walters / rpms / nfs-utils

Forked from rpms/nfs-utils 6 years ago
Clone
9064ed1
commit 09c7ad1cd9c5ca2fc46631a0057d47309abc8706
9064ed1
Author: Kevin Coffman <kwc@citi.umich.edu>
9064ed1
Date:   Mon Jan 5 14:07:05 2009 -0500
9064ed1
9064ed1
    gssd: By default, don't spam syslog when users' credentials expire
9064ed1
    
9064ed1
    Change the priority of "common" log messages so that syslog doesn't get
9064ed1
    slammed/spammed when users' credentials expire, or there is another
9064ed1
    common
9064ed1
    problem which would cause error messages for all context creation
9064ed1
    requests.
9064ed1
    
9064ed1
    Note that this will now require that gssd or svcgssd option "-v" is used
9064ed1
    to
9064ed1
    debug these common cases.
9064ed1
    
9064ed1
    Original patch from Andrew Pollock <apollock@google.com>.
9064ed1
    
9064ed1
    Signed-off-by: Kevin Coffman <kwc@citi.umich.edu>
9064ed1
    Signed-off-by: Steve Dickson <steved@redhat.com>
9064ed1
    CC: Andrew Pollock <apollock@google.com>
9064ed1
9064ed1
diff --git a/utils/gssd/gss_util.c b/utils/gssd/gss_util.c
9064ed1
index 8a7bcaa..2d66be9 100644
9064ed1
--- a/utils/gssd/gss_util.c
9064ed1
+++ b/utils/gssd/gss_util.c
9064ed1
@@ -216,7 +216,7 @@ gssd_acquire_cred(char *server_name)
9064ed1
 		ignore_maj_stat = gss_display_name(&ignore_min_stat,
9064ed1
 				target_name, &pbuf, NULL);
9064ed1
 		if (ignore_maj_stat == GSS_S_COMPLETE) {
9064ed1
-			printerr(0, "Unable to obtain credentials for '%.*s'\n",
9064ed1
+			printerr(1, "Unable to obtain credentials for '%.*s'\n",
9064ed1
 				 pbuf.length, pbuf.value);
9064ed1
 			ignore_maj_stat = gss_release_buffer(&ignore_min_stat,
9064ed1
 							     &pbuf);
9064ed1
diff --git a/utils/gssd/gssd_proc.c b/utils/gssd/gssd_proc.c
9064ed1
index cb14d45..91fc8d2 100644
9064ed1
--- a/utils/gssd/gssd_proc.c
9064ed1
+++ b/utils/gssd/gssd_proc.c
9064ed1
@@ -448,7 +448,7 @@ do_downcall(int k5_fd, uid_t uid, struct authgss_private_data *pd,
9064ed1
 	return 0;
9064ed1
 out_err:
9064ed1
 	if (buf) free(buf);
9064ed1
-	printerr(0, "Failed to write downcall!\n");
9064ed1
+	printerr(1, "Failed to write downcall!\n");
9064ed1
 	return -1;
9064ed1
 }
9064ed1
 
9064ed1
@@ -741,14 +741,14 @@ handle_krb5_upcall(struct clnt_info *clp)
9064ed1
 			}
9064ed1
 			gssd_free_krb5_machine_cred_list(credlist);
9064ed1
 			if (!success) {
9064ed1
-				printerr(0, "WARNING: Failed to create krb5 context "
9064ed1
+				printerr(1, "WARNING: Failed to create krb5 context "
9064ed1
 					 "for user with uid %d with any "
9064ed1
 					 "credentials cache for server %s\n",
9064ed1
 					 uid, clp->servername);
9064ed1
 				goto out_return_error;
9064ed1
 			}
9064ed1
 		} else {
9064ed1
-			printerr(0, "WARNING: Failed to create krb5 context "
9064ed1
+			printerr(1, "WARNING: Failed to create krb5 context "
9064ed1
 				 "for user with uid %d for server %s\n",
9064ed1
 				 uid, clp->servername);
9064ed1
 			goto out_return_error;
9064ed1
@@ -756,7 +756,7 @@ handle_krb5_upcall(struct clnt_info *clp)
9064ed1
 	}
9064ed1
 
9064ed1
 	if (!authgss_get_private_data(auth, &pd)) {
9064ed1
-		printerr(0, "WARNING: Failed to obtain authentication "
9064ed1
+		printerr(1, "WARNING: Failed to obtain authentication "
9064ed1
 			    "data for user with uid %d for server %s\n",
9064ed1
 			 uid, clp->servername);
9064ed1
 		goto out_return_error;
9064ed1
diff --git a/utils/gssd/krb5_util.c b/utils/gssd/krb5_util.c
9064ed1
index 77814bc..d4ee631 100644
9064ed1
--- a/utils/gssd/krb5_util.c
9064ed1
+++ b/utils/gssd/krb5_util.c
9064ed1
@@ -399,7 +399,7 @@ gssd_get_single_krb5_cred(krb5_context context,
9064ed1
 		goto out;
9064ed1
 	}
9064ed1
 	if (krb5_get_init_creds_opt_set_addressless(context, init_opts, 1))
9064ed1
-		printerr(0, "WARNING: Unable to set option for addressless "
9064ed1
+		printerr(1, "WARNING: Unable to set option for addressless "
9064ed1
 			 "tickets.  May have problems behind a NAT.\n");
9064ed1
 #ifdef TEST_SHORT_LIFETIME
9064ed1
 	/* set a short lifetime (for debugging only!) */
9064ed1
@@ -422,7 +422,7 @@ gssd_get_single_krb5_cred(krb5_context context,
9064ed1
 
9064ed1
 	if ((code = krb5_get_init_creds_keytab(context, &my_creds, ple->princ,
9064ed1
 					       kt, 0, NULL, opts))) {
9064ed1
-		printerr(0, "WARNING: %s while getting initial ticket for "
9064ed1
+		printerr(1, "WARNING: %s while getting initial ticket for "
9064ed1
 			 "principal '%s' using keytab '%s'\n",
9064ed1
 			 gssd_k5_err_msg(context, code),
9064ed1
 			 pname ? pname : "<unparsable>", kt_name);
9064ed1
@@ -632,7 +632,7 @@ get_full_hostname(const char *inhost, char *outhost, int outhostlen)
9064ed1
 	/* Get full target hostname */
9064ed1
 	retval = getaddrinfo(inhost, NULL, &hints, &addrs);
9064ed1
 	if (retval) {
9064ed1
-		printerr(0, "%s while getting full hostname for '%s'\n",
9064ed1
+		printerr(1, "%s while getting full hostname for '%s'\n",
9064ed1
 			 gai_strerror(retval), inhost);
9064ed1
 		goto out;
9064ed1
 	}
9064ed1
diff --git a/utils/gssd/svcgssd_proc.c b/utils/gssd/svcgssd_proc.c
9064ed1
index f162152..1d13532 100644
9064ed1
--- a/utils/gssd/svcgssd_proc.c
9064ed1
+++ b/utils/gssd/svcgssd_proc.c
9064ed1
@@ -108,7 +108,7 @@ do_svc_downcall(gss_buffer_desc *out_handle, struct svc_cred *cred,
9064ed1
 	fclose(f);
9064ed1
 	return err;
9064ed1
 out_err:
9064ed1
-	printerr(0, "WARNING: downcall failed\n");
9064ed1
+	printerr(1, "WARNING: downcall failed\n");
9064ed1
 	return -1;
9064ed1
 }
9064ed1
 
9064ed1
@@ -247,7 +247,7 @@ get_ids(gss_name_t client_name, gss_OID mech, struct svc_cred *cred)
9064ed1
 			res = 0;
9064ed1
 			goto out_free;
9064ed1
 		}
9064ed1
-		printerr(0, "WARNING: get_ids: failed to map name '%s' "
9064ed1
+		printerr(1, "WARNING: get_ids: failed to map name '%s' "
9064ed1
 			"to uid/gid: %s\n", sname, strerror(-res));
9064ed1
 		goto out_free;
9064ed1
 	}
9064ed1
@@ -380,7 +380,7 @@ handle_nullreq(FILE *f) {
9064ed1
 		goto continue_needed;
9064ed1
 	}
9064ed1
 	else if (maj_stat != GSS_S_COMPLETE) {
9064ed1
-		printerr(0, "WARNING: gss_accept_sec_context failed\n");
9064ed1
+		printerr(1, "WARNING: gss_accept_sec_context failed\n");
9064ed1
 		pgsserr("handle_nullreq: gss_accept_sec_context",
9064ed1
 			maj_stat, min_stat, mech);
9064ed1
 		goto out_err;