diff options
author | Andrew Bartlett <abartlet@samba.org> | 2018-05-21 13:53:01 +1200 |
---|---|---|
committer | Jeremy Allison <jra@samba.org> | 2018-05-21 23:48:18 +0200 |
commit | 8cd905d5751457de35010285793a191d10ecdb04 (patch) | |
tree | 374edf85c726504871bc2b04520b6448318e3dc1 /source4 | |
parent | e1ede0b1ffd128707bb4b5ae271c82cb8e2de26c (diff) | |
download | samba-8cd905d5751457de35010285793a191d10ecdb04.tar.gz |
s4-drsuapi: Call security_token_debug() with DBGC_DRS_REPL and a proper log level
Selftest logs are full of calls to security_token_debug() with no context
and this is never a log level 0 event, so tidy it up.
The RODC would trigger this each time there is an attempted preload
of a user in the Denied RODC replication group.
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
Diffstat (limited to 'source4')
-rw-r--r-- | source4/rpc_server/drsuapi/dcesrv_drsuapi.c | 3 | ||||
-rw-r--r-- | source4/rpc_server/drsuapi/drsutil.c | 4 |
2 files changed, 4 insertions, 3 deletions
diff --git a/source4/rpc_server/drsuapi/dcesrv_drsuapi.c b/source4/rpc_server/drsuapi/dcesrv_drsuapi.c index 250b4c74c76..eac96a3aa12 100644 --- a/source4/rpc_server/drsuapi/dcesrv_drsuapi.c +++ b/source4/rpc_server/drsuapi/dcesrv_drsuapi.c @@ -1018,7 +1018,8 @@ static WERROR dcesrv_drsuapi_DsReplicaGetInfo(struct dcesrv_call_state *dce_call level = security_session_user_level(dce_call->conn->auth_state.session_info, NULL); if (level < SECURITY_DOMAIN_CONTROLLER) { DEBUG(1,(__location__ ": Administrator access required for DsReplicaGetInfo\n")); - security_token_debug(0, 2, dce_call->conn->auth_state.session_info->security_token); + security_token_debug(DBGC_DRS_REPL, 2, + dce_call->conn->auth_state.session_info->security_token); return WERR_DS_DRA_ACCESS_DENIED; } } diff --git a/source4/rpc_server/drsuapi/drsutil.c b/source4/rpc_server/drsuapi/drsutil.c index 53bcb16bd8e..6fe254ac96c 100644 --- a/source4/rpc_server/drsuapi/drsutil.c +++ b/source4/rpc_server/drsuapi/drsutil.c @@ -107,7 +107,7 @@ WERROR drs_security_level_check(struct dcesrv_call_state *dce_call, if (call) { DEBUG(0,("%s refused for security token (level=%u)\n", call, (unsigned)level)); - security_token_debug(0, 2, dce_call->conn->auth_state.session_info->security_token); + security_token_debug(DBGC_DRS_REPL, 2, dce_call->conn->auth_state.session_info->security_token); } return WERR_DS_DRA_ACCESS_DENIED; } @@ -170,7 +170,7 @@ static WERROR drs_security_access_check_log(struct ldb_context *sam_ctx, if (ret == LDB_ERR_INSUFFICIENT_ACCESS_RIGHTS) { DEBUG(3,("%s refused for security token on %s\n", ext_right, ldb_dn_get_linearized(dn))); - security_token_debug(2, 0, token); + security_token_debug(DBGC_DRS_REPL, 3, token); return WERR_DS_DRA_ACCESS_DENIED; } else if (ret != LDB_SUCCESS) { DEBUG(1,("Failed to perform access check on %s: %s\n", ldb_dn_get_linearized(dn), ldb_strerror(ret))); |