s4-drsuapi: Call security_token_debug() with DBGC_DRS_REPL and a proper log level
authorAndrew Bartlett <abartlet@samba.org>
Mon, 21 May 2018 01:53:01 +0000 (13:53 +1200)
committerJeremy Allison <jra@samba.org>
Mon, 21 May 2018 21:48:18 +0000 (23:48 +0200)
commit8cd905d5751457de35010285793a191d10ecdb04
tree374edf85c726504871bc2b04520b6448318e3dc1
parente1ede0b1ffd128707bb4b5ae271c82cb8e2de26c
s4-drsuapi: Call security_token_debug() with DBGC_DRS_REPL and a proper log level

Selftest logs are full of calls to security_token_debug() with no context
and this is never a log level 0 event, so tidy it up.

The RODC would trigger this each time there is an attempted preload
of a user in the Denied RODC replication group.

Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
source4/rpc_server/drsuapi/dcesrv_drsuapi.c
source4/rpc_server/drsuapi/drsutil.c