auth_cache_escape, &error) < 0 &&
!error_logged) {
error_logged = TRUE;
- i_error("Failed to expand auth cache key %s: %s", key, error);
+ e_error(authdb_event(request),
+ "Failed to expand auth cache key %s: %s", key, error);
}
return str_c(value);
}
master_service_stop(master_service);
}
} else if (sscanf(reply, "%u %lu", &penalty, &last_penalty) != 2) {
- i_error("Invalid PENALTY-GET reply: %s", reply);
+ e_error(request->auth_request->event,
+ "Invalid PENALTY-GET reply: %s", reply);
} else {
if ((time_t)last_penalty > ioloop_time) {
/* time moved backwards? */
/* FIXME: the system_user is for backwards compatibility */
static bool warned = FALSE;
if (!warned) {
- i_warning("userdb: Replace system_user with system_groups_user");
+ e_warning(authdb_event(request),
+ "Replace system_user with system_groups_user");
warned = TRUE;
}
name = "system_groups_user";
str = t_str_new(256);
if (auth_request_var_expand(str, args, request, NULL, &error) <= 0) {
- i_error("Failed to expand checkpassword_path=%s: %s",
+ e_error(authdb_event(request),
+ "Failed to expand checkpassword_path=%s: %s",
args, error);
}
io_remove(&request->io_out);
if (close(request->fd_out) < 0)
- i_error("checkpassword: close() failed: %m");
+ e_error(authdb_event(request->request), "close() failed: %m");
request->fd_out = -1;
}
static void
winbind_helper_connect(const struct auth_settings *set,
- struct winbind_helper *winbind)
+ struct winbind_helper *winbind,
+ struct event *event)
{
int infd[2], outfd[2];
pid_t pid;
return;
if (pipe(infd) < 0) {
- i_error("pipe() failed: %m");
+ e_error(event, "pipe() failed: %m");
return;
}
if (pipe(outfd) < 0) {
pid = fork();
if (pid < 0) {
- i_error("fork() failed: %m");
+ e_error(event, "fork() failed: %m");
i_close_fd(&infd[0]); i_close_fd(&infd[1]);
i_close_fd(&outfd[0]); i_close_fd(&outfd[1]);
return;
struct winbind_auth_request *request =
(struct winbind_auth_request *)auth_request;
- winbind_helper_connect(auth_request->set, request->winbind);
+ winbind_helper_connect(auth_request->set, request->winbind,
+ auth_request->event);
mech_generic_auth_initial(auth_request, data, data_size);
}
}
} else {
result = USERDB_RESULT_INTERNAL_FAILURE;
- i_error("BUG: auth-worker sent invalid user reply");
+ e_error(authdb_event(request),
+ "BUG: auth-worker sent invalid user reply");
args = "";
}
res, TRUE);
while (db_ldap_result_iterate_next(ldap_iter, &name, &values)) {
if (strcmp(name, "user") != 0) {
- i_warning("ldap: iterate: "
+ e_warning(authdb_event(request->auth_request), "iterate: "
"Ignoring field not named 'user': %s", name);
continue;
}
msecs = timeval_diff_msecs(&end_tv, start_tv);
if (msecs >= PASSWD_SLOW_WARN_MSECS) {
- i_warning("passwd: Lookup for %s took %u secs",
+ e_warning(authdb_event(auth_request), "Lookup for %s took %u secs",
auth_request->fields.user, msecs/1000);
return;
}
/* start from beginning */
module->slow_count = module->fast_count = 0;
} else {
- i_warning("passwd: %u%% of last %u lookups took over "
+ e_warning(authdb_event(auth_request),
+ "%u%% of last %u lookups took over "
"%u milliseconds, "
"you may want to set blocking=yes for userdb",
percentage, PASSDB_SLOW_MASTER_WARN_COUNT_INTERVAL,
switch (i_getpwnam(str, &pw)) {
case -1:
- i_error("getpwnam() failed: %m");
+ if (request == NULL)
+ i_error("getpwnam() failed: %m");
+ else
+ e_error(authdb_event(request), "getpwnam() failed: %m");
return (uid_t)-1;
case 0:
if (request != NULL) {