diff options
author | Jakub Hrozek <jhrozek@redhat.com> | 2012-06-11 14:35:35 +0200 |
---|---|---|
committer | Stephen Gallagher <sgallagh@redhat.com> | 2012-06-14 15:52:29 -0400 |
commit | 95cc3f4be93d3cb5bb28bb3787f0aace4edb3124 (patch) | |
tree | fb607e88111eba1618dc93880fea2cb2fe8da6c3 /src/providers/krb5 | |
parent | 9a3ba9ca00e73adc3fb17ce8afa532076768023b (diff) | |
download | sssd-95cc3f4be93d3cb5bb28bb3787f0aace4edb3124.tar.gz sssd-95cc3f4be93d3cb5bb28bb3787f0aace4edb3124.tar.bz2 sssd-95cc3f4be93d3cb5bb28bb3787f0aace4edb3124.zip |
Use Kerberos context in KRB5_DEBUG
Passing Kerberos context to sss_krb5_get_error_message will allow us to
get better error messages.
Diffstat (limited to 'src/providers/krb5')
-rw-r--r-- | src/providers/krb5/krb5_child.c | 85 | ||||
-rw-r--r-- | src/providers/krb5/krb5_utils.c | 31 |
2 files changed, 61 insertions, 55 deletions
diff --git a/src/providers/krb5/krb5_child.c b/src/providers/krb5/krb5_child.c index 6b8722a8..bfec956b 100644 --- a/src/providers/krb5/krb5_child.c +++ b/src/providers/krb5/krb5_child.c @@ -99,13 +99,7 @@ struct krb5_req { }; static krb5_context krb5_error_ctx; -static const char *__krb5_error_msg; -#define KRB5_DEBUG(level, krb5_error) do { \ - __krb5_error_msg = sss_krb5_get_error_message(krb5_error_ctx, krb5_error); \ - DEBUG(level, ("%d: [%d][%s]\n", __LINE__, krb5_error, __krb5_error_msg)); \ - sss_log(SSS_LOG_ERR, "%s", __krb5_error_msg); \ - sss_krb5_free_error_message(krb5_error_ctx, __krb5_error_msg); \ -} while(0) +#define KRB5_CHILD_DEBUG(level, error) KRB5_DEBUG(level, krb5_error_ctx, error) static void sss_krb5_expire_callback_func(krb5_context context, void *data, krb5_timestamp password_expiration, @@ -230,14 +224,14 @@ store_creds_in_ccache(krb5_context ctx, krb5_principal princ, kerr = krb5_cc_initialize(ctx, cc, princ); if (kerr != 0) { - KRB5_DEBUG(SSSDBG_OP_FAILURE, kerr); + KRB5_CHILD_DEBUG(SSSDBG_OP_FAILURE, kerr); goto done; } if (creds == NULL) { kerr = create_empty_cred(ctx, princ, &l_cred); if (kerr != 0) { - KRB5_DEBUG(SSSDBG_OP_FAILURE, kerr); + KRB5_CHILD_DEBUG(SSSDBG_OP_FAILURE, kerr); goto done; } } else { @@ -246,19 +240,19 @@ store_creds_in_ccache(krb5_context ctx, krb5_principal princ, kerr = krb5_cc_store_cred(ctx, cc, l_cred); if (kerr != 0) { - KRB5_DEBUG(SSSDBG_OP_FAILURE, kerr); + KRB5_CHILD_DEBUG(SSSDBG_OP_FAILURE, kerr); goto done; } kerr = krb5_cc_switch(ctx, cc); if (kerr != 0) { - KRB5_DEBUG(SSSDBG_OP_FAILURE, kerr); + KRB5_CHILD_DEBUG(SSSDBG_OP_FAILURE, kerr); goto done; } kerr = krb5_cc_close(ctx, cc); if (kerr != 0) { - KRB5_DEBUG(SSSDBG_OP_FAILURE, kerr); + KRB5_CHILD_DEBUG(SSSDBG_OP_FAILURE, kerr); goto done; } @@ -325,7 +319,7 @@ static krb5_error_code create_ccache_file(krb5_context ctx, kerr = krb5_cc_resolve(ctx, tmp_ccname, &tmp_cc); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto done; } @@ -335,7 +329,7 @@ static krb5_error_code create_ccache_file(krb5_context ctx, fd = -1; } if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto done; } @@ -451,7 +445,7 @@ create_ccache_in_dir(uid_t uid, gid_t gid, */ kerr = krb5_cc_resolve(ctx, ccname, &tmp_cc); if (kerr != 0) { - KRB5_DEBUG(SSSDBG_OP_FAILURE, kerr); + KRB5_CHILD_DEBUG(SSSDBG_OP_FAILURE, kerr); goto done; } } else if (dirname[0] == '/') { @@ -469,13 +463,13 @@ create_ccache_in_dir(uid_t uid, gid_t gid, kerr = krb5_cc_set_default_name(ctx, ccname); if (kerr != 0) { - KRB5_DEBUG(SSSDBG_OP_FAILURE, kerr); + KRB5_CHILD_DEBUG(SSSDBG_OP_FAILURE, kerr); goto done; } kerr = krb5_cc_new_unique(ctx, "DIR", NULL, &tmp_cc); if (kerr != 0) { - KRB5_DEBUG(SSSDBG_OP_FAILURE, kerr); + KRB5_CHILD_DEBUG(SSSDBG_OP_FAILURE, kerr); goto done; } } else { @@ -486,7 +480,7 @@ create_ccache_in_dir(uid_t uid, gid_t gid, kerr = store_creds_in_ccache(ctx, princ, tmp_cc, creds); if (kerr != 0) { - KRB5_DEBUG(SSSDBG_OP_FAILURE, kerr); + KRB5_CHILD_DEBUG(SSSDBG_OP_FAILURE, kerr); goto done; } @@ -832,14 +826,14 @@ static krb5_error_code get_and_save_tgt_with_keytab(krb5_context ctx, kerr = krb5_get_init_creds_keytab(ctx, &creds, princ, keytab, 0, NULL, &options); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); return kerr; } /* Use the updated principal in the creds in case canonicalized */ kerr = create_ccache_file(ctx, creds.client, ccname, &creds); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto done; } kerr = 0; @@ -862,21 +856,21 @@ static krb5_error_code get_and_save_tgt(struct krb5_req *kr, sss_krb5_expire_callback_func, kr); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); DEBUG(1, ("Failed to set expire callback, continue without.\n")); } kerr = krb5_get_init_creds_password(kr->ctx, kr->creds, kr->princ, password, sss_krb5_prompter, kr, 0, NULL, kr->options); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); return kerr; } if (kr->validate) { kerr = validate_tgt(kr); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); return kerr; } @@ -900,7 +894,7 @@ static krb5_error_code get_and_save_tgt(struct krb5_req *kr, kr->creds ? kr->creds->client : kr->princ, kr->ccname, kr->creds); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto done; } @@ -970,7 +964,7 @@ static errno_t changepw_child(int fd, struct krb5_req *kr) changepw_princ, kr->options); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); if (kerr == KRB5_KDC_UNREACH) { pam_status = PAM_AUTHINFO_UNAVAIL; } @@ -1010,7 +1004,7 @@ static errno_t changepw_child(int fd, struct krb5_req *kr) if (kerr != 0 || result_code != 0) { if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); } else { kerr = KRB5KRB_ERR_GENERIC; } @@ -1062,7 +1056,7 @@ static errno_t changepw_child(int fd, struct krb5_req *kr) memset(kr->pd->newauthtok, 0, kr->pd->newauthtok_size); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); if (kerr == KRB5_KDC_UNREACH) { pam_status = PAM_AUTHINFO_UNAVAIL; } @@ -1124,7 +1118,7 @@ static errno_t tgt_req_child(int fd, struct krb5_req *kr) kr->options, NULL, NULL); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); DEBUG(1, ("Failed to unset expire callback, continue ...\n")); } kerr = krb5_get_init_creds_password(kr->ctx, kr->creds, kr->princ, @@ -1142,7 +1136,7 @@ static errno_t tgt_req_child(int fd, struct krb5_req *kr) memset(kr->pd->authtok, 0, kr->pd->authtok_size); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); switch (kerr) { case KRB5_KDC_UNREACH: pam_status = PAM_AUTHINFO_UNAVAIL; @@ -1230,13 +1224,13 @@ static errno_t renew_tgt_child(int fd, struct krb5_req *kr) kerr = krb5_cc_resolve(kr->ctx, ccname, &ccache); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto done; } kerr = krb5_get_renewed_creds(kr->ctx, kr->creds, kr->princ, ccache, NULL); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); if (kerr == KRB5_KDC_UNREACH) { status = PAM_AUTHINFO_UNAVAIL; DEBUG(SSSDBG_TRACE_ALL, ("kdc unreachable for renewed creds.\n")); @@ -1247,7 +1241,7 @@ static errno_t renew_tgt_child(int fd, struct krb5_req *kr) if (kr->validate) { kerr = validate_tgt(kr); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto done; } @@ -1269,13 +1263,13 @@ static errno_t renew_tgt_child(int fd, struct krb5_req *kr) kerr = krb5_cc_initialize(kr->ctx, ccache, kr->princ); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto done; } kerr = krb5_cc_store_cred(kr->ctx, ccache, kr->creds); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto done; } @@ -1312,7 +1306,7 @@ static errno_t create_empty_ccache(int fd, struct krb5_req *kr) ret = create_ccache(kr->uid, kr->gid, kr->ctx, kr->princ, kr->ccname, NULL); if (ret != 0) { - KRB5_DEBUG(1, ret); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, ret); pam_status = PAM_SYSTEM_ERR; } @@ -1649,19 +1643,20 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) kerr = krb5_init_context(&kr->ctx); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } + krb5_error_ctx = kr->ctx; kerr = krb5_parse_name(kr->ctx, kr->upn, &kr->princ); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } kerr = krb5_unparse_name(kr->ctx, kr->princ, &kr->name); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } @@ -1674,7 +1669,7 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) kerr = sss_krb5_get_init_creds_opt_alloc(kr->ctx, &kr->options); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } @@ -1684,7 +1679,7 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) * but shall return KRB5KDC_ERR_KEY_EXP. */ krb5_get_init_creds_opt_set_change_password_prompt(kr->options, 0); if (kerr != 0) { - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } #endif @@ -1698,7 +1693,7 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) if (kerr != 0) { DEBUG(1, ("krb5_string_to_deltat failed for [%s].\n", lifetime_str)); - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } DEBUG(SSSDBG_CONF_SETTINGS, ("%s is set to [%s]\n", @@ -1715,7 +1710,7 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) if (kerr != 0) { DEBUG(1, ("krb5_string_to_deltat failed for [%s].\n", lifetime_str)); - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } DEBUG(SSSDBG_CONF_SETTINGS, @@ -1772,7 +1767,7 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) kr, &kr->fast_ccname); if (kerr != 0) { DEBUG(1, ("check_fast_ccache failed.\n")); - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } @@ -1782,7 +1777,7 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) if (kerr != 0) { DEBUG(1, ("sss_krb5_get_init_creds_opt_set_fast_ccache_name " "failed.\n")); - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } @@ -1793,7 +1788,7 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) if (kerr != 0) { DEBUG(1, ("sss_krb5_get_init_creds_opt_set_fast_flags " "failed.\n")); - KRB5_DEBUG(1, kerr); + KRB5_CHILD_DEBUG(SSSDBG_CRIT_FAILURE, kerr); goto failed; } } diff --git a/src/providers/krb5/krb5_utils.c b/src/providers/krb5/krb5_utils.c index 35ece811..e6987014 100644 --- a/src/providers/krb5/krb5_utils.c +++ b/src/providers/krb5/krb5_utils.c @@ -439,7 +439,8 @@ errno_t get_ccache_file_data(const char *ccache_file, const char *client_name, kerr = krb5_parse_name(ctx, client_name, &client_princ); if (kerr != 0) { - DEBUG(1, ("krb5_parse_name failed.\n")); + KRB5_DEBUG(SSSDBG_OP_FAILURE, ctx, kerr); + DEBUG(SSSDBG_CRIT_FAILURE, ("krb5_parse_name failed.\n")); goto done; } @@ -457,13 +458,15 @@ errno_t get_ccache_file_data(const char *ccache_file, const char *client_name, kerr = krb5_parse_name(ctx, server_name, &server_princ); talloc_free(server_name); if (kerr != 0) { - DEBUG(1, ("krb5_parse_name failed.\n")); + KRB5_DEBUG(SSSDBG_OP_FAILURE, ctx, kerr); + DEBUG(SSSDBG_CRIT_FAILURE, ("krb5_parse_name failed.\n")); goto done; } kerr = krb5_cc_resolve(ctx, ccache_file, &cc); if (kerr != 0) { - DEBUG(1, ("krb5_cc_resolve failed.\n")); + KRB5_DEBUG(SSSDBG_OP_FAILURE, ctx, kerr); + DEBUG(SSSDBG_CRIT_FAILURE, ("krb5_cc_resolve failed.\n")); goto done; } @@ -475,7 +478,8 @@ errno_t get_ccache_file_data(const char *ccache_file, const char *client_name, kerr = krb5_cc_retrieve_cred(ctx, cc, 0, &mcred, &cred); if (kerr != 0) { - DEBUG(1, ("krb5_cc_retrieve_cred failed.\n")); + KRB5_DEBUG(SSSDBG_OP_FAILURE, ctx, kerr); + DEBUG(SSSDBG_CRIT_FAILURE, ("krb5_cc_retrieve_cred failed.\n")); goto done; } @@ -488,7 +492,8 @@ errno_t get_ccache_file_data(const char *ccache_file, const char *client_name, kerr = krb5_cc_close(ctx, cc); if (kerr != 0) { - DEBUG(1, ("krb5_cc_close failed.\n")); + KRB5_DEBUG(SSSDBG_OP_FAILURE, ctx, kerr); + DEBUG(SSSDBG_CRIT_FAILURE, ("krb5_cc_close failed.\n")); goto done; } cc = NULL; @@ -705,6 +710,7 @@ cc_file_check_existing(const char *location, uid_t uid, kerr = krb5_cc_resolve(context, location, &ccache); if (kerr != 0) { + KRB5_DEBUG(SSSDBG_OP_FAILURE, context, kerr); krb5_free_context(context); DEBUG(SSSDBG_CRIT_FAILURE, ("krb5_cc_resolve failed.\n")); return EIO; @@ -714,7 +720,8 @@ cc_file_check_existing(const char *location, uid_t uid, krb5_free_context(context); krb5_cc_close(context, ccache); if (kerr != EOK) { - DEBUG(SSSDBG_OP_FAILURE, + KRB5_DEBUG(SSSDBG_OP_FAILURE, context, kerr); + DEBUG(SSSDBG_CRIT_FAILURE, ("Could not check if ccache contains a valid principal\n")); return EIO; } @@ -794,13 +801,15 @@ get_ccache_for_princ(krb5_context context, const char *location, krberr = krb5_cc_set_default_name(context, location); if (krberr != 0) { - DEBUG(SSSDBG_OP_FAILURE, ("krb5_cc_resolve failed.\n")); + KRB5_DEBUG(SSSDBG_OP_FAILURE, context, krberr); + DEBUG(SSSDBG_CRIT_FAILURE, ("krb5_cc_resolve failed.\n")); return krberr; } krberr = krb5_parse_name(context, princ, &client_principal); if (krberr != 0) { - DEBUG(SSSDBG_OP_FAILURE, ("krb5_parse_name failed.\n")); + KRB5_DEBUG(SSSDBG_OP_FAILURE, context, krberr); + DEBUG(SSSDBG_CRIT_FAILURE, ("krb5_parse_name failed.\n")); return krberr; } @@ -857,7 +866,7 @@ cc_dir_check_existing(const char *location, uid_t uid, ret = cc_residual_is_used(uid, dir, SSS_KRB5_TYPE_DIR, &active); talloc_free(tmp); if (ret != EOK) { - DEBUG(SSSDBG_OP_FAILURE, ("Could not check if ccache is active\n")); + DEBUG(SSSDBG_CRIT_FAILURE, ("Could not check if ccache is active\n")); return ret; } @@ -887,6 +896,7 @@ cc_dir_check_existing(const char *location, uid_t uid, krberr = check_for_valid_tgt(context, ccache, realm, princ, &valid); if (krberr != EOK) { + KRB5_DEBUG(SSSDBG_OP_FAILURE, context, krberr); DEBUG(SSSDBG_CRIT_FAILURE, ("Could not check if ccache contains a valid principal\n")); ret = EIO; @@ -942,7 +952,8 @@ cc_dir_cache_for_princ(TALLOC_CTX *mem_ctx, const char *location, if (ccache) krb5_cc_close(context, ccache); krb5_free_context(context); if (krberr) { - DEBUG(SSSDBG_TRACE_FUNC, ("Could not get full name of ccache\n")); + KRB5_DEBUG(SSSDBG_OP_FAILURE, context, krberr); + DEBUG(SSSDBG_CRIT_FAILURE, ("Could not get full name of ccache\n")); return NULL; } |