auth_policy_json_template,
context->request, var_table,
auth_policy_escape_function,
- &error) <= 0) {
+ &error) < 0) {
e_error(context->event,
"Failed to expand auth policy template: %s", error);
}
user, &count);
if (auth_request_var_expand_with_table(dest,
set->username_format, request,
- table, NULL, &error) <= 0) {
+ table, NULL, &error) < 0) {
*error_r = t_strdup_printf(
"Failed to expand username_format=%s: %s",
set->username_format, error);
.event = auth_request->event,
};
- return var_expand_new(dest, str, ¶ms, error_r) < 0 ? -1 : 1;
+ return var_expand_new(dest, str, ¶ms, error_r);
}
int t_auth_request_var_expand(const char *str,
int ret = auth_request_var_expand(dest, str, auth_request,
escape_func, error_r);
*value_r = str_c(dest);
- return ret < 0 ? ret : 1;
+ return ret;
}
static void
path = t_str_new(256);
if (auth_request_var_expand(path, path_template, request,
- NULL, &error) <= 0) {
+ NULL, &error) < 0) {
e_error(authdb_event(request),
"Failed to expand uidgid_file=%s: %s",
path_template, error);
const char **value_r, const char **error_r)
{
const char *error;
- if (t_auth_request_var_expand(tpl, req, NULL, value_r, &error) <= 0) {
+ if (t_auth_request_var_expand(tpl, req, NULL, value_r, &error) < 0) {
*error_r = t_strdup_printf("var_expand(%s) failed: %s",
tpl, error);
return -1;
username = t_str_new(256);
if (auth_request_var_expand(username, username_format, request,
- auth_request_str_escape, &error) <= 0) {
+ auth_request_str_escape, &error) < 0) {
e_error(authdb_event(request),
"Failed to expand username_format=%s: %s",
username_format, error);
key = t_strdup_until(fields[i], value);
str_truncate(str, 0);
if (auth_request_var_expand_with_table(str, value + 1,
- request, table, NULL, &error) <= 0) {
+ request, table, NULL, &error) < 0) {
e_error(authdb_event(request),
"Failed to expand extra field %s: %s",
fields[i], error);
"%{passdb:pkey2}\n%{passdb:pkey2 | default('default2')}\n"
"%{passdb:pkey3|default}\n%{passdb:pkey3 | default('default3')}\n"
"%{passdb:ukey1|default}\n%{passdb:ukey1 | default('default4')}\n",
- &test_request, test_escape, &value, &error) == 1);
+ &test_request, test_escape, &value, &error) == 0);
test_assert_strcmp(value, "+pval1\n+pval1\n\ndefault2\n\ndefault3\n\ndefault4\n");
test_assert(t_auth_request_var_expand(
"%{userdb:ukey2}\n%{userdb:ukey2 | default('default2')}\n"
"%{userdb:ukey3|default}\n%{userdb:ukey3 | default('default3')}\n"
"%{userdb:pkey1|default}\n%{userdb:pkey1 | default('default4')}\n",
- &test_request, test_escape, &value, &error) == 1);
+ &test_request, test_escape, &value, &error) == 0);
test_assert_strcmp(value, "+uval1\n+uval1\n\ndefault2\n\ndefault3\n\ndefault4\n");
pool_unref(&pool);
test_end();
key = t_strdup_until(key, value);
str_truncate(str, 0);
if (auth_request_var_expand_with_table(str, value + 1,
- request, table, NULL, &error) <= 0) {
+ request, table, NULL, &error) < 0) {
e_error(authdb_event(request),
"Failed to expand extra field %s: %s",
fields[i], error);