sssd/0012-Always-use-positional-arguments-in-translatable-stri.patch
Stephen Gallagher 359d341a35 Fix several regressions since 1.5.x
- Ensure that the RPM creates the /var/lib/sss/mc directory
- Add support for Netscape password warning expiration control
- Rebuild against libldb 1.1.6
2012-05-24 08:23:25 -04:00

265 lines
12 KiB
Diff

From 56f1f51468005df27198c51acc203e2fe00312f8 Mon Sep 17 00:00:00 2001
From: Stephen Gallagher <sgallagh@redhat.com>
Date: Thu, 17 May 2012 13:54:29 -0400
Subject: [PATCH 12/19] Always use positional arguments in translatable
strings
https://fedorahosted.org/sssd/ticket/1336
---
src/sss_client/pam_sss.c | 4 ++--
src/tools/sss_cache.c | 10 +++++-----
src/tools/sss_groupdel.c | 2 +-
src/tools/sss_groupmod.c | 4 ++--
src/tools/sss_groupshow.c | 10 +++++-----
src/tools/sss_useradd.c | 6 +++---
src/tools/sss_userdel.c | 8 ++++----
src/tools/sss_usermod.c | 4 ++--
src/tools/tools_util.h | 2 +-
9 files changed, 25 insertions(+), 25 deletions(-)
diff --git a/src/sss_client/pam_sss.c b/src/sss_client/pam_sss.c
index e25792fc012c587e2ffc804057a2b43ec6b90068..9dca7e3c7b2f773abf08d5127d63b0bfc52ed06e 100644
--- a/src/sss_client/pam_sss.c
+++ b/src/sss_client/pam_sss.c
@@ -637,7 +637,7 @@ static int user_info_grace_login(pam_handle_t *pamh,
memcpy(&grace, buf + sizeof(uint32_t), sizeof(uint32_t));
ret = snprintf(user_msg, sizeof(user_msg),
_("Your password has expired. "
- "You have %d grace login(s) remaining."),
+ "You have %1$d grace login(s) remaining."),
grace);
if (ret < 0 || ret >= sizeof(user_msg)) {
D(("snprintf failed."));
@@ -682,7 +682,7 @@ static int user_info_expire_warn(pam_handle_t *pamh,
}
ret = snprintf(user_msg, sizeof(user_msg),
- _("Your password will expire in %d %s."), expire, unit);
+ _("Your password will expire in %1$d %2$s."), expire, unit);
if (ret < 0 || ret >= sizeof(user_msg)) {
D(("snprintf failed."));
return PAM_SYSTEM_ERR;
diff --git a/src/tools/sss_cache.c b/src/tools/sss_cache.c
index d0f2b28714140a068ed43d22e0b0bf75feb804e3..1b2b29fe774b58bc15bf51ec0560a681382bc66d 100644
--- a/src/tools/sss_cache.c
+++ b/src/tools/sss_cache.c
@@ -169,10 +169,10 @@ bool invalidate_entries(TALLOC_CTX *ctx, struct sysdb_ctx *sysdb,
("Searching for %s with filter %s failed\n",
type_rec.type_string, filter));
if (name) {
- ERROR("No such %s named %s, skipping\n",
+ ERROR("No such %1$s named %2$s, skipping\n",
type_rec.type_string, name);
} else {
- ERROR("No objects of type %s in the cache, skipping\n",
+ ERROR("No objects of type %1$s in the cache, skipping\n",
type_rec.type_string);
}
return false;
@@ -184,14 +184,14 @@ bool invalidate_entries(TALLOC_CTX *ctx, struct sysdb_ctx *sysdb,
if (c_name == NULL) {
DEBUG(SSSDBG_MINOR_FAILURE,
("Something bad happened, can't find attribute %s", SYSDB_NAME));
- ERROR("Couldn't invalidate %s", type_rec.type_string);
+ ERROR("Couldn't invalidate %1$s", type_rec.type_string);
iret = false;
} else {
ret = invalidate_entry(ctx, sysdb, c_name, entry_type);
if (ret != EOK) {
DEBUG(SSSDBG_MINOR_FAILURE,
("Couldn't invalidate %s %s", type_rec.type_string, c_name));
- ERROR("Couldn't invalidate %s %s", type_rec.type_string, c_name);
+ ERROR("Couldn't invalidate %1$s %2$s", type_rec.type_string, c_name);
iret = false;
}
}
@@ -452,7 +452,7 @@ errno_t init_context(int argc, const char *argv[], struct cache_tool_ctx **tctx)
ret = init_domains(ctx, domain);
if (ret != EOK) {
if (domain) {
- ERROR("Could not open domain %s\n", domain);
+ ERROR("Could not open domain %1$s\n", domain);
} else {
ERROR("Could not open available domains\n");
}
diff --git a/src/tools/sss_groupdel.c b/src/tools/sss_groupdel.c
index 09f73504df9039a38879ba16e7d8628741176ec8..70030cab4f38b89cfbb61d896a04903eeac311f0 100644
--- a/src/tools/sss_groupdel.c
+++ b/src/tools/sss_groupdel.c
@@ -98,7 +98,7 @@ int main(int argc, const char **argv)
if ((tctx->octx->gid < tctx->local->id_min) ||
(tctx->local->id_max && tctx->octx->gid > tctx->local->id_max)) {
- ERROR("Group %s is outside the defined ID range for domain\n",
+ ERROR("Group %1$s is outside the defined ID range for domain\n",
tctx->octx->name);
ret = EXIT_FAILURE;
goto fini;
diff --git a/src/tools/sss_groupmod.c b/src/tools/sss_groupmod.c
index 47134aedf78354aa1107cf30e01fc1fcbe2abc4f..abab4f57f644215e130b787a176bf4b9a72d9e44 100644
--- a/src/tools/sss_groupmod.c
+++ b/src/tools/sss_groupmod.c
@@ -152,7 +152,7 @@ int main(int argc, const char **argv)
/* Check group names in the LOCAL domain */
ret = check_group_names(tctx, tctx->octx->addgroups, &badgroup);
if (ret != EOK) {
- ERROR("Cannot find group %s in local domain, "
+ ERROR("Cannot find group %1$s in local domain, "
"only groups in local domain are allowed\n", badgroup);
ret = EXIT_FAILURE;
goto fini;
@@ -179,7 +179,7 @@ int main(int argc, const char **argv)
/* Check group names in the LOCAL domain */
ret = check_group_names(tctx, tctx->octx->rmgroups, &badgroup);
if (ret != EOK) {
- ERROR("Cannot find group %s in local domain, "
+ ERROR("Cannot find group %1$s in local domain, "
"only groups in local domain are allowed\n", badgroup);
ret = EXIT_FAILURE;
goto fini;
diff --git a/src/tools/sss_groupshow.c b/src/tools/sss_groupshow.c
index 764e32416b046dfc6ff2a47de37627e40b0109f0..0eecd3a9671c1aae5ced8e8fa35f4ab6a3310075 100644
--- a/src/tools/sss_groupshow.c
+++ b/src/tools/sss_groupshow.c
@@ -559,26 +559,26 @@ static void print_group_info(struct group_info *g, int level)
snprintf(fmt, 8, "%%%ds", level*PADDING_SPACES);
snprintf(padding, 512, fmt, "");
- printf(_("%s%sGroup: %s\n"), padding,
+ printf(_("%1$s%2$sGroup: %3$s\n"), padding,
g->mpg ? _("Magic Private ") : "",
g->name);
- printf(_("%sGID number: %d\n"), padding, g->gid);
+ printf(_("%1$sGID number: %2$d\n"), padding, g->gid);
- printf(_("%sMember users: "), padding);
+ printf(_("%1$sMember users: "), padding);
if (g->user_members) {
for (i=0; g->user_members[i]; ++i) {
printf("%s%s", i>0 ? "," : "",
g->user_members[i]);
}
}
- printf(_("\n%sIs a member of: "), padding);
+ printf(_("\n%1$sIs a member of: "), padding);
if (g->memberofs) {
for (i=0; g->memberofs[i]; ++i) {
printf("%s%s", i>0 ? "," : "",
g->memberofs[i]);
}
}
- printf(_("\n%sMember groups: "), padding);
+ printf(_("\n%1$sMember groups: "), padding);
}
static void print_recursive(struct group_info **group_members, int level)
diff --git a/src/tools/sss_useradd.c b/src/tools/sss_useradd.c
index 5ca2612a351bb060f172434ace3bce9c7e022a1d..4df7c098e554d4b8c924961305f35492bfba3807 100644
--- a/src/tools/sss_useradd.c
+++ b/src/tools/sss_useradd.c
@@ -150,7 +150,7 @@ int main(int argc, const char **argv)
/* Check group names in the LOCAL domain */
ret = check_group_names(tctx, tctx->octx->addgroups, &badgroup);
if (ret != EOK) {
- ERROR("Cannot find group %s in local domain\n", badgroup);
+ ERROR("Cannot find group %1$s in local domain\n", badgroup);
ret = EXIT_FAILURE;
goto fini;
}
@@ -229,7 +229,7 @@ int main(int argc, const char **argv)
ERROR("User's home directory already exists, not copying "
"data from skeldir\n");
} else if (ret != EOK) {
- ERROR("Cannot create user's home directory: %s\n", strerror(ret));
+ ERROR("Cannot create user's home directory: %1$s\n", strerror(ret));
ret = EXIT_FAILURE;
goto fini;
}
@@ -240,7 +240,7 @@ int main(int argc, const char **argv)
tctx->octx->uid,
tctx->octx->gid);
if (ret != EOK) {
- ERROR("Cannot create user's mail spool: %s\n", strerror(ret));
+ ERROR("Cannot create user's mail spool: %1$s\n", strerror(ret));
DEBUG(1, ("Cannot create user's mail spool: [%d][%s].\n",
ret, strerror(ret)));
ret = EXIT_FAILURE;
diff --git a/src/tools/sss_userdel.c b/src/tools/sss_userdel.c
index 6d5e8295877afee3106e2a9d978504697f870d46..0d1c63e4ce58544775ae28041c65443ac054ee0d 100644
--- a/src/tools/sss_userdel.c
+++ b/src/tools/sss_userdel.c
@@ -227,7 +227,7 @@ int main(int argc, const char **argv)
if ((tctx->octx->uid < tctx->local->id_min) ||
(tctx->local->id_max && tctx->octx->uid > tctx->local->id_max)) {
- ERROR("User %s is outside the defined ID range for domain\n",
+ ERROR("User %1$s is outside the defined ID range for domain\n",
tctx->octx->name);
ret = EXIT_FAILURE;
goto fini;
@@ -264,7 +264,7 @@ int main(int argc, const char **argv)
break;
case EOK:
- ERROR("WARNING: The user (uid %lu) was still logged in when "
+ ERROR("WARNING: The user (uid %1$lu) was still logged in when "
"deleted.\n", (unsigned long) tctx->octx->uid);
break;
@@ -281,7 +281,7 @@ int main(int argc, const char **argv)
ret = run_userdel_cmd(tctx);
if (ret != EOK) {
- ERROR("The post-delete command failed: %s\n", strerror(ret));
+ ERROR("The post-delete command failed: %1$s\n", strerror(ret));
goto fini;
}
@@ -295,7 +295,7 @@ int main(int argc, const char **argv)
if (ret == EPERM) {
ERROR("Not removing home dir - not owned by user\n");
} else if (ret != EOK) {
- ERROR("Cannot remove homedir: %s\n", strerror(ret));
+ ERROR("Cannot remove homedir: %1$s\n", strerror(ret));
ret = EXIT_FAILURE;
goto fini;
}
diff --git a/src/tools/sss_usermod.c b/src/tools/sss_usermod.c
index dfcde9e56c632b6ddee0ec5cf375258c713ac360..b761de225de5842624d8f888bb0d7053617eb37d 100644
--- a/src/tools/sss_usermod.c
+++ b/src/tools/sss_usermod.c
@@ -173,7 +173,7 @@ int main(int argc, const char **argv)
/* Check group names in the LOCAL domain */
ret = check_group_names(tctx, tctx->octx->addgroups, &badgroup);
if (ret != EOK) {
- ERROR("Cannot find group %s in local domain, "
+ ERROR("Cannot find group %1$s in local domain, "
"only groups in local domain are allowed\n", badgroup);
ret = EXIT_FAILURE;
goto fini;
@@ -200,7 +200,7 @@ int main(int argc, const char **argv)
/* Check group names in the LOCAL domain */
ret = check_group_names(tctx, tctx->octx->rmgroups, &badgroup);
if (ret != EOK) {
- ERROR("Cannot find group %s in local domain, "
+ ERROR("Cannot find group %1$s in local domain, "
"only groups in local domain are allowed\n", badgroup);
ret = EXIT_FAILURE;
goto fini;
diff --git a/src/tools/tools_util.h b/src/tools/tools_util.h
index fccd9d96bdc293f85d4af2ebcb0756a1fcc940cc..fd26b89056cf16b974102b5163e7ee76608a2d2e 100644
--- a/src/tools/tools_util.h
+++ b/src/tools/tools_util.h
@@ -37,7 +37,7 @@
val = getuid(); \
if (val != 0) { \
DEBUG(1, ("Running under %d, must be root\n", val)); \
- ERROR("%s must be run as root\n", prg_name); \
+ ERROR("%1$s must be run as root\n", prg_name); \
val = EXIT_FAILURE; \
goto fini; \
} \
--
1.7.10.1