.c b/src/providers/ad/ad_gpo.c
index 
bdf2776db9823906e75574187461607fa57f2121..cca5e58618bf861c0d754ef1916583a73c32141a
 100644
--- a/src/providers/ad/ad_gpo.c
+++ b/src/providers/ad/ad_gpo.c
@@ -1845,7 +1845,7 @@ ad_gpo_target_dn_retrieval_done(struct tevent_req *subreq)
     if (!(uac & UAC_WORKSTATION_TRUST_ACCOUNT ||
           uac & UAC_SERVER_TRUST_ACCOUNT)) {
         DEBUG(SSSDBG_OP_FAILURE,
-              "Invalid userAccountControl (%x) value for machine account.",
+              "Invalid userAccountControl (%x) value for machine account.\n",
               uac);
         ret = EINVAL;
         goto done;
@@ -3598,7 +3598,7 @@ ad_gpo_get_gpo_attrs_done(struct tevent_req *subreq)
             const char *gpo_dn = 
state->candidate_gpos[state->gpo_index]->gpo_dn;
 
             DEBUG(SSSDBG_OP_FAILURE,
-                  "No attrs found for GPO [%s].", gpo_dn);
+                  "No attrs found for GPO [%s].\n", gpo_dn);
             ret = ENOENT;
             goto done;
         }
@@ -4390,7 +4390,7 @@ ad_gpo_get_sd_referral_search_done(struct tevent_req 
*subreq)
          * we will do it later if it ever becomes necessary.
          */
         DEBUG(SSSDBG_OP_FAILURE,
-              "No attrs found for referred GPO [%s].", state->gpo_dn);
+              "No attrs found for referred GPO [%s].\n", state->gpo_dn);
         ret = ENOENT;
         goto done;
 
diff --git a/src/providers/data_provider_be.c b/src/providers/data_provider_be.c
index 
8e2baf27dd260b7d9197da8bfa6db2dad767de89..41680c73ae6305aa4c9379c7545ab88afdb7ba48
 100644
--- a/src/providers/data_provider_be.c
+++ b/src/providers/data_provider_be.c
@@ -754,7 +754,7 @@ static void reactivate_subdoms(struct sss_domain_info *head)
 {
     struct sss_domain_info *dom;
 
-    DEBUG(SSSDBG_TRACE_LIBS, "Resetting all subdomains");
+    DEBUG(SSSDBG_TRACE_LIBS, "Resetting all subdomains\n");
 
     for (dom = head; dom; dom = get_next_domain(dom, true)) {
         if (sss_domain_get_state(dom) == DOM_INACTIVE) {
diff --git a/src/providers/ldap/sdap_async.c b/src/providers/ldap/sdap_async.c
index 
b614a7059a36681e5b7517b3c214d31e88f1673e..668bd7b465bbfefad13ab0b7061cd16a05dfbef1
 100644
--- a/src/providers/ldap/sdap_async.c
+++ b/src/providers/ldap/sdap_async.c
@@ -1469,7 +1469,7 @@ static void sdap_get_generic_op_finished(struct sdap_op 
*op,
         ret = sdap_get_generic_ext_add_references(state, refs);
         if (ret != EOK) {
             DEBUG(SSSDBG_OP_FAILURE,
-                  "sdap_get_generic_ext_add_references failed: %s(%d)",
+                  "sdap_get_generic_ext_add_references failed: %s(%d)\n",
                   sss_strerror(ret), ret);
             ldap_memvfree((void **)refs);
             tevent_req_error(req, ret);
@@ -1537,7 +1537,7 @@ static void sdap_get_generic_op_finished(struct sdap_op 
*op,
             ret = sdap_get_generic_ext_add_references(state, refs);
             if (ret != EOK) {
                 DEBUG(SSSDBG_OP_FAILURE,
-                      "sdap_get_generic_ext_add_references failed: %s(%d)",
+                      "sdap_get_generic_ext_add_references failed: %s(%d)\n",
                       sss_strerror(ret), ret);
                 tevent_req_error(req, ret);
             }
diff --git a/src/providers/ldap/sdap_idmap.c b/src/providers/ldap/sdap_idmap.c
index 
d33e5d06ded52857698de96177871bbecb128dea..4d9de8a447d46dedc8df49dc5663037248eb6996
 100644
--- a/src/providers/ldap/sdap_idmap.c
+++ b/src/providers/ldap/sdap_idmap.c
@@ -507,7 +507,7 @@ sdap_idmap_sid_to_unix(struct sdap_idmap_ctx *idmap_ctx,
         DEBUG(SSSDBG_IMPORTANT_INFO,
               "Object SID [%s] has a RID that is larger than the "
               "ldap_idmap_range_size. See the \"ID MAPPING\" section of "
-              "sssd-ad(5) for an explanation of how to resolve this issue.",
+              "sssd-ad(5) for an explanation of how to resolve this issue.\n",
               sid_str);
         /* Fall through intentionally */
     default:
diff --git a/src/sbus/sssd_dbus_request.c b/src/sbus/sssd_dbus_request.c
index 
db0a23fb71569e7ab3a7077d714bb60e060af9b0..aa57f6b6587183a9edd7764d123e82b01b5f6070
 100644
--- a/src/sbus/sssd_dbus_request.c
+++ b/src/sbus/sssd_dbus_request.c
@@ -117,8 +117,8 @@ static int sbus_request_valist_check(va_list va, int 
first_arg_type)
                                   strlen(value->str));
              if (!ok) {
                    DEBUG(SSSDBG_MINOR_FAILURE,
-                         "sbus message argument [%s] contains invalid " \
-                         "non-UTF8 characters", value->str);
+                         "sbus message argument [%s] contains invalid "
+                         "non-UTF8 characters\n", value->str);
                  ret = EINVAL;
                  break;
              }
diff --git a/src/tools/common/sss_colondb.c b/src/tools/common/sss_colondb.c
index 
6b340c80e703342defb8582537db2e4ef3926155..a41b12fb9c097ff0e03da6d1c5cfe2fb24b63d54
 100644
--- a/src/tools/common/sss_colondb.c
+++ b/src/tools/common/sss_colondb.c
@@ -123,7 +123,7 @@ errno_t sss_colondb_readline(TALLOC_CTX *mem_ctx,
         /* Nothing was read. */
         if (errno != 0) {
             ret = errno;
-            DEBUG(SSSDBG_CRIT_FAILURE, "Unable to read line [%d]: %s",
+            DEBUG(SSSDBG_CRIT_FAILURE, "Unable to read line [%d]: %s\n",
                   ret, sss_strerror(ret));
             return ret;
         }
-- 
2.5.0

>From 57865445a40d8e477b4f94287a8b90d44e49ee5a Mon Sep 17 00:00:00 2001
From: Lukas Slebodnik <lsleb...@redhat.com>
Date: Fri, 11 Dec 2015 12:39:30 +0100
Subject: [PATCH] DEBUG: Add missing new lines

---
 src/p11_child/p11_child_nss.c    | 8 ++++----
 src/providers/ad/ad_gpo.c        | 4 ++--
 src/providers/data_provider_be.c | 2 +-
 src/providers/ldap/sdap_async.c  | 4 ++--
 src/providers/ldap/sdap_idmap.c  | 2 +-
 src/sbus/sssd_dbus_request.c     | 4 ++--
 src/tools/common/sss_colondb.c   | 2 +-
 7 files changed, 13 insertions(+), 13 deletions(-)

diff --git a/src/p11_child/p11_child_nss.c b/src/p11_child/p11_child_nss.c
index 
0f3a4e555af01332271106acdecbbe318ddc4d99..0d4ed1b794a40ec157af8ce10f109650876f229c
 100644
--- a/src/p11_child/p11_child_nss.c
+++ b/src/p11_child/p11_child_nss.c
@@ -335,7 +335,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const 
char *slot_name_in,
         if (algtag == SEC_OID_UNKNOWN) {
             SECKEY_DestroyPrivateKey(priv_key);
             DEBUG(SSSDBG_OP_FAILURE,
-                  "SEC_GetSignatureAlgorithmOidTag failed [%d].",
+                  "SEC_GetSignatureAlgorithmOidTag failed [%d].\n",
                   PR_GetError());
             ret = EIO;
             goto done;
@@ -346,7 +346,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const 
char *slot_name_in,
                           priv_key, algtag);
         SECKEY_DestroyPrivateKey(priv_key);
         if (rv != SECSuccess) {
-            DEBUG(SSSDBG_OP_FAILURE, "SEC_SignData failed [%d].",
+            DEBUG(SSSDBG_OP_FAILURE, "SEC_SignData failed [%d].\n",
                                      PR_GetError());
             ret = EIO;
             goto done;
@@ -355,7 +355,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const 
char *slot_name_in,
         pub_key = CERT_ExtractPublicKey(found_cert);
         if (pub_key == NULL) {
             DEBUG(SSSDBG_OP_FAILURE,
-                  "CERT_ExtractPublicKey failed [%d].", PR_GetError());
+                  "CERT_ExtractPublicKey failed [%d].\n", PR_GetError());
             ret = EIO;
             goto done;
         }
@@ -365,7 +365,7 @@ int do_work(TALLOC_CTX *mem_ctx, const char *nss_db, const 
char *slot_name_in,
                             NULL);
         SECKEY_DestroyPublicKey(pub_key);
         if (rv != SECSuccess) {
-            DEBUG(SSSDBG_OP_FAILURE, "VFY_VerifyData failed [%d].",
+            DEBUG(SSSDBG_OP_FAILURE, "VFY_VerifyData failed [%d].\n",
                                      PR_GetError());
             ret = EACCES;
             goto done;
diff --git a/src/providers/ad/ad_gpo.c b/src/providers/ad/ad_gpo.c
index 
f1e928b71c3b9d1666b4074f32464550febbadb9..d63e52e2798753262b13361788d40b8743640c84
 100644
--- a/src/providers/ad/ad_gpo.c
+++ b/src/providers/ad/ad_gpo.c
@@ -3593,7 +3593,7 @@ ad_gpo_get_gpo_attrs_done(struct tevent_req *subreq)
             const char *gpo_dn = 
state->candidate_gpos[state->gpo_index]->gpo_dn;
 
             DEBUG(SSSDBG_OP_FAILURE,
-                  "No attrs found for GPO [%s].", gpo_dn);
+                  "No attrs found for GPO [%s].\n", gpo_dn);
             ret = ENOENT;
             goto done;
         }
@@ -4385,7 +4385,7 @@ ad_gpo_get_sd_referral_search_done(struct tevent_req 
*subreq)
          * we will do it later if it ever becomes necessary.
          */
         DEBUG(SSSDBG_OP_FAILURE,
-              "No attrs found for referred GPO [%s].", state->gpo_dn);
+              "No attrs found for referred GPO [%s].\n", state->gpo_dn);
         ret = ENOENT;
         goto done;
 
diff --git a/src/providers/data_provider_be.c b/src/providers/data_provider_be.c
index 
9bc54b6d59dafd22b9f70da7cca3b520ca941efc..7ad911e923a55b5af09ae28542abdbad5618c5e8
 100644
--- a/src/providers/data_provider_be.c
+++ b/src/providers/data_provider_be.c
@@ -637,7 +637,7 @@ static void reactivate_subdoms(struct sss_domain_info *head)
 {
     struct sss_domain_info *dom;
 
-    DEBUG(SSSDBG_TRACE_LIBS, "Resetting all subdomains");
+    DEBUG(SSSDBG_TRACE_LIBS, "Resetting all subdomains\n");
 
     for (dom = head; dom; dom = get_next_domain(dom, true)) {
         if (sss_domain_get_state(dom) == DOM_INACTIVE) {
diff --git a/src/providers/ldap/sdap_async.c b/src/providers/ldap/sdap_async.c
index 
b614a7059a36681e5b7517b3c214d31e88f1673e..668bd7b465bbfefad13ab0b7061cd16a05dfbef1
 100644
--- a/src/providers/ldap/sdap_async.c
+++ b/src/providers/ldap/sdap_async.c
@@ -1469,7 +1469,7 @@ static void sdap_get_generic_op_finished(struct sdap_op 
*op,
         ret = sdap_get_generic_ext_add_references(state, refs);
         if (ret != EOK) {
             DEBUG(SSSDBG_OP_FAILURE,
-                  "sdap_get_generic_ext_add_references failed: %s(%d)",
+                  "sdap_get_generic_ext_add_references failed: %s(%d)\n",
                   sss_strerror(ret), ret);
             ldap_memvfree((void **)refs);
             tevent_req_error(req, ret);
@@ -1537,7 +1537,7 @@ static void sdap_get_generic_op_finished(struct sdap_op 
*op,
             ret = sdap_get_generic_ext_add_references(state, refs);
             if (ret != EOK) {
                 DEBUG(SSSDBG_OP_FAILURE,
-                      "sdap_get_generic_ext_add_references failed: %s(%d)",
+                      "sdap_get_generic_ext_add_references failed: %s(%d)\n",
                       sss_strerror(ret), ret);
                 tevent_req_error(req, ret);
             }
diff --git a/src/providers/ldap/sdap_idmap.c b/src/providers/ldap/sdap_idmap.c
index 
c42a6e9acbeea229d739ea1f5c2731fd8712439b..0495cbbd3f8af5ea560a292894fbaf4f0636b1a4
 100644
--- a/src/providers/ldap/sdap_idmap.c
+++ b/src/providers/ldap/sdap_idmap.c
@@ -506,7 +506,7 @@ sdap_idmap_sid_to_unix(struct sdap_idmap_ctx *idmap_ctx,
         DEBUG(SSSDBG_IMPORTANT_INFO,
               "Object SID [%s] has a RID that is larger than the "
               "ldap_idmap_range_size. See the \"ID MAPPING\" section of "
-              "sssd-ad(5) for an explanation of how to resolve this issue.",
+              "sssd-ad(5) for an explanation of how to resolve this issue.\n",
               sid_str);
         /* Fall through intentionally */
     default:
diff --git a/src/sbus/sssd_dbus_request.c b/src/sbus/sssd_dbus_request.c
index 
db0a23fb71569e7ab3a7077d714bb60e060af9b0..aa57f6b6587183a9edd7764d123e82b01b5f6070
 100644
--- a/src/sbus/sssd_dbus_request.c
+++ b/src/sbus/sssd_dbus_request.c
@@ -117,8 +117,8 @@ static int sbus_request_valist_check(va_list va, int 
first_arg_type)
                                   strlen(value->str));
              if (!ok) {
                    DEBUG(SSSDBG_MINOR_FAILURE,
-                         "sbus message argument [%s] contains invalid " \
-                         "non-UTF8 characters", value->str);
+                         "sbus message argument [%s] contains invalid "
+                         "non-UTF8 characters\n", value->str);
                  ret = EINVAL;
                  break;
              }
diff --git a/src/tools/common/sss_colondb.c b/src/tools/common/sss_colondb.c
index 
6b340c80e703342defb8582537db2e4ef3926155..a41b12fb9c097ff0e03da6d1c5cfe2fb24b63d54
 100644
--- a/src/tools/common/sss_colondb.c
+++ b/src/tools/common/sss_colondb.c
@@ -123,7 +123,7 @@ errno_t sss_colondb_readline(TALLOC_CTX *mem_ctx,
         /* Nothing was read. */
         if (errno != 0) {
             ret = errno;
-            DEBUG(SSSDBG_CRIT_FAILURE, "Unable to read line [%d]: %s",
+            DEBUG(SSSDBG_CRIT_FAILURE, "Unable to read line [%d]: %s\n",
                   ret, sss_strerror(ret));
             return ret;
         }
-- 
2.5.0

_______________________________________________
sssd-devel mailing list
sssd-devel@lists.fedorahosted.org
https://lists.fedorahosted.org/admin/lists/sssd-devel@lists.fedorahosted.org

Reply via email to