[libvirt] [PATCH] 7/8 conver the remaining modules from qemud

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



  Rename of the macros where available, or remapping of the qemudLog
to the new macros.

Daniel

-- 
Daniel Veillard      | libxml Gnome XML XSLT toolkit  http://xmlsoft.org/
daniel@xxxxxxxxxxxx  | Rpmfind RPM search engine http://rpmfind.net/
http://veillard.com/ | virtualization library  http://libvirt.org/
Index: qemud/event.c
===================================================================
RCS file: /data/cvs/libxen/qemud/event.c,v
retrieving revision 1.16
diff -u -r1.16 event.c
--- qemud/event.c	4 Dec 2008 22:14:15 -0000	1.16
+++ qemud/event.c	17 Dec 2008 14:25:56 -0000
@@ -35,7 +35,7 @@
 #include "memory.h"
 #include "util.h"
 
-#define EVENT_DEBUG(fmt, ...) qemudDebug("EVENT: " fmt, __VA_ARGS__)
+#define EVENT_DEBUG(fmt, ...) VIR_DEBUG("event", fmt, __VA_ARGS__)
 
 static int virEventInterruptLocked(void);
 
Index: qemud/mdns.c
===================================================================
RCS file: /data/cvs/libxen/qemud/mdns.c,v
retrieving revision 1.12
diff -u -r1.12 mdns.c
--- qemud/mdns.c	19 Nov 2008 16:24:01 -0000	1.12
+++ qemud/mdns.c	17 Dec 2008 14:25:56 -0000
@@ -44,7 +44,7 @@
 #include "remote_internal.h"
 #include "memory.h"
 
-#define AVAHI_DEBUG(fmt, ...) qemudDebug("AVAHI: " fmt, __VA_ARGS__)
+#define AVAHI_DEBUG(fmt, ...) VIR_DEBUG("avahi", fmt, __VA_ARGS__)
 
 struct libvirtd_mdns_entry {
     char *type;
Index: qemud/remote.c
===================================================================
RCS file: /data/cvs/libxen/qemud/remote.c,v
retrieving revision 1.52
diff -u -r1.52 remote.c
--- qemud/remote.c	4 Dec 2008 22:16:40 -0000	1.52
+++ qemud/remote.c	17 Dec 2008 14:25:57 -0000
@@ -53,7 +53,7 @@
 #include "qemud.h"
 #include "memory.h"
 
-#define REMOTE_DEBUG(fmt,...) qemudDebug("REMOTE: " fmt, __VA_ARGS__)
+#define REMOTE_DEBUG(fmt, ...) VIR_DEBUG("remote", fmt, __VA_ARGS__)
 
 static void remoteDispatchFormatError (remote_error *rerr,
                                        const char *fmt, ...)
@@ -2543,7 +2543,7 @@
     REMOTE_DEBUG("Initialize SASL auth %d", client->fd);
     if (client->auth != REMOTE_AUTH_SASL ||
         client->saslconn != NULL) {
-        qemudLog(QEMUD_ERR, "%s", _("client tried invalid SASL init request"));
+        ERROR0(_("client tried invalid SASL init request"));
         goto authfail;
     }
 
@@ -2583,7 +2583,7 @@
     VIR_FREE(localAddr);
     VIR_FREE(remoteAddr);
     if (err != SASL_OK) {
-        qemudLog(QEMUD_ERR, _("sasl context setup failed %d (%s)"),
+        ERROR(_("sasl context setup failed %d (%s)"),
                  err, sasl_errstring(err, NULL, NULL));
         client->saslconn = NULL;
         goto authfail;
@@ -2596,7 +2596,7 @@
 
         cipher = gnutls_cipher_get(client->tlssession);
         if (!(ssf = (sasl_ssf_t)gnutls_cipher_get_key_size(cipher))) {
-            qemudLog(QEMUD_ERR, "%s", _("cannot TLS get cipher size"));
+            ERROR0(_("cannot TLS get cipher size"));
             sasl_dispose(&client->saslconn);
             client->saslconn = NULL;
             goto authfail;
@@ -2605,7 +2605,7 @@
 
         err = sasl_setprop(client->saslconn, SASL_SSF_EXTERNAL, &ssf);
         if (err != SASL_OK) {
-            qemudLog(QEMUD_ERR, _("cannot set SASL external SSF %d (%s)"),
+            ERROR(_("cannot set SASL external SSF %d (%s)"),
                      err, sasl_errstring(err, NULL, NULL));
             sasl_dispose(&client->saslconn);
             client->saslconn = NULL;
@@ -2633,7 +2633,7 @@
 
     err = sasl_setprop(client->saslconn, SASL_SEC_PROPS, &secprops);
     if (err != SASL_OK) {
-        qemudLog(QEMUD_ERR, _("cannot set SASL security props %d (%s)"),
+        ERROR(_("cannot set SASL security props %d (%s)"),
                  err, sasl_errstring(err, NULL, NULL));
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
@@ -2649,7 +2649,7 @@
                         NULL,
                         NULL);
     if (err != SASL_OK) {
-        qemudLog(QEMUD_ERR, _("cannot list SASL mechanisms %d (%s)"),
+        ERROR(_("cannot list SASL mechanisms %d (%s)"),
                  err, sasl_errdetail(client->saslconn));
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
@@ -2658,7 +2658,7 @@
     REMOTE_DEBUG("Available mechanisms for client: '%s'", mechlist);
     ret->mechlist = strdup(mechlist);
     if (!ret->mechlist) {
-        qemudLog(QEMUD_ERR, "%s", _("cannot allocate mechlist"));
+        ERROR0(_("cannot allocate mechlist"));
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
         goto authfail;
@@ -2689,7 +2689,7 @@
 
     err = sasl_getprop(client->saslconn, SASL_SSF, &val);
     if (err != SASL_OK) {
-        qemudLog(QEMUD_ERR, _("cannot query SASL ssf on connection %d (%s)"),
+        ERROR(_("cannot query SASL ssf on connection %d (%s)"),
                  err, sasl_errstring(err, NULL, NULL));
         remoteDispatchAuthError(rerr);
         sasl_dispose(&client->saslconn);
@@ -2699,7 +2699,7 @@
     ssf = *(const int *)val;
     REMOTE_DEBUG("negotiated an SSF of %d", ssf);
     if (ssf < 56) { /* 56 is good for Kerberos */
-        qemudLog(QEMUD_ERR, _("negotiated SSF %d was not strong enough"), ssf);
+        ERROR(_("negotiated SSF %d was not strong enough"), ssf);
         remoteDispatchAuthError(rerr);
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
@@ -2728,8 +2728,7 @@
 
     err = sasl_getprop(client->saslconn, SASL_USERNAME, &val);
     if (err != SASL_OK) {
-        qemudLog(QEMUD_ERR,
-                 _("cannot query SASL username on connection %d (%s)"),
+        ERROR(_("cannot query SASL username on connection %d (%s)"),
                  err, sasl_errstring(err, NULL, NULL));
         remoteDispatchAuthError(rerr);
         sasl_dispose(&client->saslconn);
@@ -2737,7 +2736,7 @@
         return -1;
     }
     if (val == NULL) {
-        qemudLog(QEMUD_ERR, "%s", _("no client username was found"));
+        ERROR0(_("no client username was found"));
         remoteDispatchAuthError(rerr);
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
@@ -2747,7 +2746,7 @@
 
     client->saslUsername = strdup((const char*)val);
     if (client->saslUsername == NULL) {
-        qemudLog(QEMUD_ERR, "%s", _("out of memory copying username"));
+        ERROR0(_("out of memory copying username"));
         remoteDispatchAuthError(rerr);
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
@@ -2766,8 +2765,7 @@
     }
 
     /* Denied */
-    qemudLog(QEMUD_ERR, _("SASL client %s not allowed in whitelist"),
-             client->saslUsername);
+    ERROR(_("SASL client %s not allowed in whitelist"), client->saslUsername);
     remoteDispatchAuthError(rerr);
     sasl_dispose(&client->saslconn);
     client->saslconn = NULL;
@@ -2797,7 +2795,7 @@
     REMOTE_DEBUG("Start SASL auth %d", client->fd);
     if (client->auth != REMOTE_AUTH_SASL ||
         client->saslconn == NULL) {
-        qemudLog(QEMUD_ERR, "%s", _("client tried invalid SASL start request"));
+        ERROR0(_("client tried invalid SASL start request"));
         goto authfail;
     }
 
@@ -2812,15 +2810,14 @@
                             &serveroutlen);
     if (err != SASL_OK &&
         err != SASL_CONTINUE) {
-        qemudLog(QEMUD_ERR, _("sasl start failed %d (%s)"),
+        ERROR(_("sasl start failed %d (%s)"),
                  err, sasl_errdetail(client->saslconn));
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
         goto authfail;
     }
     if (serveroutlen > REMOTE_AUTH_SASL_DATA_MAX) {
-        qemudLog(QEMUD_ERR, _("sasl start reply data too long %d"),
-                 serveroutlen);
+        ERROR(_("sasl start reply data too long %d"), serveroutlen);
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
         goto authfail;
@@ -2885,7 +2882,7 @@
     REMOTE_DEBUG("Step SASL auth %d", client->fd);
     if (client->auth != REMOTE_AUTH_SASL ||
         client->saslconn == NULL) {
-        qemudLog(QEMUD_ERR, "%s", _("client tried invalid SASL start request"));
+        ERROR0(_("client tried invalid SASL start request"));
         goto authfail;
     }
 
@@ -2899,7 +2896,7 @@
                            &serveroutlen);
     if (err != SASL_OK &&
         err != SASL_CONTINUE) {
-        qemudLog(QEMUD_ERR, _("sasl step failed %d (%s)"),
+        ERROR(_("sasl step failed %d (%s)"),
                  err, sasl_errdetail(client->saslconn));
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
@@ -2907,7 +2904,7 @@
     }
 
     if (serveroutlen > REMOTE_AUTH_SASL_DATA_MAX) {
-        qemudLog(QEMUD_ERR, _("sasl step reply data too long %d"),
+        ERROR(_("sasl step reply data too long %d"),
                  serveroutlen);
         sasl_dispose(&client->saslconn);
         client->saslconn = NULL;
@@ -3025,30 +3022,26 @@
 
     REMOTE_DEBUG("Start PolicyKit auth %d", client->fd);
     if (client->auth != REMOTE_AUTH_POLKIT) {
-        qemudLog(QEMUD_ERR,
-                 "%s", _("client tried invalid PolicyKit init request"));
+        ERROR0(_("client tried invalid PolicyKit init request"));
         goto authfail;
     }
 
     if (qemudGetSocketIdentity(client->fd, &callerUid, &callerPid) < 0) {
-        qemudLog(QEMUD_ERR, "%s", _("cannot get peer socket identity"));
+        ERROR0(_("cannot get peer socket identity"));
         goto authfail;
     }
 
-    qemudLog(QEMUD_INFO, _("Checking PID %d running as %d"),
-             callerPid, callerUid);
+    INFO(_("Checking PID %d running as %d"), callerPid, callerUid);
     dbus_error_init(&err);
     if (!(pkcaller = polkit_caller_new_from_pid(server->sysbus,
                                                 callerPid, &err))) {
-        qemudLog(QEMUD_ERR, _("Failed to lookup policy kit caller: %s"),
-                 err.message);
+        ERROR(_("Failed to lookup policy kit caller: %s"), err.message);
         dbus_error_free(&err);
         goto authfail;
     }
 
     if (!(pkaction = polkit_action_new())) {
-        qemudLog(QEMUD_ERR, _("Failed to create polkit action %s\n"),
-                 strerror(errno));
+        ERROR(_("Failed to create polkit action %s\n"), strerror(errno));
         polkit_caller_unref(pkcaller);
         goto authfail;
     }
@@ -3056,7 +3049,7 @@
 
     if (!(pkcontext = polkit_context_new()) ||
         !polkit_context_init(pkcontext, &pkerr)) {
-        qemudLog(QEMUD_ERR, _("Failed to create polkit context %s\n"),
+        ERROR(_("Failed to create polkit context %s\n"),
                  (pkerr ? polkit_error_get_error_message(pkerr)
                   : strerror(errno)));
         if (pkerr)
@@ -3074,8 +3067,7 @@
                                                    0,
                                                    &pkerr);
     if (pkerr && polkit_error_is_set(pkerr)) {
-        qemudLog(QEMUD_ERR,
-                 _("Policy kit failed to check authorization %d %s"),
+        ERROR(_("Policy kit failed to check authorization %d %s"),
                  polkit_error_get_error_code(pkerr),
                  polkit_error_get_error_message(pkerr));
         goto authfail;
@@ -3089,15 +3081,12 @@
     polkit_caller_unref(pkcaller);
     polkit_action_unref(pkaction);
     if (pkresult != POLKIT_RESULT_YES) {
-        qemudLog(QEMUD_ERR,
-                 _("Policy kit denied action %s from pid %d, uid %d,"
-                   " result: %s\n"),
+        ERROR(_("Policy kit denied action %s from pid %d, uid %d, result: %s\n"),
                  action, callerPid, callerUid,
                  polkit_result_to_string_representation(pkresult));
         goto authfail;
     }
-    qemudLog(QEMUD_INFO,
-             _("Policy allowed action %s from pid %d, uid %d, result %s"),
+    INFO(_("Policy allowed action %s from pid %d, uid %d, result %s"),
              action, callerPid, callerUid,
              polkit_result_to_string_representation(pkresult));
     ret->complete = 1;
@@ -3122,8 +3111,7 @@
                           void *args ATTRIBUTE_UNUSED,
                           remote_auth_polkit_ret *ret ATTRIBUTE_UNUSED)
 {
-    qemudLog(QEMUD_ERR,
-             "%s", _("client tried unsupported PolicyKit init request"));
+    ERROR0(_("client tried unsupported PolicyKit init request"));
     remoteDispatchAuthError(rerr);
     return -1;
 }
@@ -3145,8 +3133,8 @@
 {
 
     if (args->maxnames > REMOTE_NETWORK_NAME_LIST_MAX) {
-        remoteDispatchFormatError (rerr,
-                                   "%s", _("maxnames > REMOTE_NETWORK_NAME_LIST_MAX"));
+        remoteDispatchFormatError (rerr, "%s",
+                            _("maxnames > REMOTE_NETWORK_NAME_LIST_MAX"));
         return -1;
     }
 
--
Libvir-list mailing list
Libvir-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/libvir-list

[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]