You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
3454 lines
177 KiB
3454 lines
177 KiB
From c499122cb7ba5fe2f76760844cbc2e34cc3a5626 Mon Sep 17 00:00:00 2001 |
|
From: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= <zbyszek@in.waw.pl> |
|
Date: Tue, 29 Mar 2022 15:55:59 +0200 |
|
Subject: [PATCH] Rename UnitFileScope to LookupScope |
|
|
|
As suggested in |
|
https://github.com/systemd/systemd/pull/22649/commits/8b3ad3983f5440eef812b34e5ed862ca59fdf7f7#r837345892 |
|
|
|
The define is generalized and moved to path-lookup.h, where it seems to fit |
|
better. This allows a recursive include to be removed and in general makes |
|
things simpler. |
|
|
|
(cherry picked from commit b380b6438361e39ad5076bfa58d2021621a957af) |
|
|
|
Related: #2082131 |
|
--- |
|
src/analyze/analyze-condition.c | 2 +- |
|
src/analyze/analyze-condition.h | 2 +- |
|
src/analyze/analyze-security.c | 4 +- |
|
src/analyze/analyze-security.h | 2 +- |
|
src/analyze/analyze-verify.c | 2 +- |
|
src/analyze/analyze-verify.h | 2 +- |
|
src/analyze/analyze.c | 24 +- |
|
src/basic/path-lookup.c | 64 ++-- |
|
src/basic/path-lookup.h | 21 +- |
|
src/basic/unit-file.h | 11 +- |
|
src/core/dbus-manager.c | 8 +- |
|
src/core/fuzz-unit-file.c | 2 +- |
|
src/core/main.c | 2 +- |
|
src/core/manager.c | 6 +- |
|
src/core/manager.h | 8 +- |
|
src/libsystemd/sd-path/sd-path.c | 8 +- |
|
src/portable/portable.c | 14 +- |
|
src/shared/install-printf.c | 2 +- |
|
src/shared/install-printf.h | 2 +- |
|
src/shared/install.c | 92 ++--- |
|
src/shared/install.h | 35 +- |
|
src/shared/specifier.c | 26 +- |
|
src/systemctl/systemctl-edit.c | 6 +- |
|
src/systemctl/systemctl-is-enabled.c | 2 +- |
|
src/systemctl/systemctl-show.c | 2 +- |
|
src/systemctl/systemctl-start-special.c | 4 +- |
|
src/systemctl/systemctl-start-unit.c | 6 +- |
|
src/systemctl/systemctl-sysv-compat.c | 2 +- |
|
src/systemctl/systemctl-util.c | 10 +- |
|
src/systemctl/systemctl.c | 12 +- |
|
src/systemctl/systemctl.h | 2 +- |
|
src/sysv-generator/sysv-generator.c | 4 +- |
|
src/test/test-bpf-firewall.c | 2 +- |
|
src/test/test-bpf-foreign-programs.c | 2 +- |
|
src/test/test-bpf-lsm.c | 2 +- |
|
src/test/test-cgroup-mask.c | 2 +- |
|
src/test/test-cgroup-unit-default.c | 2 +- |
|
src/test/test-engine.c | 2 +- |
|
src/test/test-execute.c | 10 +- |
|
src/test/test-install-root.c | 448 ++++++++++++------------ |
|
src/test/test-install.c | 72 ++-- |
|
src/test/test-load-fragment.c | 96 ++--- |
|
src/test/test-path-lookup.c | 30 +- |
|
src/test/test-path.c | 2 +- |
|
src/test/test-sched-prio.c | 2 +- |
|
src/test/test-socket-bind.c | 2 +- |
|
src/test/test-specifier.c | 2 +- |
|
src/test/test-unit-file.c | 2 +- |
|
src/test/test-unit-name.c | 2 +- |
|
src/test/test-unit-serialize.c | 2 +- |
|
src/test/test-watch-pid.c | 2 +- |
|
src/tmpfiles/tmpfiles.c | 2 +- |
|
52 files changed, 536 insertions(+), 539 deletions(-) |
|
|
|
diff --git a/src/analyze/analyze-condition.c b/src/analyze/analyze-condition.c |
|
index a7ad085f46..248fe01448 100644 |
|
--- a/src/analyze/analyze-condition.c |
|
+++ b/src/analyze/analyze-condition.c |
|
@@ -73,7 +73,7 @@ static int log_helper(void *userdata, int level, int error, const char *file, in |
|
return r; |
|
} |
|
|
|
-int verify_conditions(char **lines, UnitFileScope scope, const char *unit, const char *root) { |
|
+int verify_conditions(char **lines, LookupScope scope, const char *unit, const char *root) { |
|
_cleanup_(manager_freep) Manager *m = NULL; |
|
Unit *u; |
|
int r, q = 1; |
|
diff --git a/src/analyze/analyze-condition.h b/src/analyze/analyze-condition.h |
|
index 9ebd205b6d..04bd853c4f 100644 |
|
--- a/src/analyze/analyze-condition.h |
|
+++ b/src/analyze/analyze-condition.h |
|
@@ -3,4 +3,4 @@ |
|
|
|
#include "install.h" |
|
|
|
-int verify_conditions(char **lines, UnitFileScope scope, const char *unit, const char *root); |
|
+int verify_conditions(char **lines, LookupScope scope, const char *unit, const char *root); |
|
diff --git a/src/analyze/analyze-security.c b/src/analyze/analyze-security.c |
|
index d8ccbf8c54..e112922cbf 100644 |
|
--- a/src/analyze/analyze-security.c |
|
+++ b/src/analyze/analyze-security.c |
|
@@ -2643,7 +2643,7 @@ static int offline_security_check(Unit *u, |
|
|
|
static int offline_security_checks(char **filenames, |
|
JsonVariant *policy, |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
bool check_man, |
|
bool run_generators, |
|
unsigned threshold, |
|
@@ -2755,7 +2755,7 @@ static int offline_security_checks(char **filenames, |
|
int analyze_security(sd_bus *bus, |
|
char **units, |
|
JsonVariant *policy, |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
bool check_man, |
|
bool run_generators, |
|
bool offline, |
|
diff --git a/src/analyze/analyze-security.h b/src/analyze/analyze-security.h |
|
index 07483248ee..99bc1fabe4 100644 |
|
--- a/src/analyze/analyze-security.h |
|
+++ b/src/analyze/analyze-security.h |
|
@@ -18,7 +18,7 @@ typedef enum AnalyzeSecurityFlags { |
|
int analyze_security(sd_bus *bus, |
|
char **units, |
|
JsonVariant *policy, |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
bool check_man, |
|
bool run_generators, |
|
bool offline, |
|
diff --git a/src/analyze/analyze-verify.c b/src/analyze/analyze-verify.c |
|
index 39eb5cf93b..6680b9768d 100644 |
|
--- a/src/analyze/analyze-verify.c |
|
+++ b/src/analyze/analyze-verify.c |
|
@@ -243,7 +243,7 @@ static void set_destroy_ignore_pointer_max(Set** s) { |
|
set_free_free(*s); |
|
} |
|
|
|
-int verify_units(char **filenames, UnitFileScope scope, bool check_man, bool run_generators, RecursiveErrors recursive_errors, const char *root) { |
|
+int verify_units(char **filenames, LookupScope scope, bool check_man, bool run_generators, RecursiveErrors recursive_errors, const char *root) { |
|
const ManagerTestRunFlags flags = |
|
MANAGER_TEST_RUN_MINIMAL | |
|
MANAGER_TEST_RUN_ENV_GENERATORS | |
|
diff --git a/src/analyze/analyze-verify.h b/src/analyze/analyze-verify.h |
|
index 47b78a8158..385d635e33 100644 |
|
--- a/src/analyze/analyze-verify.h |
|
+++ b/src/analyze/analyze-verify.h |
|
@@ -17,7 +17,7 @@ typedef enum RecursiveErrors { |
|
int verify_generate_path(char **var, char **filenames); |
|
int verify_prepare_filename(const char *filename, char **ret); |
|
int verify_executable(Unit *u, const ExecCommand *exec, const char *root); |
|
-int verify_units(char **filenames, UnitFileScope scope, bool check_man, bool run_generators, RecursiveErrors recursive_errors, const char *root); |
|
+int verify_units(char **filenames, LookupScope scope, bool check_man, bool run_generators, RecursiveErrors recursive_errors, const char *root); |
|
|
|
const char* recursive_errors_to_string(RecursiveErrors i) _const_; |
|
RecursiveErrors recursive_errors_from_string(const char *s) _pure_; |
|
diff --git a/src/analyze/analyze.c b/src/analyze/analyze.c |
|
index 846acf31d3..7520134880 100644 |
|
--- a/src/analyze/analyze.c |
|
+++ b/src/analyze/analyze.c |
|
@@ -92,7 +92,7 @@ static usec_t arg_fuzz = 0; |
|
static PagerFlags arg_pager_flags = 0; |
|
static BusTransport arg_transport = BUS_TRANSPORT_LOCAL; |
|
static const char *arg_host = NULL; |
|
-static UnitFileScope arg_scope = UNIT_FILE_SYSTEM; |
|
+static LookupScope arg_scope = LOOKUP_SCOPE_SYSTEM; |
|
static RecursiveErrors arg_recursive_errors = RECURSIVE_ERRORS_YES; |
|
static bool arg_man = true; |
|
static bool arg_generators = false; |
|
@@ -171,7 +171,7 @@ typedef struct HostInfo { |
|
} HostInfo; |
|
|
|
static int acquire_bus(sd_bus **bus, bool *use_full_bus) { |
|
- bool user = arg_scope != UNIT_FILE_SYSTEM; |
|
+ bool user = arg_scope != LOOKUP_SCOPE_SYSTEM; |
|
int r; |
|
|
|
if (use_full_bus && *use_full_bus) { |
|
@@ -349,9 +349,9 @@ static int acquire_boot_times(sd_bus *bus, BootTimes **bt) { |
|
"Please try again later.\n" |
|
"Hint: Use 'systemctl%s list-jobs' to see active jobs", |
|
times.finish_time, |
|
- arg_scope == UNIT_FILE_SYSTEM ? "" : " --user"); |
|
+ arg_scope == LOOKUP_SCOPE_SYSTEM ? "" : " --user"); |
|
|
|
- if (arg_scope == UNIT_FILE_SYSTEM && times.security_start_time > 0) { |
|
+ if (arg_scope == LOOKUP_SCOPE_SYSTEM && times.security_start_time > 0) { |
|
/* security_start_time is set when systemd is not running under container environment. */ |
|
if (times.initrd_time > 0) |
|
times.kernel_done_time = times.initrd_time; |
|
@@ -506,7 +506,7 @@ static int acquire_host_info(sd_bus *bus, HostInfo **hi) { |
|
if (!host) |
|
return log_oom(); |
|
|
|
- if (arg_scope != UNIT_FILE_SYSTEM) { |
|
+ if (arg_scope != LOOKUP_SCOPE_SYSTEM) { |
|
r = bus_connect_transport(arg_transport, arg_host, false, &system_bus); |
|
if (r < 0) { |
|
log_debug_errno(r, "Failed to connect to system bus, ignoring: %m"); |
|
@@ -684,7 +684,7 @@ static int analyze_plot(int argc, char *argv[], void *userdata) { |
|
_cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL; |
|
_cleanup_(unit_times_free_arrayp) UnitTimes *times = NULL; |
|
_cleanup_free_ char *pretty_times = NULL; |
|
- bool use_full_bus = arg_scope == UNIT_FILE_SYSTEM; |
|
+ bool use_full_bus = arg_scope == LOOKUP_SCOPE_SYSTEM; |
|
BootTimes *boot; |
|
UnitTimes *u; |
|
int n, m = 1, y = 0, r; |
|
@@ -702,7 +702,7 @@ static int analyze_plot(int argc, char *argv[], void *userdata) { |
|
if (n < 0) |
|
return n; |
|
|
|
- if (use_full_bus || arg_scope != UNIT_FILE_SYSTEM) { |
|
+ if (use_full_bus || arg_scope != LOOKUP_SCOPE_SYSTEM) { |
|
n = acquire_host_info(bus, &host); |
|
if (n < 0) |
|
return n; |
|
@@ -2607,15 +2607,15 @@ static int parse_argv(int argc, char *argv[]) { |
|
break; |
|
|
|
case ARG_SYSTEM: |
|
- arg_scope = UNIT_FILE_SYSTEM; |
|
+ arg_scope = LOOKUP_SCOPE_SYSTEM; |
|
break; |
|
|
|
case ARG_USER: |
|
- arg_scope = UNIT_FILE_USER; |
|
+ arg_scope = LOOKUP_SCOPE_USER; |
|
break; |
|
|
|
case ARG_GLOBAL: |
|
- arg_scope = UNIT_FILE_GLOBAL; |
|
+ arg_scope = LOOKUP_SCOPE_GLOBAL; |
|
break; |
|
|
|
case ARG_ORDER: |
|
@@ -2756,12 +2756,12 @@ static int parse_argv(int argc, char *argv[]) { |
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), |
|
"Option --threshold= is only supported for security right now."); |
|
|
|
- if (arg_scope == UNIT_FILE_GLOBAL && |
|
+ if (arg_scope == LOOKUP_SCOPE_GLOBAL && |
|
!STR_IN_SET(argv[optind] ?: "time", "dot", "unit-paths", "verify")) |
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), |
|
"Option --global only makes sense with verbs dot, unit-paths, verify."); |
|
|
|
- if (streq_ptr(argv[optind], "cat-config") && arg_scope == UNIT_FILE_USER) |
|
+ if (streq_ptr(argv[optind], "cat-config") && arg_scope == LOOKUP_SCOPE_USER) |
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), |
|
"Option --user is not supported for cat-config right now."); |
|
|
|
diff --git a/src/basic/path-lookup.c b/src/basic/path-lookup.c |
|
index b699756658..1f4331a8bf 100644 |
|
--- a/src/basic/path-lookup.c |
|
+++ b/src/basic/path-lookup.c |
|
@@ -232,7 +232,7 @@ bool path_is_user_config_dir(const char *path) { |
|
} |
|
|
|
static int acquire_generator_dirs( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const char *tempdir, |
|
char **generator, |
|
char **generator_early, |
|
@@ -244,17 +244,17 @@ static int acquire_generator_dirs( |
|
assert(generator); |
|
assert(generator_early); |
|
assert(generator_late); |
|
- assert(IN_SET(scope, UNIT_FILE_SYSTEM, UNIT_FILE_USER, UNIT_FILE_GLOBAL)); |
|
+ assert(IN_SET(scope, LOOKUP_SCOPE_SYSTEM, LOOKUP_SCOPE_USER, LOOKUP_SCOPE_GLOBAL)); |
|
|
|
- if (scope == UNIT_FILE_GLOBAL) |
|
+ if (scope == LOOKUP_SCOPE_GLOBAL) |
|
return -EOPNOTSUPP; |
|
|
|
if (tempdir) |
|
prefix = tempdir; |
|
- else if (scope == UNIT_FILE_SYSTEM) |
|
+ else if (scope == LOOKUP_SCOPE_SYSTEM) |
|
prefix = "/run/systemd"; |
|
else { |
|
- /* UNIT_FILE_USER */ |
|
+ /* LOOKUP_SCOPE_USER */ |
|
const char *e; |
|
|
|
e = getenv("XDG_RUNTIME_DIR"); |
|
@@ -288,21 +288,21 @@ static int acquire_generator_dirs( |
|
} |
|
|
|
static int acquire_transient_dir( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const char *tempdir, |
|
char **ret) { |
|
|
|
char *transient; |
|
|
|
assert(ret); |
|
- assert(IN_SET(scope, UNIT_FILE_SYSTEM, UNIT_FILE_USER, UNIT_FILE_GLOBAL)); |
|
+ assert(IN_SET(scope, LOOKUP_SCOPE_SYSTEM, LOOKUP_SCOPE_USER, LOOKUP_SCOPE_GLOBAL)); |
|
|
|
- if (scope == UNIT_FILE_GLOBAL) |
|
+ if (scope == LOOKUP_SCOPE_GLOBAL) |
|
return -EOPNOTSUPP; |
|
|
|
if (tempdir) |
|
transient = path_join(tempdir, "transient"); |
|
- else if (scope == UNIT_FILE_SYSTEM) |
|
+ else if (scope == LOOKUP_SCOPE_SYSTEM) |
|
transient = strdup("/run/systemd/transient"); |
|
else |
|
return xdg_user_runtime_dir(ret, "/systemd/transient"); |
|
@@ -313,7 +313,7 @@ static int acquire_transient_dir( |
|
return 0; |
|
} |
|
|
|
-static int acquire_config_dirs(UnitFileScope scope, char **persistent, char **runtime) { |
|
+static int acquire_config_dirs(LookupScope scope, char **persistent, char **runtime) { |
|
_cleanup_free_ char *a = NULL, *b = NULL; |
|
int r; |
|
|
|
@@ -322,17 +322,17 @@ static int acquire_config_dirs(UnitFileScope scope, char **persistent, char **ru |
|
|
|
switch (scope) { |
|
|
|
- case UNIT_FILE_SYSTEM: |
|
+ case LOOKUP_SCOPE_SYSTEM: |
|
a = strdup(SYSTEM_CONFIG_UNIT_DIR); |
|
b = strdup("/run/systemd/system"); |
|
break; |
|
|
|
- case UNIT_FILE_GLOBAL: |
|
+ case LOOKUP_SCOPE_GLOBAL: |
|
a = strdup(USER_CONFIG_UNIT_DIR); |
|
b = strdup("/run/systemd/user"); |
|
break; |
|
|
|
- case UNIT_FILE_USER: |
|
+ case LOOKUP_SCOPE_USER: |
|
r = xdg_user_config_dir(&a, "/systemd/user"); |
|
if (r < 0 && r != -ENXIO) |
|
return r; |
|
@@ -364,7 +364,7 @@ static int acquire_config_dirs(UnitFileScope scope, char **persistent, char **ru |
|
return 0; |
|
} |
|
|
|
-static int acquire_control_dirs(UnitFileScope scope, char **persistent, char **runtime) { |
|
+static int acquire_control_dirs(LookupScope scope, char **persistent, char **runtime) { |
|
_cleanup_free_ char *a = NULL; |
|
int r; |
|
|
|
@@ -373,7 +373,7 @@ static int acquire_control_dirs(UnitFileScope scope, char **persistent, char **r |
|
|
|
switch (scope) { |
|
|
|
- case UNIT_FILE_SYSTEM: { |
|
+ case LOOKUP_SCOPE_SYSTEM: { |
|
_cleanup_free_ char *b = NULL; |
|
|
|
a = strdup("/etc/systemd/system.control"); |
|
@@ -389,7 +389,7 @@ static int acquire_control_dirs(UnitFileScope scope, char **persistent, char **r |
|
break; |
|
} |
|
|
|
- case UNIT_FILE_USER: |
|
+ case LOOKUP_SCOPE_USER: |
|
r = xdg_user_config_dir(&a, "/systemd/user.control"); |
|
if (r < 0 && r != -ENXIO) |
|
return r; |
|
@@ -406,7 +406,7 @@ static int acquire_control_dirs(UnitFileScope scope, char **persistent, char **r |
|
|
|
break; |
|
|
|
- case UNIT_FILE_GLOBAL: |
|
+ case LOOKUP_SCOPE_GLOBAL: |
|
return -EOPNOTSUPP; |
|
|
|
default: |
|
@@ -419,7 +419,7 @@ static int acquire_control_dirs(UnitFileScope scope, char **persistent, char **r |
|
} |
|
|
|
static int acquire_attached_dirs( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
char **ret_persistent, |
|
char **ret_runtime) { |
|
|
|
@@ -429,7 +429,7 @@ static int acquire_attached_dirs( |
|
assert(ret_runtime); |
|
|
|
/* Portable services are not available to regular users for now. */ |
|
- if (scope != UNIT_FILE_SYSTEM) |
|
+ if (scope != LOOKUP_SCOPE_SYSTEM) |
|
return -EOPNOTSUPP; |
|
|
|
a = strdup("/etc/systemd/system.attached"); |
|
@@ -509,7 +509,7 @@ static int get_paths_from_environ(const char *var, char ***paths, bool *append) |
|
|
|
int lookup_paths_init( |
|
LookupPaths *lp, |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
LookupPathsFlags flags, |
|
const char *root_dir) { |
|
|
|
@@ -528,14 +528,14 @@ int lookup_paths_init( |
|
|
|
assert(lp); |
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
|
|
#if HAVE_SPLIT_USR |
|
flags |= LOOKUP_PATHS_SPLIT_USR; |
|
#endif |
|
|
|
if (!empty_or_root(root_dir)) { |
|
- if (scope == UNIT_FILE_USER) |
|
+ if (scope == LOOKUP_SCOPE_USER) |
|
return -EINVAL; |
|
|
|
r = is_dir(root_dir, true); |
|
@@ -560,8 +560,8 @@ int lookup_paths_init( |
|
if (r < 0) |
|
return r; |
|
|
|
- if (scope == UNIT_FILE_USER) { |
|
- r = acquire_config_dirs(UNIT_FILE_GLOBAL, &global_persistent_config, &global_runtime_config); |
|
+ if (scope == LOOKUP_SCOPE_USER) { |
|
+ r = acquire_config_dirs(LOOKUP_SCOPE_GLOBAL, &global_persistent_config, &global_runtime_config); |
|
if (r < 0) |
|
return r; |
|
} |
|
@@ -606,7 +606,7 @@ int lookup_paths_init( |
|
|
|
switch (scope) { |
|
|
|
- case UNIT_FILE_SYSTEM: |
|
+ case LOOKUP_SCOPE_SYSTEM: |
|
add = strv_new( |
|
/* If you modify this you also want to modify |
|
* systemdsystemunitpath= in systemd.pc.in! */ |
|
@@ -629,7 +629,7 @@ int lookup_paths_init( |
|
STRV_IFNOTNULL(generator_late)); |
|
break; |
|
|
|
- case UNIT_FILE_GLOBAL: |
|
+ case LOOKUP_SCOPE_GLOBAL: |
|
add = strv_new( |
|
/* If you modify this you also want to modify |
|
* systemduserunitpath= in systemd.pc.in, and |
|
@@ -652,7 +652,7 @@ int lookup_paths_init( |
|
STRV_IFNOTNULL(generator_late)); |
|
break; |
|
|
|
- case UNIT_FILE_USER: |
|
+ case LOOKUP_SCOPE_USER: |
|
add = user_dirs(persistent_config, runtime_config, |
|
global_persistent_config, global_runtime_config, |
|
generator, generator_early, generator_late, |
|
@@ -741,7 +741,7 @@ int lookup_paths_init( |
|
return 0; |
|
} |
|
|
|
-int lookup_paths_init_or_warn(LookupPaths *lp, UnitFileScope scope, LookupPathsFlags flags, const char *root_dir) { |
|
+int lookup_paths_init_or_warn(LookupPaths *lp, LookupScope scope, LookupPathsFlags flags, const char *root_dir) { |
|
int r; |
|
|
|
r = lookup_paths_init(lp, scope, flags, root_dir); |
|
@@ -790,7 +790,7 @@ void lookup_paths_log(LookupPaths *lp) { |
|
} |
|
} |
|
|
|
-char **generator_binary_paths(UnitFileScope scope) { |
|
+char **generator_binary_paths(LookupScope scope) { |
|
bool append = false; /* Add items from SYSTEMD_GENERATOR_PATH before normal directories */ |
|
_cleanup_strv_free_ char **paths = NULL; |
|
int r; |
|
@@ -805,15 +805,15 @@ char **generator_binary_paths(UnitFileScope scope) { |
|
|
|
switch (scope) { |
|
|
|
- case UNIT_FILE_SYSTEM: |
|
+ case LOOKUP_SCOPE_SYSTEM: |
|
add = strv_new("/run/systemd/system-generators", |
|
"/etc/systemd/system-generators", |
|
"/usr/local/lib/systemd/system-generators", |
|
SYSTEM_GENERATOR_DIR); |
|
break; |
|
|
|
- case UNIT_FILE_GLOBAL: |
|
- case UNIT_FILE_USER: |
|
+ case LOOKUP_SCOPE_GLOBAL: |
|
+ case LOOKUP_SCOPE_USER: |
|
add = strv_new("/run/systemd/user-generators", |
|
"/etc/systemd/user-generators", |
|
"/usr/local/lib/systemd/user-generators", |
|
diff --git a/src/basic/path-lookup.h b/src/basic/path-lookup.h |
|
index 1f0e5ea271..aed72defe7 100644 |
|
--- a/src/basic/path-lookup.h |
|
+++ b/src/basic/path-lookup.h |
|
@@ -3,10 +3,7 @@ |
|
|
|
#include <stdbool.h> |
|
|
|
-typedef struct LookupPaths LookupPaths; |
|
- |
|
#include "def.h" |
|
-#include "unit-file.h" |
|
#include "macro.h" |
|
|
|
typedef enum LookupPathsFlags { |
|
@@ -15,7 +12,15 @@ typedef enum LookupPathsFlags { |
|
LOOKUP_PATHS_SPLIT_USR = 1 << 2, |
|
} LookupPathsFlags; |
|
|
|
-struct LookupPaths { |
|
+typedef enum LookupScope { |
|
+ LOOKUP_SCOPE_SYSTEM, |
|
+ LOOKUP_SCOPE_GLOBAL, |
|
+ LOOKUP_SCOPE_USER, |
|
+ _LOOKUP_SCOPE_MAX, |
|
+ _LOOKUP_SCOPE_INVALID = -EINVAL, |
|
+} LookupScope; |
|
+ |
|
+typedef struct LookupPaths { |
|
/* Where we look for unit files. This includes the individual special paths below, but also any vendor |
|
* supplied, static unit file paths. */ |
|
char **search_path; |
|
@@ -52,10 +57,10 @@ struct LookupPaths { |
|
|
|
/* A temporary directory when running in test mode, to be nuked */ |
|
char *temporary_dir; |
|
-}; |
|
+} LookupPaths; |
|
|
|
-int lookup_paths_init(LookupPaths *lp, UnitFileScope scope, LookupPathsFlags flags, const char *root_dir); |
|
-int lookup_paths_init_or_warn(LookupPaths *lp, UnitFileScope scope, LookupPathsFlags flags, const char *root_dir); |
|
+int lookup_paths_init(LookupPaths *lp, LookupScope scope, LookupPathsFlags flags, const char *root_dir); |
|
+int lookup_paths_init_or_warn(LookupPaths *lp, LookupScope scope, LookupPathsFlags flags, const char *root_dir); |
|
|
|
int xdg_user_dirs(char ***ret_config_dirs, char ***ret_data_dirs); |
|
int xdg_user_runtime_dir(char **ret, const char *suffix); |
|
@@ -68,7 +73,7 @@ bool path_is_user_config_dir(const char *path); |
|
void lookup_paths_log(LookupPaths *p); |
|
void lookup_paths_free(LookupPaths *p); |
|
|
|
-char **generator_binary_paths(UnitFileScope scope); |
|
+char **generator_binary_paths(LookupScope scope); |
|
char **env_generator_binary_paths(bool is_system); |
|
|
|
#define NETWORK_DIRS ((const char* const*) CONF_PATHS_STRV("systemd/network")) |
|
diff --git a/src/basic/unit-file.h b/src/basic/unit-file.h |
|
index b7c03e9c2c..1c43861f00 100644 |
|
--- a/src/basic/unit-file.h |
|
+++ b/src/basic/unit-file.h |
|
@@ -4,12 +4,11 @@ |
|
#include <stdbool.h> |
|
|
|
#include "hashmap.h" |
|
+#include "path-lookup.h" |
|
#include "time-util.h" |
|
#include "unit-name.h" |
|
|
|
typedef enum UnitFileState UnitFileState; |
|
-typedef enum UnitFileScope UnitFileScope; |
|
-typedef struct LookupPaths LookupPaths; |
|
|
|
enum UnitFileState { |
|
UNIT_FILE_ENABLED, |
|
@@ -29,14 +28,6 @@ enum UnitFileState { |
|
_UNIT_FILE_STATE_INVALID = -EINVAL, |
|
}; |
|
|
|
-enum UnitFileScope { |
|
- UNIT_FILE_SYSTEM, |
|
- UNIT_FILE_GLOBAL, |
|
- UNIT_FILE_USER, |
|
- _UNIT_FILE_SCOPE_MAX, |
|
- _UNIT_FILE_SCOPE_INVALID = -EINVAL, |
|
-}; |
|
- |
|
bool unit_type_may_alias(UnitType type) _const_; |
|
bool unit_type_may_template(UnitType type) _const_; |
|
|
|
diff --git a/src/core/dbus-manager.c b/src/core/dbus-manager.c |
|
index 0e3590d1c9..efba6331b9 100644 |
|
--- a/src/core/dbus-manager.c |
|
+++ b/src/core/dbus-manager.c |
|
@@ -2215,7 +2215,7 @@ fail: |
|
static int method_enable_unit_files_generic( |
|
sd_bus_message *message, |
|
Manager *m, |
|
- int (*call)(UnitFileScope scope, UnitFileFlags flags, const char *root_dir, char *files[], UnitFileChange **changes, size_t *n_changes), |
|
+ int (*call)(LookupScope scope, UnitFileFlags flags, const char *root_dir, char *files[], UnitFileChange **changes, size_t *n_changes), |
|
bool carries_install_info, |
|
sd_bus_error *error) { |
|
|
|
@@ -2279,7 +2279,7 @@ static int method_link_unit_files(sd_bus_message *message, void *userdata, sd_bu |
|
return method_enable_unit_files_generic(message, userdata, unit_file_link, false, error); |
|
} |
|
|
|
-static int unit_file_preset_without_mode(UnitFileScope scope, UnitFileFlags flags, const char *root_dir, char **files, UnitFileChange **changes, size_t *n_changes) { |
|
+static int unit_file_preset_without_mode(LookupScope scope, UnitFileFlags flags, const char *root_dir, char **files, UnitFileChange **changes, size_t *n_changes) { |
|
return unit_file_preset(scope, flags, root_dir, files, UNIT_FILE_PRESET_FULL, changes, n_changes); |
|
} |
|
|
|
@@ -2339,7 +2339,7 @@ static int method_preset_unit_files_with_mode(sd_bus_message *message, void *use |
|
static int method_disable_unit_files_generic( |
|
sd_bus_message *message, |
|
Manager *m, |
|
- int (*call)(UnitFileScope scope, UnitFileFlags flags, const char *root_dir, char *files[], UnitFileChange **changes, size_t *n_changes), |
|
+ int (*call)(LookupScope scope, UnitFileFlags flags, const char *root_dir, char *files[], UnitFileChange **changes, size_t *n_changes), |
|
sd_bus_error *error) { |
|
|
|
_cleanup_strv_free_ char **l = NULL; |
|
@@ -2565,7 +2565,7 @@ static int method_get_unit_file_links(sd_bus_message *message, void *userdata, s |
|
flags = UNIT_FILE_DRY_RUN | |
|
(runtime ? UNIT_FILE_RUNTIME : 0); |
|
|
|
- r = unit_file_disable(UNIT_FILE_SYSTEM, flags, NULL, p, &changes, &n_changes); |
|
+ r = unit_file_disable(LOOKUP_SCOPE_SYSTEM, flags, NULL, p, &changes, &n_changes); |
|
if (r < 0) |
|
return log_error_errno(r, "Failed to get file links for %s: %m", name); |
|
|
|
diff --git a/src/core/fuzz-unit-file.c b/src/core/fuzz-unit-file.c |
|
index 780dd3988d..c12e874e2d 100644 |
|
--- a/src/core/fuzz-unit-file.c |
|
+++ b/src/core/fuzz-unit-file.c |
|
@@ -62,7 +62,7 @@ int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) { |
|
if (!getenv("SYSTEMD_LOG_LEVEL")) |
|
log_set_max_level(LOG_CRIT); |
|
|
|
- assert_se(manager_new(UNIT_FILE_SYSTEM, MANAGER_TEST_RUN_MINIMAL, &m) >= 0); |
|
+ assert_se(manager_new(LOOKUP_SCOPE_SYSTEM, MANAGER_TEST_RUN_MINIMAL, &m) >= 0); |
|
|
|
name = strjoina("a.", unit_type_to_string(t)); |
|
assert_se(unit_new_for_name(m, unit_vtable[t]->object_size, name, &u) >= 0); |
|
diff --git a/src/core/main.c b/src/core/main.c |
|
index 4bad2e84a0..667e972364 100644 |
|
--- a/src/core/main.c |
|
+++ b/src/core/main.c |
|
@@ -2970,7 +2970,7 @@ int main(int argc, char *argv[]) { |
|
if (r < 0) |
|
goto finish; |
|
|
|
- r = manager_new(arg_system ? UNIT_FILE_SYSTEM : UNIT_FILE_USER, |
|
+ r = manager_new(arg_system ? LOOKUP_SCOPE_SYSTEM : LOOKUP_SCOPE_USER, |
|
arg_action == ACTION_TEST ? MANAGER_TEST_FULL : 0, |
|
&m); |
|
if (r < 0) { |
|
diff --git a/src/core/manager.c b/src/core/manager.c |
|
index 60846a66e6..c01128adb4 100644 |
|
--- a/src/core/manager.c |
|
+++ b/src/core/manager.c |
|
@@ -781,13 +781,13 @@ static int manager_setup_sigchld_event_source(Manager *m) { |
|
return 0; |
|
} |
|
|
|
-int manager_new(UnitFileScope scope, ManagerTestRunFlags test_run_flags, Manager **_m) { |
|
+int manager_new(LookupScope scope, ManagerTestRunFlags test_run_flags, Manager **_m) { |
|
_cleanup_(manager_freep) Manager *m = NULL; |
|
const char *e; |
|
int r; |
|
|
|
assert(_m); |
|
- assert(IN_SET(scope, UNIT_FILE_SYSTEM, UNIT_FILE_USER)); |
|
+ assert(IN_SET(scope, LOOKUP_SCOPE_SYSTEM, LOOKUP_SCOPE_USER)); |
|
|
|
m = new(Manager, 1); |
|
if (!m) |
|
@@ -1705,7 +1705,7 @@ static void manager_preset_all(Manager *m) { |
|
return; |
|
|
|
/* If this is the first boot, and we are in the host system, then preset everything */ |
|
- r = unit_file_preset_all(UNIT_FILE_SYSTEM, 0, NULL, UNIT_FILE_PRESET_ENABLE_ONLY, NULL, 0); |
|
+ r = unit_file_preset_all(LOOKUP_SCOPE_SYSTEM, 0, NULL, UNIT_FILE_PRESET_ENABLE_ONLY, NULL, 0); |
|
if (r < 0) |
|
log_full_errno(r == -EEXIST ? LOG_NOTICE : LOG_WARNING, r, |
|
"Failed to populate /etc with preset unit settings, ignoring: %m"); |
|
diff --git a/src/core/manager.h b/src/core/manager.h |
|
index e445e4d751..281d2a2138 100644 |
|
--- a/src/core/manager.h |
|
+++ b/src/core/manager.h |
|
@@ -235,7 +235,7 @@ struct Manager { |
|
int user_lookup_fds[2]; |
|
sd_event_source *user_lookup_event_source; |
|
|
|
- UnitFileScope unit_file_scope; |
|
+ LookupScope unit_file_scope; |
|
LookupPaths lookup_paths; |
|
Hashmap *unit_id_map; |
|
Hashmap *unit_name_map; |
|
@@ -461,8 +461,8 @@ static inline usec_t manager_default_timeout_abort_usec(Manager *m) { |
|
return m->default_timeout_abort_set ? m->default_timeout_abort_usec : m->default_timeout_stop_usec; |
|
} |
|
|
|
-#define MANAGER_IS_SYSTEM(m) ((m)->unit_file_scope == UNIT_FILE_SYSTEM) |
|
-#define MANAGER_IS_USER(m) ((m)->unit_file_scope != UNIT_FILE_SYSTEM) |
|
+#define MANAGER_IS_SYSTEM(m) ((m)->unit_file_scope == LOOKUP_SCOPE_SYSTEM) |
|
+#define MANAGER_IS_USER(m) ((m)->unit_file_scope != LOOKUP_SCOPE_SYSTEM) |
|
|
|
#define MANAGER_IS_RELOADING(m) ((m)->n_reloading > 0) |
|
|
|
@@ -473,7 +473,7 @@ static inline usec_t manager_default_timeout_abort_usec(Manager *m) { |
|
|
|
#define MANAGER_IS_TEST_RUN(m) ((m)->test_run_flags != 0) |
|
|
|
-int manager_new(UnitFileScope scope, ManagerTestRunFlags test_run_flags, Manager **m); |
|
+int manager_new(LookupScope scope, ManagerTestRunFlags test_run_flags, Manager **m); |
|
Manager* manager_free(Manager *m); |
|
DEFINE_TRIVIAL_CLEANUP_FUNC(Manager*, manager_free); |
|
|
|
diff --git a/src/libsystemd/sd-path/sd-path.c b/src/libsystemd/sd-path/sd-path.c |
|
index 8d9cfbc0af..385cfd3006 100644 |
|
--- a/src/libsystemd/sd-path/sd-path.c |
|
+++ b/src/libsystemd/sd-path/sd-path.c |
|
@@ -601,8 +601,8 @@ static int get_search(uint64_t type, char ***list) { |
|
case SD_PATH_SYSTEMD_SEARCH_SYSTEM_UNIT: |
|
case SD_PATH_SYSTEMD_SEARCH_USER_UNIT: { |
|
_cleanup_(lookup_paths_free) LookupPaths lp = {}; |
|
- const UnitFileScope scope = type == SD_PATH_SYSTEMD_SEARCH_SYSTEM_UNIT ? |
|
- UNIT_FILE_SYSTEM : UNIT_FILE_USER; |
|
+ const LookupScope scope = type == SD_PATH_SYSTEMD_SEARCH_SYSTEM_UNIT ? |
|
+ LOOKUP_SCOPE_SYSTEM : LOOKUP_SCOPE_USER; |
|
|
|
r = lookup_paths_init(&lp, scope, 0, NULL); |
|
if (r < 0) |
|
@@ -615,8 +615,8 @@ static int get_search(uint64_t type, char ***list) { |
|
case SD_PATH_SYSTEMD_SEARCH_SYSTEM_GENERATOR: |
|
case SD_PATH_SYSTEMD_SEARCH_USER_GENERATOR: { |
|
char **t; |
|
- const UnitFileScope scope = type == SD_PATH_SYSTEMD_SEARCH_SYSTEM_GENERATOR ? |
|
- UNIT_FILE_SYSTEM : UNIT_FILE_USER; |
|
+ const LookupScope scope = type == SD_PATH_SYSTEMD_SEARCH_SYSTEM_GENERATOR ? |
|
+ LOOKUP_SCOPE_SYSTEM : LOOKUP_SCOPE_USER; |
|
|
|
t = generator_binary_paths(scope); |
|
if (!t) |
|
diff --git a/src/portable/portable.c b/src/portable/portable.c |
|
index 5be7ea854d..4c75dc0e0c 100644 |
|
--- a/src/portable/portable.c |
|
+++ b/src/portable/portable.c |
|
@@ -231,7 +231,7 @@ static int extract_now( |
|
/* Then, send unit file data to the parent (or/and add it to the hashmap). For that we use our usual unit |
|
* discovery logic. Note that we force looking inside of /lib/systemd/system/ for units too, as we mightbe |
|
* compiled for a split-usr system but the image might be a legacy-usr one. */ |
|
- r = lookup_paths_init(&paths, UNIT_FILE_SYSTEM, LOOKUP_PATHS_SPLIT_USR, where); |
|
+ r = lookup_paths_init(&paths, LOOKUP_SCOPE_SYSTEM, LOOKUP_PATHS_SPLIT_USR, where); |
|
if (r < 0) |
|
return log_debug_errno(r, "Failed to acquire lookup paths: %m"); |
|
|
|
@@ -1302,12 +1302,12 @@ int portable_attach( |
|
strempty(extensions_joined)); |
|
} |
|
|
|
- r = lookup_paths_init(&paths, UNIT_FILE_SYSTEM, LOOKUP_PATHS_SPLIT_USR, NULL); |
|
+ r = lookup_paths_init(&paths, LOOKUP_SCOPE_SYSTEM, LOOKUP_PATHS_SPLIT_USR, NULL); |
|
if (r < 0) |
|
return r; |
|
|
|
HASHMAP_FOREACH(item, unit_files) { |
|
- r = unit_file_exists(UNIT_FILE_SYSTEM, &paths, item->name); |
|
+ r = unit_file_exists(LOOKUP_SCOPE_SYSTEM, &paths, item->name); |
|
if (r < 0) |
|
return sd_bus_error_set_errnof(error, r, "Failed to determine whether unit '%s' exists on the host: %m", item->name); |
|
if (!FLAGS_SET(flags, PORTABLE_REATTACH) && r > 0) |
|
@@ -1489,7 +1489,7 @@ int portable_detach( |
|
|
|
assert(name_or_path); |
|
|
|
- r = lookup_paths_init(&paths, UNIT_FILE_SYSTEM, LOOKUP_PATHS_SPLIT_USR, NULL); |
|
+ r = lookup_paths_init(&paths, LOOKUP_SCOPE_SYSTEM, LOOKUP_PATHS_SPLIT_USR, NULL); |
|
if (r < 0) |
|
return r; |
|
|
|
@@ -1523,7 +1523,7 @@ int portable_detach( |
|
if (r == 0) |
|
continue; |
|
|
|
- r = unit_file_lookup_state(UNIT_FILE_SYSTEM, &paths, de->d_name, &state); |
|
+ r = unit_file_lookup_state(LOOKUP_SCOPE_SYSTEM, &paths, de->d_name, &state); |
|
if (r < 0) |
|
return log_debug_errno(r, "Failed to determine unit file state of '%s': %m", de->d_name); |
|
if (!IN_SET(state, UNIT_FILE_STATIC, UNIT_FILE_DISABLED, UNIT_FILE_LINKED, UNIT_FILE_RUNTIME, UNIT_FILE_LINKED_RUNTIME)) |
|
@@ -1657,7 +1657,7 @@ static int portable_get_state_internal( |
|
assert(name_or_path); |
|
assert(ret); |
|
|
|
- r = lookup_paths_init(&paths, UNIT_FILE_SYSTEM, LOOKUP_PATHS_SPLIT_USR, NULL); |
|
+ r = lookup_paths_init(&paths, LOOKUP_SCOPE_SYSTEM, LOOKUP_PATHS_SPLIT_USR, NULL); |
|
if (r < 0) |
|
return r; |
|
|
|
@@ -1693,7 +1693,7 @@ static int portable_get_state_internal( |
|
if (r == 0) |
|
continue; |
|
|
|
- r = unit_file_lookup_state(UNIT_FILE_SYSTEM, &paths, de->d_name, &state); |
|
+ r = unit_file_lookup_state(LOOKUP_SCOPE_SYSTEM, &paths, de->d_name, &state); |
|
if (r < 0) |
|
return log_debug_errno(r, "Failed to determine unit file state of '%s': %m", de->d_name); |
|
if (!IN_SET(state, UNIT_FILE_STATIC, UNIT_FILE_DISABLED, UNIT_FILE_LINKED, UNIT_FILE_LINKED_RUNTIME)) |
|
diff --git a/src/shared/install-printf.c b/src/shared/install-printf.c |
|
index 7aad1b7443..fdb8e021ac 100644 |
|
--- a/src/shared/install-printf.c |
|
+++ b/src/shared/install-printf.c |
|
@@ -104,7 +104,7 @@ static int specifier_last_component(char specifier, const void *data, const char |
|
} |
|
|
|
int install_name_printf( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const UnitFileInstallInfo *info, |
|
const char *format, |
|
char **ret) { |
|
diff --git a/src/shared/install-printf.h b/src/shared/install-printf.h |
|
index 60d3a9fc55..6a9ab24e15 100644 |
|
--- a/src/shared/install-printf.h |
|
+++ b/src/shared/install-printf.h |
|
@@ -5,7 +5,7 @@ |
|
#include "unit-name.h" |
|
|
|
int install_name_printf( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const UnitFileInstallInfo *info, |
|
const char *format, |
|
char **ret); |
|
diff --git a/src/shared/install.c b/src/shared/install.c |
|
index 22b16ad453..fa7bbdd93a 100644 |
|
--- a/src/shared/install.c |
|
+++ b/src/shared/install.c |
|
@@ -47,7 +47,7 @@ typedef enum SearchFlags { |
|
} SearchFlags; |
|
|
|
typedef struct { |
|
- UnitFileScope scope; |
|
+ LookupScope scope; |
|
OrderedHashmap *will_process; |
|
OrderedHashmap *have_processed; |
|
} InstallContext; |
|
@@ -942,7 +942,7 @@ static int find_symlinks( |
|
} |
|
|
|
static int find_symlinks_in_scope( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const LookupPaths *lp, |
|
const UnitFileInstallInfo *info, |
|
bool match_name, |
|
@@ -976,7 +976,7 @@ static int find_symlinks_in_scope( |
|
} |
|
|
|
/* look for global enablement of user units */ |
|
- if (scope == UNIT_FILE_USER && path_is_user_config_dir(*p)) { |
|
+ if (scope == LOOKUP_SCOPE_USER && path_is_user_config_dir(*p)) { |
|
*state = UNIT_FILE_ENABLED; |
|
return 1; |
|
} |
|
@@ -1868,7 +1868,7 @@ int unit_file_verify_alias( |
|
} |
|
|
|
static int install_info_symlink_alias( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileInstallInfo *info, |
|
const LookupPaths *lp, |
|
const char *config_path, |
|
@@ -1912,7 +1912,7 @@ static int install_info_symlink_alias( |
|
} |
|
|
|
static int install_info_symlink_wants( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags file_flags, |
|
UnitFileInstallInfo *info, |
|
const LookupPaths *lp, |
|
@@ -2052,7 +2052,7 @@ static int install_info_symlink_link( |
|
} |
|
|
|
static int install_info_apply( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags file_flags, |
|
UnitFileInstallInfo *info, |
|
const LookupPaths *lp, |
|
@@ -2225,7 +2225,7 @@ static int install_context_mark_for_removal( |
|
} |
|
|
|
int unit_file_mask( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
@@ -2237,7 +2237,7 @@ int unit_file_mask( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
if (r < 0) |
|
@@ -2270,7 +2270,7 @@ int unit_file_mask( |
|
} |
|
|
|
int unit_file_unmask( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
@@ -2285,7 +2285,7 @@ int unit_file_unmask( |
|
int r, q; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
if (r < 0) |
|
@@ -2362,7 +2362,7 @@ int unit_file_unmask( |
|
} |
|
|
|
int unit_file_link( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
@@ -2376,7 +2376,7 @@ int unit_file_link( |
|
int r, q; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
if (r < 0) |
|
@@ -2462,7 +2462,7 @@ static int path_shall_revert(const LookupPaths *lp, const char *path) { |
|
} |
|
|
|
int unit_file_revert( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const char *root_dir, |
|
char **files, |
|
UnitFileChange **changes, |
|
@@ -2613,7 +2613,7 @@ int unit_file_revert( |
|
} |
|
|
|
int unit_file_add_dependency( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags file_flags, |
|
const char *root_dir, |
|
char **files, |
|
@@ -2629,7 +2629,7 @@ int unit_file_add_dependency( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
assert(target); |
|
|
|
if (!IN_SET(dep, UNIT_WANTS, UNIT_REQUIRES)) |
|
@@ -2684,7 +2684,7 @@ int unit_file_add_dependency( |
|
|
|
static int do_unit_file_enable( |
|
const LookupPaths *lp, |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *config_path, |
|
char **files, |
|
@@ -2714,7 +2714,7 @@ static int do_unit_file_enable( |
|
} |
|
|
|
int unit_file_enable( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
@@ -2725,7 +2725,7 @@ int unit_file_enable( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
if (r < 0) |
|
@@ -2740,7 +2740,7 @@ int unit_file_enable( |
|
|
|
static int do_unit_file_disable( |
|
const LookupPaths *lp, |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *config_path, |
|
char **files, |
|
@@ -2769,7 +2769,7 @@ static int do_unit_file_disable( |
|
|
|
|
|
int unit_file_disable( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
@@ -2780,7 +2780,7 @@ int unit_file_disable( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
if (r < 0) |
|
@@ -2794,7 +2794,7 @@ int unit_file_disable( |
|
} |
|
|
|
static int normalize_linked_files( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const LookupPaths *lp, |
|
char **names_or_paths, |
|
char ***ret_names, |
|
@@ -2852,7 +2852,7 @@ static int normalize_linked_files( |
|
} |
|
|
|
int unit_file_reenable( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **names_or_paths, |
|
@@ -2864,7 +2864,7 @@ int unit_file_reenable( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
if (r < 0) |
|
@@ -2888,7 +2888,7 @@ int unit_file_reenable( |
|
} |
|
|
|
int unit_file_set_default( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
const char *name, |
|
@@ -2902,7 +2902,7 @@ int unit_file_set_default( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
assert(name); |
|
|
|
if (unit_name_to_type(name) != UNIT_TARGET) /* this also validates the name */ |
|
@@ -2923,7 +2923,7 @@ int unit_file_set_default( |
|
} |
|
|
|
int unit_file_get_default( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const char *root_dir, |
|
char **name) { |
|
|
|
@@ -2934,7 +2934,7 @@ int unit_file_get_default( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
assert(name); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
@@ -2958,7 +2958,7 @@ int unit_file_get_default( |
|
} |
|
|
|
int unit_file_lookup_state( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const LookupPaths *lp, |
|
const char *name, |
|
UnitFileState *ret) { |
|
@@ -3056,7 +3056,7 @@ int unit_file_lookup_state( |
|
} |
|
|
|
int unit_file_get_state( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const char *root_dir, |
|
const char *name, |
|
UnitFileState *ret) { |
|
@@ -3065,7 +3065,7 @@ int unit_file_get_state( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
assert(name); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
@@ -3075,7 +3075,7 @@ int unit_file_get_state( |
|
return unit_file_lookup_state(scope, &lp, name, ret); |
|
} |
|
|
|
-int unit_file_exists(UnitFileScope scope, const LookupPaths *lp, const char *name) { |
|
+int unit_file_exists(LookupScope scope, const LookupPaths *lp, const char *name) { |
|
_cleanup_(install_context_done) InstallContext c = { .scope = scope }; |
|
int r; |
|
|
|
@@ -3127,17 +3127,17 @@ static int split_pattern_into_name_and_instances(const char *pattern, char **out |
|
return 0; |
|
} |
|
|
|
-static int presets_find_config(UnitFileScope scope, const char *root_dir, char ***files) { |
|
+static int presets_find_config(LookupScope scope, const char *root_dir, char ***files) { |
|
static const char* const system_dirs[] = {CONF_PATHS("systemd/system-preset"), NULL}; |
|
static const char* const user_dirs[] = {CONF_PATHS_USR("systemd/user-preset"), NULL}; |
|
const char* const* dirs; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
|
|
- if (scope == UNIT_FILE_SYSTEM) |
|
+ if (scope == LOOKUP_SCOPE_SYSTEM) |
|
dirs = system_dirs; |
|
- else if (IN_SET(scope, UNIT_FILE_GLOBAL, UNIT_FILE_USER)) |
|
+ else if (IN_SET(scope, LOOKUP_SCOPE_GLOBAL, LOOKUP_SCOPE_USER)) |
|
dirs = user_dirs; |
|
else |
|
assert_not_reached(); |
|
@@ -3145,13 +3145,13 @@ static int presets_find_config(UnitFileScope scope, const char *root_dir, char * |
|
return conf_files_list_strv(files, ".preset", root_dir, 0, dirs); |
|
} |
|
|
|
-static int read_presets(UnitFileScope scope, const char *root_dir, UnitFilePresets *presets) { |
|
+static int read_presets(LookupScope scope, const char *root_dir, UnitFilePresets *presets) { |
|
_cleanup_(unit_file_presets_freep) UnitFilePresets ps = {}; |
|
_cleanup_strv_free_ char **files = NULL; |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
assert(presets); |
|
|
|
r = presets_find_config(scope, root_dir, &files); |
|
@@ -3325,7 +3325,7 @@ static int query_presets(const char *name, const UnitFilePresets *presets, char |
|
} |
|
} |
|
|
|
-int unit_file_query_preset(UnitFileScope scope, const char *root_dir, const char *name, UnitFilePresets *cached) { |
|
+int unit_file_query_preset(LookupScope scope, const char *root_dir, const char *name, UnitFilePresets *cached) { |
|
_cleanup_(unit_file_presets_freep) UnitFilePresets tmp = {}; |
|
int r; |
|
|
|
@@ -3389,7 +3389,7 @@ static int execute_preset( |
|
} |
|
|
|
static int preset_prepare_one( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
InstallContext *plus, |
|
InstallContext *minus, |
|
LookupPaths *lp, |
|
@@ -3442,7 +3442,7 @@ static int preset_prepare_one( |
|
} |
|
|
|
int unit_file_preset( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags file_flags, |
|
const char *root_dir, |
|
char **files, |
|
@@ -3457,7 +3457,7 @@ int unit_file_preset( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
assert(mode < _UNIT_FILE_PRESET_MAX); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
@@ -3482,7 +3482,7 @@ int unit_file_preset( |
|
} |
|
|
|
int unit_file_preset_all( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags file_flags, |
|
const char *root_dir, |
|
UnitFilePresetMode mode, |
|
@@ -3496,7 +3496,7 @@ int unit_file_preset_all( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
assert(mode < _UNIT_FILE_PRESET_MAX); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
@@ -3557,7 +3557,7 @@ Hashmap* unit_file_list_free(Hashmap *h) { |
|
DEFINE_TRIVIAL_CLEANUP_FUNC(UnitFileList*, unit_file_list_free_one); |
|
|
|
int unit_file_get_list( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const char *root_dir, |
|
Hashmap *h, |
|
char **states, |
|
@@ -3567,7 +3567,7 @@ int unit_file_get_list( |
|
int r; |
|
|
|
assert(scope >= 0); |
|
- assert(scope < _UNIT_FILE_SCOPE_MAX); |
|
+ assert(scope < _LOOKUP_SCOPE_MAX); |
|
assert(h); |
|
|
|
r = lookup_paths_init(&lp, scope, 0, root_dir); |
|
diff --git a/src/shared/install.h b/src/shared/install.h |
|
index 95427537f2..2ba7e8aea0 100644 |
|
--- a/src/shared/install.h |
|
+++ b/src/shared/install.h |
|
@@ -15,6 +15,7 @@ typedef struct UnitFileInstallInfo UnitFileInstallInfo; |
|
#include "macro.h" |
|
#include "path-lookup.h" |
|
#include "strv.h" |
|
+#include "unit-file.h" |
|
#include "unit-name.h" |
|
|
|
enum UnitFilePresetMode { |
|
@@ -95,28 +96,28 @@ struct UnitFileInstallInfo { |
|
}; |
|
|
|
int unit_file_enable( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_disable( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_reenable( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **names_or_paths, |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_preset( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
@@ -124,52 +125,52 @@ int unit_file_preset( |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_preset_all( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
UnitFilePresetMode mode, |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_mask( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_unmask( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_link( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_revert( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const char *root_dir, |
|
char **files, |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_set_default( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
const char *file, |
|
UnitFileChange **changes, |
|
size_t *n_changes); |
|
int unit_file_get_default( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const char *root_dir, |
|
char **name); |
|
int unit_file_add_dependency( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
UnitFileFlags flags, |
|
const char *root_dir, |
|
char **files, |
|
@@ -179,15 +180,15 @@ int unit_file_add_dependency( |
|
size_t *n_changes); |
|
|
|
int unit_file_lookup_state( |
|
- UnitFileScope scope, |
|
+ LookupScope scope, |
|
const LookupPaths *paths, |
|
const char *name, |
|
UnitFileState *ret); |
|
|
|
-int unit_file_get_state(UnitFileScope scope, const char *root_dir, const char *filename, UnitFileState *ret); |
|
-int unit_file_exists(UnitFileScope scope, const LookupPaths *paths, const char *name); |
|
+int unit_file_get_state(LookupScope scope, const char *root_dir, const char *filename, UnitFileState *ret); |
|
+int unit_file_exists(LookupScope scope, const LookupPaths *paths, const char *name); |
|
|
|
-int unit_file_get_list(UnitFileScope scope, const char *root_dir, Hashmap *h, char **states, char **patterns); |
|
+int unit_file_get_list(LookupScope scope, const char *root_dir, Hashmap *h, char **states, char **patterns); |
|
Hashmap* unit_file_list_free(Hashmap *h); |
|
|
|
int unit_file_changes_add(UnitFileChange **changes, size_t *n_changes, int type, const char *path, const char *source); |
|
@@ -210,7 +211,7 @@ typedef struct { |
|
} UnitFilePresets; |
|
|
|
void unit_file_presets_freep(UnitFilePresets *p); |
|
-int unit_file_query_preset(UnitFileScope scope, const char *root_dir, const char *name, UnitFilePresets *cached); |
|
+int unit_file_query_preset(LookupScope scope, const char *root_dir, const char *name, UnitFilePresets *cached); |
|
|
|
const char *unit_file_state_to_string(UnitFileState s) _const_; |
|
UnitFileState unit_file_state_from_string(const char *s) _pure_; |
|
diff --git a/src/shared/specifier.c b/src/shared/specifier.c |
|
index ac353a651c..cfa60abc7b 100644 |
|
--- a/src/shared/specifier.c |
|
+++ b/src/shared/specifier.c |
|
@@ -18,10 +18,10 @@ |
|
#include "id128-util.h" |
|
#include "macro.h" |
|
#include "os-util.h" |
|
+#include "path-lookup.h" |
|
#include "specifier.h" |
|
#include "string-util.h" |
|
#include "strv.h" |
|
-#include "unit-file.h" |
|
#include "user-util.h" |
|
|
|
/* |
|
@@ -254,15 +254,15 @@ int specifier_os_image_version(char specifier, const void *data, const char *roo |
|
} |
|
|
|
int specifier_group_name(char specifier, const void *data, const char *root, const void *userdata, char **ret) { |
|
- UnitFileScope scope = PTR_TO_INT(data); |
|
+ LookupScope scope = PTR_TO_INT(data); |
|
char *t; |
|
|
|
assert(ret); |
|
|
|
- if (scope == UNIT_FILE_GLOBAL) |
|
+ if (scope == LOOKUP_SCOPE_GLOBAL) |
|
return -EINVAL; |
|
|
|
- t = gid_to_name(scope == UNIT_FILE_USER ? getgid() : 0); |
|
+ t = gid_to_name(scope == LOOKUP_SCOPE_USER ? getgid() : 0); |
|
if (!t) |
|
return -ENOMEM; |
|
|
|
@@ -271,15 +271,15 @@ int specifier_group_name(char specifier, const void *data, const char *root, con |
|
} |
|
|
|
int specifier_group_id(char specifier, const void *data, const char *root, const void *userdata, char **ret) { |
|
- UnitFileScope scope = PTR_TO_INT(data); |
|
+ LookupScope scope = PTR_TO_INT(data); |
|
gid_t gid; |
|
|
|
assert(ret); |
|
|
|
- if (scope == UNIT_FILE_GLOBAL) |
|
+ if (scope == LOOKUP_SCOPE_GLOBAL) |
|
return -EINVAL; |
|
|
|
- gid = scope == UNIT_FILE_USER ? getgid() : 0; |
|
+ gid = scope == LOOKUP_SCOPE_USER ? getgid() : 0; |
|
|
|
if (asprintf(ret, UID_FMT, gid) < 0) |
|
return -ENOMEM; |
|
@@ -288,16 +288,16 @@ int specifier_group_id(char specifier, const void *data, const char *root, const |
|
} |
|
|
|
int specifier_user_name(char specifier, const void *data, const char *root, const void *userdata, char **ret) { |
|
- UnitFileScope scope = PTR_TO_INT(data); |
|
+ LookupScope scope = PTR_TO_INT(data); |
|
uid_t uid; |
|
char *t; |
|
|
|
assert(ret); |
|
|
|
- if (scope == UNIT_FILE_GLOBAL) |
|
+ if (scope == LOOKUP_SCOPE_GLOBAL) |
|
return -EINVAL; |
|
|
|
- uid = scope == UNIT_FILE_USER ? getuid() : 0; |
|
+ uid = scope == LOOKUP_SCOPE_USER ? getuid() : 0; |
|
|
|
/* If we are UID 0 (root), this will not result in NSS, otherwise it might. This is good, as we want |
|
* to be able to run this in PID 1, where our user ID is 0, but where NSS lookups are not allowed. |
|
@@ -315,15 +315,15 @@ int specifier_user_name(char specifier, const void *data, const char *root, cons |
|
} |
|
|
|
int specifier_user_id(char specifier, const void *data, const char *root, const void *userdata, char **ret) { |
|
- UnitFileScope scope = PTR_TO_INT(data); |
|
+ LookupScope scope = PTR_TO_INT(data); |
|
uid_t uid; |
|
|
|
assert(ret); |
|
|
|
- if (scope == UNIT_FILE_GLOBAL) |
|
+ if (scope == LOOKUP_SCOPE_GLOBAL) |
|
return -EINVAL; |
|
|
|
- uid = scope == UNIT_FILE_USER ? getuid() : 0; |
|
+ uid = scope == LOOKUP_SCOPE_USER ? getuid() : 0; |
|
|
|
if (asprintf(ret, UID_FMT, uid) < 0) |
|
return -ENOMEM; |
|
diff --git a/src/systemctl/systemctl-edit.c b/src/systemctl/systemctl-edit.c |
|
index 328168e4bb..1d9e8dc5d2 100644 |
|
--- a/src/systemctl/systemctl-edit.c |
|
+++ b/src/systemctl/systemctl-edit.c |
|
@@ -99,7 +99,7 @@ int cat(int argc, char *argv[], void *userdata) { |
|
ansi_highlight_red(), |
|
ansi_highlight_red(), |
|
ansi_highlight_red(), |
|
- arg_scope == UNIT_FILE_SYSTEM ? "" : " --user", |
|
+ arg_scope == LOOKUP_SCOPE_SYSTEM ? "" : " --user", |
|
ansi_normal()); |
|
|
|
r = cat_files(fragment_path, dropin_paths, 0); |
|
@@ -406,8 +406,8 @@ static int find_paths_to_edit(sd_bus *bus, char **names, char ***paths) { |
|
if (!path) { |
|
if (!arg_force) { |
|
log_info("Run 'systemctl edit%s --force --full %s' to create a new unit.", |
|
- arg_scope == UNIT_FILE_GLOBAL ? " --global" : |
|
- arg_scope == UNIT_FILE_USER ? " --user" : "", |
|
+ arg_scope == LOOKUP_SCOPE_GLOBAL ? " --global" : |
|
+ arg_scope == LOOKUP_SCOPE_USER ? " --user" : "", |
|
*name); |
|
return -ENOENT; |
|
} |
|
diff --git a/src/systemctl/systemctl-is-enabled.c b/src/systemctl/systemctl-is-enabled.c |
|
index eaf25217a8..db8f9e8cc4 100644 |
|
--- a/src/systemctl/systemctl-is-enabled.c |
|
+++ b/src/systemctl/systemctl-is-enabled.c |
|
@@ -18,7 +18,7 @@ static int show_installation_targets_client_side(const char *name) { |
|
flags = UNIT_FILE_DRY_RUN | |
|
(arg_runtime ? UNIT_FILE_RUNTIME : 0); |
|
|
|
- r = unit_file_disable(UNIT_FILE_SYSTEM, flags, NULL, p, &changes, &n_changes); |
|
+ r = unit_file_disable(LOOKUP_SCOPE_SYSTEM, flags, NULL, p, &changes, &n_changes); |
|
if (r < 0) |
|
return log_error_errno(r, "Failed to get file links for %s: %m", name); |
|
|
|
diff --git a/src/systemctl/systemctl-show.c b/src/systemctl/systemctl-show.c |
|
index ee96dac457..d472e1759d 100644 |
|
--- a/src/systemctl/systemctl-show.c |
|
+++ b/src/systemctl/systemctl-show.c |
|
@@ -764,7 +764,7 @@ static void print_status_info( |
|
getuid(), |
|
get_output_flags() | OUTPUT_BEGIN_NEWLINE, |
|
SD_JOURNAL_LOCAL_ONLY, |
|
- arg_scope == UNIT_FILE_SYSTEM, |
|
+ arg_scope == LOOKUP_SCOPE_SYSTEM, |
|
ellipsized); |
|
|
|
if (i->need_daemon_reload) |
|
diff --git a/src/systemctl/systemctl-start-special.c b/src/systemctl/systemctl-start-special.c |
|
index 6ece700a9b..9c88e7910c 100644 |
|
--- a/src/systemctl/systemctl-start-special.c |
|
+++ b/src/systemctl/systemctl-start-special.c |
|
@@ -242,10 +242,10 @@ int start_special(int argc, char *argv[], void *userdata) { |
|
int start_system_special(int argc, char *argv[], void *userdata) { |
|
/* Like start_special above, but raises an error when running in user mode */ |
|
|
|
- if (arg_scope != UNIT_FILE_SYSTEM) |
|
+ if (arg_scope != LOOKUP_SCOPE_SYSTEM) |
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), |
|
"Bad action for %s mode.", |
|
- arg_scope == UNIT_FILE_GLOBAL ? "--global" : "--user"); |
|
+ arg_scope == LOOKUP_SCOPE_GLOBAL ? "--global" : "--user"); |
|
|
|
return start_special(argc, argv, userdata); |
|
} |
|
diff --git a/src/systemctl/systemctl-start-unit.c b/src/systemctl/systemctl-start-unit.c |
|
index b45495d51d..88b2b7a53d 100644 |
|
--- a/src/systemctl/systemctl-start-unit.c |
|
+++ b/src/systemctl/systemctl-start-unit.c |
|
@@ -168,8 +168,8 @@ fail: |
|
BUS_ERROR_UNIT_MASKED, |
|
BUS_ERROR_JOB_TYPE_NOT_APPLICABLE)) |
|
log_error("See %s logs and 'systemctl%s status%s %s' for details.", |
|
- arg_scope == UNIT_FILE_SYSTEM ? "system" : "user", |
|
- arg_scope == UNIT_FILE_SYSTEM ? "" : " --user", |
|
+ arg_scope == LOOKUP_SCOPE_SYSTEM ? "system" : "user", |
|
+ arg_scope == LOOKUP_SCOPE_SYSTEM ? "" : " --user", |
|
name[0] == '-' ? " --" : "", |
|
name); |
|
|
|
@@ -242,7 +242,7 @@ static const char** make_extra_args(const char *extra_args[static 4]) { |
|
|
|
assert(extra_args); |
|
|
|
- if (arg_scope != UNIT_FILE_SYSTEM) |
|
+ if (arg_scope != LOOKUP_SCOPE_SYSTEM) |
|
extra_args[n++] = "--user"; |
|
|
|
if (arg_transport == BUS_TRANSPORT_REMOTE) { |
|
diff --git a/src/systemctl/systemctl-sysv-compat.c b/src/systemctl/systemctl-sysv-compat.c |
|
index c6e8defd1b..f6889993ed 100644 |
|
--- a/src/systemctl/systemctl-sysv-compat.c |
|
+++ b/src/systemctl/systemctl-sysv-compat.c |
|
@@ -116,7 +116,7 @@ int enable_sysv_units(const char *verb, char **args) { |
|
|
|
/* Processes all SysV units, and reshuffles the array so that afterwards only the native units remain */ |
|
|
|
- if (arg_scope != UNIT_FILE_SYSTEM) |
|
+ if (arg_scope != LOOKUP_SCOPE_SYSTEM) |
|
return 0; |
|
|
|
if (getenv_bool("SYSTEMCTL_SKIP_SYSV") > 0) |
|
diff --git a/src/systemctl/systemctl-util.c b/src/systemctl/systemctl-util.c |
|
index db40154943..c39e0b7d5d 100644 |
|
--- a/src/systemctl/systemctl-util.c |
|
+++ b/src/systemctl/systemctl-util.c |
|
@@ -46,7 +46,7 @@ int acquire_bus(BusFocus focus, sd_bus **ret) { |
|
if (!buses[focus]) { |
|
bool user; |
|
|
|
- user = arg_scope != UNIT_FILE_SYSTEM; |
|
+ user = arg_scope != LOOKUP_SCOPE_SYSTEM; |
|
|
|
if (focus == BUS_MANAGER) |
|
r = bus_connect_transport_systemd(arg_transport, arg_host, user, &buses[focus]); |
|
@@ -73,7 +73,7 @@ void ask_password_agent_open_maybe(void) { |
|
if (arg_dry_run) |
|
return; |
|
|
|
- if (arg_scope != UNIT_FILE_SYSTEM) |
|
+ if (arg_scope != LOOKUP_SCOPE_SYSTEM) |
|
return; |
|
|
|
ask_password_agent_open_if_enabled(arg_transport, arg_ask_password); |
|
@@ -82,7 +82,7 @@ void ask_password_agent_open_maybe(void) { |
|
void polkit_agent_open_maybe(void) { |
|
/* Open the polkit agent as a child process if necessary */ |
|
|
|
- if (arg_scope != UNIT_FILE_SYSTEM) |
|
+ if (arg_scope != LOOKUP_SCOPE_SYSTEM) |
|
return; |
|
|
|
polkit_agent_open_if_enabled(arg_transport, arg_ask_password); |
|
@@ -380,7 +380,7 @@ void warn_unit_file_changed(const char *unit) { |
|
ansi_highlight_red(), |
|
ansi_normal(), |
|
unit, |
|
- arg_scope == UNIT_FILE_SYSTEM ? "" : " --user"); |
|
+ arg_scope == LOOKUP_SCOPE_SYSTEM ? "" : " --user"); |
|
} |
|
|
|
int unit_file_find_path(LookupPaths *lp, const char *unit_name, char **ret_unit_path) { |
|
@@ -814,7 +814,7 @@ bool install_client_side(void) { |
|
if (!isempty(arg_root)) |
|
return true; |
|
|
|
- if (arg_scope == UNIT_FILE_GLOBAL) |
|
+ if (arg_scope == LOOKUP_SCOPE_GLOBAL) |
|
return true; |
|
|
|
/* Unsupported environment variable, mostly for debugging purposes */ |
|
diff --git a/src/systemctl/systemctl.c b/src/systemctl/systemctl.c |
|
index 0489796a75..094cceebd6 100644 |
|
--- a/src/systemctl/systemctl.c |
|
+++ b/src/systemctl/systemctl.c |
|
@@ -66,7 +66,7 @@ char **arg_properties = NULL; |
|
bool arg_all = false; |
|
enum dependency arg_dependency = DEPENDENCY_FORWARD; |
|
const char *_arg_job_mode = NULL; |
|
-UnitFileScope arg_scope = UNIT_FILE_SYSTEM; |
|
+LookupScope arg_scope = LOOKUP_SCOPE_SYSTEM; |
|
bool arg_wait = false; |
|
bool arg_no_block = false; |
|
int arg_legend = -1; /* -1: true, unless --quiet is passed, 1: true */ |
|
@@ -616,15 +616,15 @@ static int systemctl_parse_argv(int argc, char *argv[]) { |
|
break; |
|
|
|
case ARG_USER: |
|
- arg_scope = UNIT_FILE_USER; |
|
+ arg_scope = LOOKUP_SCOPE_USER; |
|
break; |
|
|
|
case ARG_SYSTEM: |
|
- arg_scope = UNIT_FILE_SYSTEM; |
|
+ arg_scope = LOOKUP_SCOPE_SYSTEM; |
|
break; |
|
|
|
case ARG_GLOBAL: |
|
- arg_scope = UNIT_FILE_GLOBAL; |
|
+ arg_scope = LOOKUP_SCOPE_GLOBAL; |
|
break; |
|
|
|
case ARG_WAIT: |
|
@@ -924,10 +924,10 @@ static int systemctl_parse_argv(int argc, char *argv[]) { |
|
|
|
/* If we are in --user mode, there's no point in talking to PolicyKit or the infra to query system |
|
* passwords */ |
|
- if (arg_scope != UNIT_FILE_SYSTEM) |
|
+ if (arg_scope != LOOKUP_SCOPE_SYSTEM) |
|
arg_ask_password = false; |
|
|
|
- if (arg_transport == BUS_TRANSPORT_REMOTE && arg_scope != UNIT_FILE_SYSTEM) |
|
+ if (arg_transport == BUS_TRANSPORT_REMOTE && arg_scope != LOOKUP_SCOPE_SYSTEM) |
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), |
|
"Cannot access user instance remotely."); |
|
|
|
diff --git a/src/systemctl/systemctl.h b/src/systemctl/systemctl.h |
|
index d6b9d7495c..7507398c4a 100644 |
|
--- a/src/systemctl/systemctl.h |
|
+++ b/src/systemctl/systemctl.h |
|
@@ -51,7 +51,7 @@ extern char **arg_properties; |
|
extern bool arg_all; |
|
extern enum dependency arg_dependency; |
|
extern const char *_arg_job_mode; |
|
-extern UnitFileScope arg_scope; |
|
+extern LookupScope arg_scope; |
|
extern bool arg_wait; |
|
extern bool arg_no_block; |
|
extern int arg_legend; |
|
diff --git a/src/sysv-generator/sysv-generator.c b/src/sysv-generator/sysv-generator.c |
|
index 428509f4ce..14ae873dc0 100644 |
|
--- a/src/sysv-generator/sysv-generator.c |
|
+++ b/src/sysv-generator/sysv-generator.c |
|
@@ -747,7 +747,7 @@ static int enumerate_sysv(const LookupPaths *lp, Hashmap *all_services) { |
|
if (hashmap_contains(all_services, name)) |
|
continue; |
|
|
|
- r = unit_file_exists(UNIT_FILE_SYSTEM, lp, name); |
|
+ r = unit_file_exists(LOOKUP_SCOPE_SYSTEM, lp, name); |
|
if (r < 0 && !IN_SET(r, -ELOOP, -ERFKILL, -EADDRNOTAVAIL)) { |
|
log_debug_errno(r, "Failed to detect whether %s exists, skipping: %m", name); |
|
continue; |
|
@@ -891,7 +891,7 @@ static int run(const char *dest, const char *dest_early, const char *dest_late) |
|
|
|
assert_se(arg_dest = dest_late); |
|
|
|
- r = lookup_paths_init_or_warn(&lp, UNIT_FILE_SYSTEM, LOOKUP_PATHS_EXCLUDE_GENERATED, NULL); |
|
+ r = lookup_paths_init_or_warn(&lp, LOOKUP_SCOPE_SYSTEM, LOOKUP_PATHS_EXCLUDE_GENERATED, NULL); |
|
if (r < 0) |
|
return r; |
|
|
|
diff --git a/src/test/test-bpf-firewall.c b/src/test/test-bpf-firewall.c |
|
index 2e19db600e..cebd7d8a8b 100644 |
|
--- a/src/test/test-bpf-firewall.c |
|
+++ b/src/test/test-bpf-firewall.c |
|
@@ -97,7 +97,7 @@ int main(int argc, char *argv[]) { |
|
|
|
/* The simple tests succeeded. Now let's try full unit-based use-case. */ |
|
|
|
- assert_se(manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
+ assert_se(manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
assert_se(manager_startup(m, NULL, NULL, NULL) >= 0); |
|
|
|
assert_se(u = unit_new(m, sizeof(Service))); |
|
diff --git a/src/test/test-bpf-foreign-programs.c b/src/test/test-bpf-foreign-programs.c |
|
index 56933c87bf..45b685d219 100644 |
|
--- a/src/test/test-bpf-foreign-programs.c |
|
+++ b/src/test/test-bpf-foreign-programs.c |
|
@@ -301,7 +301,7 @@ int main(int argc, char *argv[]) { |
|
assert_se(set_unit_path(unit_dir) >= 0); |
|
assert_se(runtime_dir = setup_fake_runtime_dir()); |
|
|
|
- assert_se(manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
+ assert_se(manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
assert_se(manager_startup(m, NULL, NULL, NULL) >= 0); |
|
|
|
assert_se(test_bpf_cgroup_programs(m, |
|
diff --git a/src/test/test-bpf-lsm.c b/src/test/test-bpf-lsm.c |
|
index 4a3b327a3f..812f7e99fb 100644 |
|
--- a/src/test/test-bpf-lsm.c |
|
+++ b/src/test/test-bpf-lsm.c |
|
@@ -92,7 +92,7 @@ int main(int argc, char *argv[]) { |
|
assert_se(set_unit_path(unit_dir) >= 0); |
|
assert_se(runtime_dir = setup_fake_runtime_dir()); |
|
|
|
- assert_se(manager_new(UNIT_FILE_SYSTEM, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
+ assert_se(manager_new(LOOKUP_SCOPE_SYSTEM, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
assert_se(manager_startup(m, NULL, NULL, NULL) >= 0); |
|
|
|
/* We need to enable access to the filesystem where the binary is so we |
|
diff --git a/src/test/test-cgroup-mask.c b/src/test/test-cgroup-mask.c |
|
index 6058f32b0e..57483f72c2 100644 |
|
--- a/src/test/test-cgroup-mask.c |
|
+++ b/src/test/test-cgroup-mask.c |
|
@@ -42,7 +42,7 @@ TEST_RET(cgroup_mask, .sd_booted = true) { |
|
assert_se(get_testdata_dir("units", &unit_dir) >= 0); |
|
assert_se(set_unit_path(unit_dir) >= 0); |
|
assert_se(runtime_dir = setup_fake_runtime_dir()); |
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_BASIC, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_BASIC, &m); |
|
if (IN_SET(r, -EPERM, -EACCES)) { |
|
log_error_errno(r, "manager_new: %m"); |
|
return log_tests_skipped("cannot create manager"); |
|
diff --git a/src/test/test-cgroup-unit-default.c b/src/test/test-cgroup-unit-default.c |
|
index 4c8de1e382..94201a3ccc 100644 |
|
--- a/src/test/test-cgroup-unit-default.c |
|
+++ b/src/test/test-cgroup-unit-default.c |
|
@@ -26,7 +26,7 @@ TEST_RET(default_memory_low, .sd_booted = true) { |
|
assert_se(get_testdata_dir("units", &unit_dir) >= 0); |
|
assert_se(set_unit_path(unit_dir) >= 0); |
|
assert_se(runtime_dir = setup_fake_runtime_dir()); |
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_BASIC, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_BASIC, &m); |
|
if (IN_SET(r, -EPERM, -EACCES)) { |
|
log_error_errno(r, "manager_new: %m"); |
|
return log_tests_skipped("cannot create manager"); |
|
diff --git a/src/test/test-engine.c b/src/test/test-engine.c |
|
index 673c665612..70f727d91c 100644 |
|
--- a/src/test/test-engine.c |
|
+++ b/src/test/test-engine.c |
|
@@ -93,7 +93,7 @@ int main(int argc, char *argv[]) { |
|
assert_se(set_unit_path(unit_dir) >= 0); |
|
assert_se(runtime_dir = setup_fake_runtime_dir()); |
|
|
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_BASIC, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_BASIC, &m); |
|
if (manager_errno_skip_test(r)) |
|
return log_tests_skipped_errno(r, "manager_new"); |
|
assert_se(r >= 0); |
|
diff --git a/src/test/test-execute.c b/src/test/test-execute.c |
|
index 3b4b02184c..3505e81a43 100644 |
|
--- a/src/test/test-execute.c |
|
+++ b/src/test/test-execute.c |
|
@@ -1116,7 +1116,7 @@ typedef struct test_entry { |
|
|
|
#define entry(x) {x, #x} |
|
|
|
-static int run_tests(UnitFileScope scope, const test_entry tests[], char **patterns) { |
|
+static int run_tests(LookupScope scope, const test_entry tests[], char **patterns) { |
|
_cleanup_(manager_freep) Manager *m = NULL; |
|
int r; |
|
|
|
@@ -1238,11 +1238,11 @@ int main(int argc, char *argv[]) { |
|
assert_se(unsetenv("VAR2") == 0); |
|
assert_se(unsetenv("VAR3") == 0); |
|
|
|
- r = run_tests(UNIT_FILE_USER, user_tests, argv + 1); |
|
+ r = run_tests(LOOKUP_SCOPE_USER, user_tests, argv + 1); |
|
if (r != 0) |
|
return r; |
|
|
|
- r = run_tests(UNIT_FILE_SYSTEM, system_tests, argv + 1); |
|
+ r = run_tests(LOOKUP_SCOPE_SYSTEM, system_tests, argv + 1); |
|
if (r != 0) |
|
return r; |
|
|
|
@@ -1264,11 +1264,11 @@ int main(int argc, char *argv[]) { |
|
|
|
can_unshare = false; |
|
|
|
- r = run_tests(UNIT_FILE_USER, user_tests, argv + 1); |
|
+ r = run_tests(LOOKUP_SCOPE_USER, user_tests, argv + 1); |
|
if (r != 0) |
|
return r; |
|
|
|
- return run_tests(UNIT_FILE_SYSTEM, system_tests, argv + 1); |
|
+ return run_tests(LOOKUP_SCOPE_SYSTEM, system_tests, argv + 1); |
|
#else |
|
return 0; |
|
#endif |
|
diff --git a/src/test/test-install-root.c b/src/test/test-install-root.c |
|
index dca695d124..a36536b85b 100644 |
|
--- a/src/test/test-install-root.c |
|
+++ b/src/test/test-install-root.c |
|
@@ -23,41 +23,41 @@ TEST(basic_mask_and_enable) { |
|
UnitFileChange *changes = NULL; |
|
size_t n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "a.service", NULL) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "b.service", NULL) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "c.service", NULL) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "d.service", NULL) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "e.service", NULL) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "f.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "a.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "b.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "c.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "d.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "e.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "f.service", NULL) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/a.service"); |
|
assert_se(write_string_file(p, |
|
"[Install]\n" |
|
"WantedBy=multi-user.target\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "a.service", NULL) >= 0); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "a.service", NULL) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/b.service"); |
|
assert_se(symlink("a.service", p) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "b.service", NULL) >= 0); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "b.service", NULL) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/c.service"); |
|
assert_se(symlink("/usr/lib/systemd/system/a.service", p) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "c.service", NULL) >= 0); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "c.service", NULL) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/d.service"); |
|
assert_se(symlink("c.service", p) >= 0); |
|
|
|
/* This one is interesting, as d follows a relative, then an absolute symlink */ |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "d.service", NULL) >= 0); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "d.service", NULL) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
|
|
- assert_se(unit_file_mask(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_mask(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "/dev/null")); |
|
@@ -67,17 +67,17 @@ TEST(basic_mask_and_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
|
|
/* Enabling a masked unit should fail! */ |
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) == -ERFKILL); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) == -ERFKILL); |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_unmask(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_unmask(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/a.service"); |
|
@@ -85,7 +85,7 @@ TEST(basic_mask_and_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) == 1); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) == 1); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../a.service")); |
|
@@ -94,18 +94,18 @@ TEST(basic_mask_and_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
|
|
/* Enabling it again should succeed but be a NOP */ |
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 0); |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_disable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/a.service"); |
|
@@ -113,19 +113,19 @@ TEST(basic_mask_and_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
|
|
/* Disabling a disabled unit must succeed but be a NOP */ |
|
- assert_se(unit_file_disable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("a.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 0); |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
/* Let's enable this indirectly via a symlink */ |
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("d.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("d.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../a.service")); |
|
@@ -134,14 +134,14 @@ TEST(basic_mask_and_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
|
|
/* Let's try to reenable */ |
|
|
|
- assert_se(unit_file_reenable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("b.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_reenable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("b.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 2); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/a.service"); |
|
@@ -152,24 +152,24 @@ TEST(basic_mask_and_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "a.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "b.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "c.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "d.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
|
|
/* Test masking with relative symlinks */ |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/e.service"); |
|
assert_se(symlink("../../../../../../dev/null", p) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "e.service", NULL) >= 0); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "e.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "e.service", NULL) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "e.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
|
|
assert_se(unlink(p) == 0); |
|
assert_se(symlink("/usr/../dev/null", p) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "e.service", NULL) >= 0); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "e.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "e.service", NULL) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "e.service", &state) >= 0 && state == UNIT_FILE_MASKED); |
|
|
|
assert_se(unlink(p) == 0); |
|
|
|
@@ -180,10 +180,10 @@ TEST(basic_mask_and_enable) { |
|
"[Install]\n" |
|
"WantedBy=x.target\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "f.service", NULL) >= 0); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "f.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "f.service", NULL) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "f.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("f.service"), &changes, &n_changes) == 1); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("f.service"), &changes, &n_changes) == 1); |
|
assert_se(n_changes == 2); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../f.service")); |
|
@@ -196,7 +196,7 @@ TEST(basic_mask_and_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "f.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "f.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
} |
|
|
|
TEST(linked_units) { |
|
@@ -236,9 +236,9 @@ TEST(linked_units) { |
|
"[Install]\n" |
|
"WantedBy=multi-user.target\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked.service", NULL) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked2.service", NULL) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked3.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked2.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked3.service", NULL) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/linked2.service"); |
|
assert_se(symlink("/opt/linked2.service", p) >= 0); |
|
@@ -246,12 +246,12 @@ TEST(linked_units) { |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/linked3.service"); |
|
assert_se(symlink("/opt/linked3.service", p) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked3.service", &state) >= 0 && state == UNIT_FILE_LINKED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked3.service", &state) >= 0 && state == UNIT_FILE_LINKED); |
|
|
|
/* First, let's link the unit into the search path */ |
|
- assert_se(unit_file_link(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("/opt/linked.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_link(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("/opt/linked.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "/opt/linked.service")); |
|
@@ -260,10 +260,10 @@ TEST(linked_units) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked.service", &state) >= 0 && state == UNIT_FILE_LINKED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked.service", &state) >= 0 && state == UNIT_FILE_LINKED); |
|
|
|
/* Let's unlink it from the search path again */ |
|
- assert_se(unit_file_disable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("linked.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("linked.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/linked.service"); |
|
@@ -271,10 +271,10 @@ TEST(linked_units) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked.service", NULL) == -ENOENT); |
|
|
|
/* Now, let's not just link it, but also enable it */ |
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("/opt/linked.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("/opt/linked.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 2); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/linked.service"); |
|
q = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/linked.service"); |
|
@@ -294,10 +294,10 @@ TEST(linked_units) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
|
|
/* And let's unlink it again */ |
|
- assert_se(unit_file_disable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("linked.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("linked.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 2); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/linked.service"); |
|
q = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/linked.service"); |
|
@@ -315,9 +315,9 @@ TEST(linked_units) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "linked.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "linked.service", NULL) == -ENOENT); |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("linked2.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("linked2.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 2); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/linked2.service"); |
|
q = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/linked2.service"); |
|
@@ -337,7 +337,7 @@ TEST(linked_units) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("linked3.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("linked3.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(startswith(changes[0].path, root)); |
|
@@ -359,18 +359,18 @@ TEST(default) { |
|
p = strjoina(root, "/usr/lib/systemd/system/test-default.target"); |
|
assert_se(symlink("test-default-real.target", p) >= 0); |
|
|
|
- assert_se(unit_file_get_default(UNIT_FILE_SYSTEM, root, &def) == -ENOENT); |
|
+ assert_se(unit_file_get_default(LOOKUP_SCOPE_SYSTEM, root, &def) == -ENOENT); |
|
|
|
- assert_se(unit_file_set_default(UNIT_FILE_SYSTEM, 0, root, "idontexist.target", &changes, &n_changes) == -ENOENT); |
|
+ assert_se(unit_file_set_default(LOOKUP_SCOPE_SYSTEM, 0, root, "idontexist.target", &changes, &n_changes) == -ENOENT); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == -ENOENT); |
|
assert_se(streq_ptr(changes[0].path, "idontexist.target")); |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_default(UNIT_FILE_SYSTEM, root, &def) == -ENOENT); |
|
+ assert_se(unit_file_get_default(LOOKUP_SCOPE_SYSTEM, root, &def) == -ENOENT); |
|
|
|
- assert_se(unit_file_set_default(UNIT_FILE_SYSTEM, 0, root, "test-default.target", &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_set_default(LOOKUP_SCOPE_SYSTEM, 0, root, "test-default.target", &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "test-default-real.target")); |
|
@@ -379,7 +379,7 @@ TEST(default) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_default(UNIT_FILE_SYSTEM, root, &def) >= 0); |
|
+ assert_se(unit_file_get_default(LOOKUP_SCOPE_SYSTEM, root, &def) >= 0); |
|
assert_se(streq_ptr(def, "test-default-real.target")); |
|
} |
|
|
|
@@ -400,7 +400,7 @@ TEST(add_dependency) { |
|
p = strjoina(root, "/usr/lib/systemd/system/add-dependency-test-service.service"); |
|
assert_se(symlink("real-add-dependency-test-service.service", p) >= 0); |
|
|
|
- assert_se(unit_file_add_dependency(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("add-dependency-test-service.service"), "add-dependency-test-target.target", UNIT_WANTS, &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_add_dependency(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("add-dependency-test-service.service"), "add-dependency-test-target.target", UNIT_WANTS, &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../real-add-dependency-test-service.service")); |
|
@@ -418,10 +418,10 @@ TEST(template_enable) { |
|
|
|
log_info("== %s ==", __func__); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@def.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@foo.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@foo.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@def.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@foo.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@foo.service", &state) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/template@.service"); |
|
assert_se(write_string_file(p, |
|
@@ -432,16 +432,16 @@ TEST(template_enable) { |
|
p = strjoina(root, "/usr/lib/systemd/system/template-symlink@.service"); |
|
assert_se(symlink("template@.service", p) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
log_info("== %s with template@.service enabled ==", __func__); |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("template@.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("template@.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../template@.service")); |
|
@@ -450,30 +450,30 @@ TEST(template_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_disable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("template@.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("template@.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
assert_se(streq(changes[0].path, p)); |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
log_info("== %s with template@foo.service enabled ==", __func__); |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("template@foo.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("template@foo.service"), &changes, &n_changes) >= 0); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../template@foo.service")); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/template@foo.service"); |
|
@@ -481,33 +481,33 @@ TEST(template_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@.service", &state) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@.service", &state) >= 0); |
|
assert_se(state == UNIT_FILE_INDIRECT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
|
|
- assert_se(unit_file_disable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("template@foo.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("template@foo.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
assert_se(streq(changes[0].path, p)); |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@quux.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@quux.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@quux.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@quux.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
log_info("== %s with template-symlink@quux.service enabled ==", __func__); |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("template-symlink@quux.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("template-symlink@quux.service"), &changes, &n_changes) >= 0); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../template@quux.service")); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/template@quux.service"); |
|
@@ -515,14 +515,14 @@ TEST(template_enable) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_INDIRECT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template@quux.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "template-symlink@quux.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@.service", &state) >= 0 && state == UNIT_FILE_INDIRECT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template@quux.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "template-symlink@quux.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
} |
|
|
|
TEST(indirect) { |
|
@@ -531,9 +531,9 @@ TEST(indirect) { |
|
UnitFileState state; |
|
const char *p; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "indirecta.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "indirectb.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "indirectc.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "indirecta.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "indirectb.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "indirectc.service", &state) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/indirecta.service"); |
|
assert_se(write_string_file(p, |
|
@@ -548,11 +548,11 @@ TEST(indirect) { |
|
p = strjoina(root, "/usr/lib/systemd/system/indirectc.service"); |
|
assert_se(symlink("indirecta.service", p) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "indirecta.service", &state) >= 0 && state == UNIT_FILE_INDIRECT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "indirectb.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "indirectc.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "indirecta.service", &state) >= 0 && state == UNIT_FILE_INDIRECT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "indirectb.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "indirectc.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("indirectc.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("indirectc.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../indirectb.service")); |
|
@@ -561,11 +561,11 @@ TEST(indirect) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "indirecta.service", &state) >= 0 && state == UNIT_FILE_INDIRECT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "indirectb.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "indirectc.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "indirecta.service", &state) >= 0 && state == UNIT_FILE_INDIRECT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "indirectb.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "indirectc.service", &state) >= 0 && state == UNIT_FILE_ALIAS); |
|
|
|
- assert_se(unit_file_disable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("indirectc.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("indirectc.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/indirectb.service"); |
|
@@ -583,8 +583,8 @@ TEST(preset_and_list) { |
|
UnitFileList *fl; |
|
Hashmap *h; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-yes.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-no.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-yes.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-no.service", &state) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/preset-yes.service"); |
|
assert_se(write_string_file(p, |
|
@@ -601,10 +601,10 @@ TEST(preset_and_list) { |
|
"enable *-yes.*\n" |
|
"disable *\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_preset(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("preset-yes.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_preset(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("preset-yes.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../preset-yes.service")); |
|
@@ -613,10 +613,10 @@ TEST(preset_and_list) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_disable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("preset-yes.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("preset-yes.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/preset-yes.service"); |
|
@@ -624,18 +624,18 @@ TEST(preset_and_list) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_preset(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("preset-no.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_preset(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("preset-no.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 0); |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_preset_all(UNIT_FILE_SYSTEM, 0, root, UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_preset_all(LOOKUP_SCOPE_SYSTEM, 0, root, UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
|
|
assert_se(n_changes > 0); |
|
|
|
@@ -653,17 +653,17 @@ TEST(preset_and_list) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-yes.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "preset-no.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
assert_se(h = hashmap_new(&string_hash_ops)); |
|
- assert_se(unit_file_get_list(UNIT_FILE_SYSTEM, root, h, NULL, NULL) >= 0); |
|
+ assert_se(unit_file_get_list(LOOKUP_SCOPE_SYSTEM, root, h, NULL, NULL) >= 0); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/preset-yes.service"); |
|
q = strjoina(root, "/usr/lib/systemd/system/preset-no.service"); |
|
|
|
HASHMAP_FOREACH(fl, h) { |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, basename(fl->path), &state) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, basename(fl->path), &state) >= 0); |
|
assert_se(fl->state == state); |
|
|
|
if (streq(fl->path, p)) { |
|
@@ -687,17 +687,17 @@ TEST(revert) { |
|
UnitFileChange *changes = NULL; |
|
size_t n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "xx.service", NULL) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "yy.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "xx.service", NULL) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "yy.service", NULL) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/xx.service"); |
|
assert_se(write_string_file(p, "# Empty\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "xx.service", NULL) >= 0); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "xx.service", &state) >= 0 && state == UNIT_FILE_STATIC); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "xx.service", NULL) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "xx.service", &state) >= 0 && state == UNIT_FILE_STATIC); |
|
|
|
/* Initially there's nothing to revert */ |
|
- assert_se(unit_file_revert(UNIT_FILE_SYSTEM, root, STRV_MAKE("xx.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_revert(LOOKUP_SCOPE_SYSTEM, root, STRV_MAKE("xx.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 0); |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
@@ -706,7 +706,7 @@ TEST(revert) { |
|
assert_se(write_string_file(p, "# Empty override\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
/* Revert the override file */ |
|
- assert_se(unit_file_revert(UNIT_FILE_SYSTEM, root, STRV_MAKE("xx.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_revert(LOOKUP_SCOPE_SYSTEM, root, STRV_MAKE("xx.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
assert_se(streq(changes[0].path, p)); |
|
@@ -717,7 +717,7 @@ TEST(revert) { |
|
assert_se(write_string_file(p, "# Empty dropin\n", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) >= 0); |
|
|
|
/* Revert the dropin file */ |
|
- assert_se(unit_file_revert(UNIT_FILE_SYSTEM, root, STRV_MAKE("xx.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_revert(LOOKUP_SCOPE_SYSTEM, root, STRV_MAKE("xx.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 2); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
assert_se(streq(changes[0].path, p)); |
|
@@ -735,8 +735,8 @@ TEST(preset_order) { |
|
const char *p; |
|
UnitFileState state; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "prefix-1.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "prefix-2.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "prefix-1.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "prefix-2.service", &state) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/prefix-1.service"); |
|
assert_se(write_string_file(p, |
|
@@ -754,10 +754,10 @@ TEST(preset_order) { |
|
"disable prefix-*.service\n" |
|
"enable prefix-2.service\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "prefix-1.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "prefix-2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "prefix-1.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "prefix-2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_preset(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("prefix-1.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_preset(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("prefix-1.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../prefix-1.service")); |
|
@@ -766,36 +766,36 @@ TEST(preset_order) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "prefix-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "prefix-2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "prefix-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "prefix-2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_preset(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("prefix-2.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_preset(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("prefix-2.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "prefix-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "prefix-2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "prefix-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "prefix-2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
} |
|
|
|
TEST(static_instance) { |
|
UnitFileState state; |
|
const char *p; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "static-instance@.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "static-instance@foo.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "static-instance@.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "static-instance@foo.service", &state) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/static-instance@.service"); |
|
assert_se(write_string_file(p, |
|
"[Install]\n" |
|
"WantedBy=multi-user.target\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "static-instance@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "static-instance@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "static-instance@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "static-instance@foo.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/static-instance@foo.service"); |
|
assert_se(symlink("static-instance@.service", p) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "static-instance@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "static-instance@foo.service", &state) >= 0 && state == UNIT_FILE_STATIC); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "static-instance@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "static-instance@foo.service", &state) >= 0 && state == UNIT_FILE_STATIC); |
|
} |
|
|
|
TEST(with_dropin) { |
|
@@ -804,11 +804,11 @@ TEST(with_dropin) { |
|
UnitFileChange *changes = NULL; |
|
size_t n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-1.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-2.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-3.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-4a.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-4b.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-1.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-2.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-3.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-4a.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-4b.service", &state) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/with-dropin-1.service"); |
|
assert_se(write_string_file(p, |
|
@@ -820,7 +820,7 @@ TEST(with_dropin) { |
|
"[Install]\n" |
|
"WantedBy=graphical.target\n", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-1.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-1.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/with-dropin-2.service"); |
|
assert_se(write_string_file(p, |
|
@@ -832,7 +832,7 @@ TEST(with_dropin) { |
|
"[Install]\n" |
|
"WantedBy=graphical.target\n", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-2.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/with-dropin-3.service"); |
|
assert_se(write_string_file(p, |
|
@@ -844,7 +844,7 @@ TEST(with_dropin) { |
|
"[Install]\n" |
|
"WantedBy=graphical.target\n", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-3.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-3.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/with-dropin-4a.service"); |
|
assert_se(write_string_file(p, |
|
@@ -856,16 +856,16 @@ TEST(with_dropin) { |
|
"[Install]\n" |
|
"Also=with-dropin-4b.service\n", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-4a.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-4a.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/with-dropin-4b.service"); |
|
assert_se(write_string_file(p, |
|
"[Install]\n" |
|
"WantedBy=multi-user.target\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-4b.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-4b.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("with-dropin-1.service"), &changes, &n_changes) == 1); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("with-dropin-1.service"), &changes, &n_changes) == 1); |
|
assert_se(n_changes == 2); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(changes[1].type_or_errno == UNIT_FILE_SYMLINK); |
|
@@ -878,8 +878,8 @@ TEST(with_dropin) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("with-dropin-2.service"), &changes, &n_changes) == 1); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-2.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("with-dropin-2.service"), &changes, &n_changes) == 1); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-2.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
assert_se(n_changes == 2); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(changes[1].type_or_errno == UNIT_FILE_SYMLINK); |
|
@@ -892,8 +892,8 @@ TEST(with_dropin) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("with-dropin-3.service"), &changes, &n_changes) == 1); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-3.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("with-dropin-3.service"), &changes, &n_changes) == 1); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-3.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
assert_se(n_changes == 2); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(changes[1].type_or_errno == UNIT_FILE_SYMLINK); |
|
@@ -906,8 +906,8 @@ TEST(with_dropin) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("with-dropin-4a.service"), &changes, &n_changes) == 2); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-3.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("with-dropin-4a.service"), &changes, &n_changes) == 2); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-3.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
assert_se(n_changes == 2); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(changes[1].type_or_errno == UNIT_FILE_SYMLINK); |
|
@@ -920,11 +920,11 @@ TEST(with_dropin) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-2.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-3.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-4a.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-4b.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-2.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-3.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-4a.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-4b.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
} |
|
|
|
TEST(with_dropin_template) { |
|
@@ -933,9 +933,9 @@ TEST(with_dropin_template) { |
|
UnitFileChange *changes = NULL; |
|
size_t n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-1@.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-2@.service", &state) == -ENOENT); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-3@.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-1@.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-2@.service", &state) == -ENOENT); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-3@.service", &state) == -ENOENT); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/with-dropin-1@.service"); |
|
assert_se(write_string_file(p, |
|
@@ -947,7 +947,7 @@ TEST(with_dropin_template) { |
|
"[Install]\n" |
|
"WantedBy=graphical.target\n", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-1@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-1@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/with-dropin-2@.service"); |
|
assert_se(write_string_file(p, |
|
@@ -959,7 +959,7 @@ TEST(with_dropin_template) { |
|
"[Install]\n" |
|
"WantedBy=graphical.target\n", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-2@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-2@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system/with-dropin-3@.service"); |
|
assert_se(write_string_file(p, |
|
@@ -972,9 +972,9 @@ TEST(with_dropin_template) { |
|
"[Install]\n" |
|
"DefaultInstance=instance-2\n", WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_MKDIR_0755) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-3@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-3@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("with-dropin-1@instance-1.service"), &changes, &n_changes) == 1); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("with-dropin-1@instance-1.service"), &changes, &n_changes) == 1); |
|
assert_se(n_changes == 2); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(changes[1].type_or_errno == UNIT_FILE_SYMLINK); |
|
@@ -987,7 +987,7 @@ TEST(with_dropin_template) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("with-dropin-2@instance-1.service"), &changes, &n_changes) == 1); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("with-dropin-2@instance-1.service"), &changes, &n_changes) == 1); |
|
assert_se(n_changes == 2); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(changes[1].type_or_errno == UNIT_FILE_SYMLINK); |
|
@@ -1000,7 +1000,7 @@ TEST(with_dropin_template) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("with-dropin-2@instance-2.service"), &changes, &n_changes) == 1); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("with-dropin-2@instance-2.service"), &changes, &n_changes) == 1); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../with-dropin-2@instance-2.service")); |
|
@@ -1009,7 +1009,7 @@ TEST(with_dropin_template) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_enable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("with-dropin-3@.service"), &changes, &n_changes) == 1); |
|
+ assert_se(unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("with-dropin-3@.service"), &changes, &n_changes) == 1); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
assert_se(streq(changes[0].source, "../with-dropin-3@.service")); |
|
@@ -1018,11 +1018,11 @@ TEST(with_dropin_template) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-1@instance-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-2@instance-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-2@instance-2.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-3@instance-1.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "with-dropin-3@instance-2.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-1@instance-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-2@instance-1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-2@instance-2.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-3@instance-1.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "with-dropin-3@instance-2.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
} |
|
|
|
TEST(preset_multiple_instances) { |
|
@@ -1038,7 +1038,7 @@ TEST(preset_multiple_instances) { |
|
"DefaultInstance=def\n" |
|
"WantedBy=multi-user.target\n", WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
p = strjoina(root, "/usr/lib/systemd/system-preset/test.preset"); |
|
assert_se(write_string_file(p, |
|
@@ -1046,11 +1046,11 @@ TEST(preset_multiple_instances) { |
|
"enable emptylist@.service\n" /* This line ensures the old functionality for templated unit still works */ |
|
"disable *\n" , WRITE_STRING_FILE_CREATE) >= 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@bar0.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@bar0.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
/* Preset a single instantiated unit specified in the list */ |
|
- assert_se(unit_file_preset(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("foo@bar0.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@bar0.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_preset(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("foo@bar0.service"), UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@bar0.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_SYMLINK); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/foo@bar0.service"); |
|
@@ -1058,7 +1058,7 @@ TEST(preset_multiple_instances) { |
|
unit_file_changes_free(changes, n_changes); |
|
changes = NULL; n_changes = 0; |
|
|
|
- assert_se(unit_file_disable(UNIT_FILE_SYSTEM, 0, root, STRV_MAKE("foo@bar0.service"), &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, root, STRV_MAKE("foo@bar0.service"), &changes, &n_changes) >= 0); |
|
assert_se(n_changes == 1); |
|
assert_se(changes[0].type_or_errno == UNIT_FILE_UNLINK); |
|
p = strjoina(root, SYSTEM_CONFIG_UNIT_DIR"/multi-user.target.wants/foo@bar0.service"); |
|
@@ -1067,17 +1067,17 @@ TEST(preset_multiple_instances) { |
|
changes = NULL; n_changes = 0; |
|
|
|
/* Check for preset-all case, only instances on the list should be enabled, not including the default instance */ |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@bar1.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@bartest.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@bar1.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@bartest.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
|
|
- assert_se(unit_file_preset_all(UNIT_FILE_SYSTEM, 0, root, UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
+ assert_se(unit_file_preset_all(LOOKUP_SCOPE_SYSTEM, 0, root, UNIT_FILE_PRESET_FULL, &changes, &n_changes) >= 0); |
|
assert_se(n_changes > 0); |
|
|
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@bar0.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@bar1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
- assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "foo@bartest.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@def.service", &state) >= 0 && state == UNIT_FILE_DISABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@bar0.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@bar1.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
+ assert_se(unit_file_get_state(LOOKUP_SCOPE_SYSTEM, root, "foo@bartest.service", &state) >= 0 && state == UNIT_FILE_ENABLED); |
|
|
|
unit_file_changes_free(changes, n_changes); |
|
} |
|
diff --git a/src/test/test-install.c b/src/test/test-install.c |
|
index 7a0beb2d24..6c5a036465 100644 |
|
--- a/src/test/test-install.c |
|
+++ b/src/test/test-install.c |
|
@@ -32,13 +32,13 @@ int main(int argc, char* argv[]) { |
|
test_setup_logging(LOG_DEBUG); |
|
|
|
h = hashmap_new(&string_hash_ops); |
|
- r = unit_file_get_list(UNIT_FILE_SYSTEM, NULL, h, NULL, NULL); |
|
+ r = unit_file_get_list(LOOKUP_SCOPE_SYSTEM, NULL, h, NULL, NULL); |
|
assert_se(r == 0); |
|
|
|
HASHMAP_FOREACH(p, h) { |
|
UnitFileState s = _UNIT_FILE_STATE_INVALID; |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, basename(p->path), &s); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, basename(p->path), &s); |
|
|
|
assert_se((r < 0 && p->state == UNIT_FILE_BAD) || |
|
(p->state == s)); |
|
@@ -52,18 +52,18 @@ int main(int argc, char* argv[]) { |
|
|
|
log_info("/*** enable **/"); |
|
|
|
- r = unit_file_enable(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
log_info("/*** enable2 **/"); |
|
|
|
- r = unit_file_enable(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, files[0], &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, files[0], &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_ENABLED); |
|
|
|
@@ -71,13 +71,13 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_disable(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, files[0], &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, files[0], &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_DISABLED); |
|
|
|
@@ -85,16 +85,16 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_mask(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_mask(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
log_info("/*** mask2 ***/"); |
|
- r = unit_file_mask(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_mask(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, files[0], &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, files[0], &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_MASKED); |
|
|
|
@@ -102,16 +102,16 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_unmask(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_unmask(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
log_info("/*** unmask2 ***/"); |
|
- r = unit_file_unmask(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_unmask(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, files[0], &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, files[0], &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_DISABLED); |
|
|
|
@@ -119,13 +119,13 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_mask(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_mask(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, files[0], &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, files[0], &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_MASKED); |
|
|
|
@@ -133,16 +133,16 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_disable(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
log_info("/*** disable2 ***/"); |
|
- r = unit_file_disable(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, files[0], &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, files[0], &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_MASKED); |
|
|
|
@@ -150,13 +150,13 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_unmask(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
+ r = unit_file_unmask(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, files[0], &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, files[0], &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_DISABLED); |
|
|
|
@@ -164,13 +164,13 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_enable(UNIT_FILE_SYSTEM, 0, NULL, (char**) files2, &changes, &n_changes); |
|
+ r = unit_file_enable(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files2, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, basename(files2[0]), &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, basename(files2[0]), &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_ENABLED); |
|
|
|
@@ -178,26 +178,26 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_disable(UNIT_FILE_SYSTEM, 0, NULL, STRV_MAKE(basename(files2[0])), &changes, &n_changes); |
|
+ r = unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, NULL, STRV_MAKE(basename(files2[0])), &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, basename(files2[0]), &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, basename(files2[0]), &state); |
|
assert_se(r < 0); |
|
|
|
log_info("/*** link files2 ***/"); |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_link(UNIT_FILE_SYSTEM, 0, NULL, (char**) files2, &changes, &n_changes); |
|
+ r = unit_file_link(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files2, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, basename(files2[0]), &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, basename(files2[0]), &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_LINKED); |
|
|
|
@@ -205,26 +205,26 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_disable(UNIT_FILE_SYSTEM, 0, NULL, STRV_MAKE(basename(files2[0])), &changes, &n_changes); |
|
+ r = unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, NULL, STRV_MAKE(basename(files2[0])), &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, basename(files2[0]), &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, basename(files2[0]), &state); |
|
assert_se(r < 0); |
|
|
|
log_info("/*** link files2 ***/"); |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_link(UNIT_FILE_SYSTEM, 0, NULL, (char**) files2, &changes, &n_changes); |
|
+ r = unit_file_link(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files2, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, basename(files2[0]), &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, basename(files2[0]), &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_LINKED); |
|
|
|
@@ -232,13 +232,13 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_reenable(UNIT_FILE_SYSTEM, 0, NULL, (char**) files2, &changes, &n_changes); |
|
+ r = unit_file_reenable(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files2, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, basename(files2[0]), &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, basename(files2[0]), &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_ENABLED); |
|
|
|
@@ -246,25 +246,25 @@ int main(int argc, char* argv[]) { |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_disable(UNIT_FILE_SYSTEM, 0, NULL, STRV_MAKE(basename(files2[0])), &changes, &n_changes); |
|
+ r = unit_file_disable(LOOKUP_SCOPE_SYSTEM, 0, NULL, STRV_MAKE(basename(files2[0])), &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, basename(files2[0]), &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, basename(files2[0]), &state); |
|
assert_se(r < 0); |
|
log_info("/*** preset files ***/"); |
|
changes = NULL; |
|
n_changes = 0; |
|
|
|
- r = unit_file_preset(UNIT_FILE_SYSTEM, 0, NULL, (char**) files, UNIT_FILE_PRESET_FULL, &changes, &n_changes); |
|
+ r = unit_file_preset(LOOKUP_SCOPE_SYSTEM, 0, NULL, (char**) files, UNIT_FILE_PRESET_FULL, &changes, &n_changes); |
|
assert_se(r >= 0); |
|
|
|
dump_changes(changes, n_changes); |
|
unit_file_changes_free(changes, n_changes); |
|
|
|
- r = unit_file_get_state(UNIT_FILE_SYSTEM, NULL, basename(files[0]), &state); |
|
+ r = unit_file_get_state(LOOKUP_SCOPE_SYSTEM, NULL, basename(files[0]), &state); |
|
assert_se(r >= 0); |
|
assert_se(state == UNIT_FILE_ENABLED); |
|
|
|
diff --git a/src/test/test-load-fragment.c b/src/test/test-load-fragment.c |
|
index a87c654f4e..46ba108266 100644 |
|
--- a/src/test/test-load-fragment.c |
|
+++ b/src/test/test-load-fragment.c |
|
@@ -43,7 +43,7 @@ TEST_RET(unit_file_get_set) { |
|
h = hashmap_new(&string_hash_ops); |
|
assert_se(h); |
|
|
|
- r = unit_file_get_list(UNIT_FILE_SYSTEM, NULL, h, NULL, NULL); |
|
+ r = unit_file_get_list(LOOKUP_SCOPE_SYSTEM, NULL, h, NULL, NULL); |
|
if (IN_SET(r, -EPERM, -EACCES)) |
|
return log_tests_skipped_errno(r, "unit_file_get_list"); |
|
|
|
@@ -102,7 +102,7 @@ TEST(config_parse_exec) { |
|
_cleanup_(manager_freep) Manager *m = NULL; |
|
_cleanup_(unit_freep) Unit *u = NULL; |
|
|
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
if (manager_errno_skip_test(r)) { |
|
log_notice_errno(r, "Skipping test: manager_new: %m"); |
|
return; |
|
@@ -461,7 +461,7 @@ TEST(config_parse_log_extra_fields) { |
|
_cleanup_(unit_freep) Unit *u = NULL; |
|
ExecContext c = {}; |
|
|
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
if (manager_errno_skip_test(r)) { |
|
log_notice_errno(r, "Skipping test: manager_new: %m"); |
|
return; |
|
@@ -544,56 +544,56 @@ TEST(install_printf, .sd_booted = true) { |
|
strcpy(i.path, d2); \ |
|
} while (false) |
|
|
|
- expect(UNIT_FILE_SYSTEM, i, "%n", "name.service"); |
|
- expect(UNIT_FILE_SYSTEM, i, "%N", "name"); |
|
- expect(UNIT_FILE_SYSTEM, i, "%p", "name"); |
|
- expect(UNIT_FILE_SYSTEM, i, "%i", ""); |
|
- expect(UNIT_FILE_SYSTEM, i, "%j", "name"); |
|
- expect(UNIT_FILE_SYSTEM, i, "%g", "root"); |
|
- expect(UNIT_FILE_SYSTEM, i, "%G", "0"); |
|
- expect(UNIT_FILE_SYSTEM, i, "%u", "root"); |
|
- expect(UNIT_FILE_SYSTEM, i, "%U", "0"); |
|
- |
|
- expect(UNIT_FILE_SYSTEM, i, "%m", mid); |
|
- expect(UNIT_FILE_SYSTEM, i, "%b", bid); |
|
- expect(UNIT_FILE_SYSTEM, i, "%H", host); |
|
- |
|
- expect(UNIT_FILE_SYSTEM, i2, "%g", "root"); |
|
- expect(UNIT_FILE_SYSTEM, i2, "%G", "0"); |
|
- expect(UNIT_FILE_SYSTEM, i2, "%u", "root"); |
|
- expect(UNIT_FILE_SYSTEM, i2, "%U", "0"); |
|
- |
|
- expect(UNIT_FILE_USER, i2, "%g", group); |
|
- expect(UNIT_FILE_USER, i2, "%G", gid); |
|
- expect(UNIT_FILE_USER, i2, "%u", user); |
|
- expect(UNIT_FILE_USER, i2, "%U", uid); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%n", "name.service"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%N", "name"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%p", "name"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%i", ""); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%j", "name"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%g", "root"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%G", "0"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%u", "root"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%U", "0"); |
|
+ |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%m", mid); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%b", bid); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i, "%H", host); |
|
+ |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i2, "%g", "root"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i2, "%G", "0"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i2, "%u", "root"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i2, "%U", "0"); |
|
+ |
|
+ expect(LOOKUP_SCOPE_USER, i2, "%g", group); |
|
+ expect(LOOKUP_SCOPE_USER, i2, "%G", gid); |
|
+ expect(LOOKUP_SCOPE_USER, i2, "%u", user); |
|
+ expect(LOOKUP_SCOPE_USER, i2, "%U", uid); |
|
|
|
/* gcc-12.0.1-0.9.fc36.x86_64 insist that streq(…, NULL) is called, |
|
* even though the call is inside of a conditional where the pointer is checked. :( */ |
|
#pragma GCC diagnostic push |
|
#pragma GCC diagnostic ignored "-Wnonnull" |
|
- expect(UNIT_FILE_GLOBAL, i2, "%g", NULL); |
|
- expect(UNIT_FILE_GLOBAL, i2, "%G", NULL); |
|
- expect(UNIT_FILE_GLOBAL, i2, "%u", NULL); |
|
- expect(UNIT_FILE_GLOBAL, i2, "%U", NULL); |
|
+ expect(LOOKUP_SCOPE_GLOBAL, i2, "%g", NULL); |
|
+ expect(LOOKUP_SCOPE_GLOBAL, i2, "%G", NULL); |
|
+ expect(LOOKUP_SCOPE_GLOBAL, i2, "%u", NULL); |
|
+ expect(LOOKUP_SCOPE_GLOBAL, i2, "%U", NULL); |
|
#pragma GCC diagnostic pop |
|
|
|
- expect(UNIT_FILE_SYSTEM, i3, "%n", "name@inst.service"); |
|
- expect(UNIT_FILE_SYSTEM, i3, "%N", "name@inst"); |
|
- expect(UNIT_FILE_SYSTEM, i3, "%p", "name"); |
|
- expect(UNIT_FILE_USER, i3, "%g", group); |
|
- expect(UNIT_FILE_USER, i3, "%G", gid); |
|
- expect(UNIT_FILE_USER, i3, "%u", user); |
|
- expect(UNIT_FILE_USER, i3, "%U", uid); |
|
- |
|
- expect(UNIT_FILE_SYSTEM, i3, "%m", mid); |
|
- expect(UNIT_FILE_SYSTEM, i3, "%b", bid); |
|
- expect(UNIT_FILE_SYSTEM, i3, "%H", host); |
|
- |
|
- expect(UNIT_FILE_USER, i4, "%g", group); |
|
- expect(UNIT_FILE_USER, i4, "%G", gid); |
|
- expect(UNIT_FILE_USER, i4, "%u", user); |
|
- expect(UNIT_FILE_USER, i4, "%U", uid); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i3, "%n", "name@inst.service"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i3, "%N", "name@inst"); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i3, "%p", "name"); |
|
+ expect(LOOKUP_SCOPE_USER, i3, "%g", group); |
|
+ expect(LOOKUP_SCOPE_USER, i3, "%G", gid); |
|
+ expect(LOOKUP_SCOPE_USER, i3, "%u", user); |
|
+ expect(LOOKUP_SCOPE_USER, i3, "%U", uid); |
|
+ |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i3, "%m", mid); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i3, "%b", bid); |
|
+ expect(LOOKUP_SCOPE_SYSTEM, i3, "%H", host); |
|
+ |
|
+ expect(LOOKUP_SCOPE_USER, i4, "%g", group); |
|
+ expect(LOOKUP_SCOPE_USER, i4, "%G", gid); |
|
+ expect(LOOKUP_SCOPE_USER, i4, "%u", user); |
|
+ expect(LOOKUP_SCOPE_USER, i4, "%U", uid); |
|
} |
|
|
|
static uint64_t make_cap(int cap) { |
|
@@ -822,7 +822,7 @@ TEST(config_parse_unit_env_file) { |
|
_cleanup_strv_free_ char **files = NULL; |
|
int r; |
|
|
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
if (manager_errno_skip_test(r)) { |
|
log_notice_errno(r, "Skipping test: manager_new: %m"); |
|
return; |
|
@@ -955,7 +955,7 @@ TEST(unit_is_recursive_template_dependency) { |
|
Unit *u; |
|
int r; |
|
|
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
if (manager_errno_skip_test(r)) { |
|
log_notice_errno(r, "Skipping test: manager_new: %m"); |
|
return; |
|
diff --git a/src/test/test-path-lookup.c b/src/test/test-path-lookup.c |
|
index 2c30260f7b..8d25e5f7b7 100644 |
|
--- a/src/test/test-path-lookup.c |
|
+++ b/src/test/test-path-lookup.c |
|
@@ -10,7 +10,7 @@ |
|
#include "strv.h" |
|
#include "tests.h" |
|
|
|
-static void test_paths_one(UnitFileScope scope) { |
|
+static void test_paths_one(LookupScope scope) { |
|
char template[] = "/tmp/test-path-lookup.XXXXXXX"; |
|
|
|
_cleanup_(lookup_paths_free) LookupPaths lp_without_env = {}; |
|
@@ -36,9 +36,9 @@ static void test_paths_one(UnitFileScope scope) { |
|
} |
|
|
|
TEST(paths) { |
|
- test_paths_one(UNIT_FILE_SYSTEM); |
|
- test_paths_one(UNIT_FILE_USER); |
|
- test_paths_one(UNIT_FILE_GLOBAL); |
|
+ test_paths_one(LOOKUP_SCOPE_SYSTEM); |
|
+ test_paths_one(LOOKUP_SCOPE_USER); |
|
+ test_paths_one(LOOKUP_SCOPE_GLOBAL); |
|
} |
|
|
|
TEST(user_and_global_paths) { |
|
@@ -50,8 +50,8 @@ TEST(user_and_global_paths) { |
|
assert_se(unsetenv("XDG_DATA_DIRS") == 0); |
|
assert_se(unsetenv("XDG_CONFIG_DIRS") == 0); |
|
|
|
- assert_se(lookup_paths_init(&lp_global, UNIT_FILE_GLOBAL, 0, NULL) == 0); |
|
- assert_se(lookup_paths_init(&lp_user, UNIT_FILE_USER, 0, NULL) == 0); |
|
+ assert_se(lookup_paths_init(&lp_global, LOOKUP_SCOPE_GLOBAL, 0, NULL) == 0); |
|
+ assert_se(lookup_paths_init(&lp_user, LOOKUP_SCOPE_USER, 0, NULL) == 0); |
|
g = lp_global.search_path; |
|
u = lp_user.search_path; |
|
|
|
@@ -72,7 +72,7 @@ TEST(user_and_global_paths) { |
|
log_info("+ %s", *p); |
|
} |
|
|
|
-static void test_generator_binary_paths_one(UnitFileScope scope) { |
|
+static void test_generator_binary_paths_one(LookupScope scope) { |
|
char template[] = "/tmp/test-path-lookup.XXXXXXX"; |
|
|
|
_cleanup_strv_free_ char **gp_without_env = NULL; |
|
@@ -88,13 +88,13 @@ static void test_generator_binary_paths_one(UnitFileScope scope) { |
|
assert_se(unsetenv("SYSTEMD_ENVIRONMENT_GENERATOR_PATH") == 0); |
|
|
|
gp_without_env = generator_binary_paths(scope); |
|
- env_gp_without_env = env_generator_binary_paths(scope == UNIT_FILE_SYSTEM ? true : false); |
|
+ env_gp_without_env = env_generator_binary_paths(scope == LOOKUP_SCOPE_SYSTEM ? true : false); |
|
|
|
- log_info("Generators dirs (%s):", scope == UNIT_FILE_SYSTEM ? "system" : "user"); |
|
+ log_info("Generators dirs (%s):", scope == LOOKUP_SCOPE_SYSTEM ? "system" : "user"); |
|
STRV_FOREACH(dir, gp_without_env) |
|
log_info(" %s", *dir); |
|
|
|
- log_info("Environment generators dirs (%s):", scope == UNIT_FILE_SYSTEM ? "system" : "user"); |
|
+ log_info("Environment generators dirs (%s):", scope == LOOKUP_SCOPE_SYSTEM ? "system" : "user"); |
|
STRV_FOREACH(dir, env_gp_without_env) |
|
log_info(" %s", *dir); |
|
|
|
@@ -107,13 +107,13 @@ static void test_generator_binary_paths_one(UnitFileScope scope) { |
|
assert_se(setenv("SYSTEMD_ENVIRONMENT_GENERATOR_PATH", systemd_env_generator_path, 1) == 0); |
|
|
|
gp_with_env = generator_binary_paths(scope); |
|
- env_gp_with_env = env_generator_binary_paths(scope == UNIT_FILE_SYSTEM ? true : false); |
|
+ env_gp_with_env = env_generator_binary_paths(scope == LOOKUP_SCOPE_SYSTEM ? true : false); |
|
|
|
- log_info("Generators dirs (%s):", scope == UNIT_FILE_SYSTEM ? "system" : "user"); |
|
+ log_info("Generators dirs (%s):", scope == LOOKUP_SCOPE_SYSTEM ? "system" : "user"); |
|
STRV_FOREACH(dir, gp_with_env) |
|
log_info(" %s", *dir); |
|
|
|
- log_info("Environment generators dirs (%s):", scope == UNIT_FILE_SYSTEM ? "system" : "user"); |
|
+ log_info("Environment generators dirs (%s):", scope == LOOKUP_SCOPE_SYSTEM ? "system" : "user"); |
|
STRV_FOREACH(dir, env_gp_with_env) |
|
log_info(" %s", *dir); |
|
|
|
@@ -122,8 +122,8 @@ static void test_generator_binary_paths_one(UnitFileScope scope) { |
|
} |
|
|
|
TEST(generator_binary_paths) { |
|
- test_generator_binary_paths_one(UNIT_FILE_SYSTEM); |
|
- test_generator_binary_paths_one(UNIT_FILE_USER); |
|
+ test_generator_binary_paths_one(LOOKUP_SCOPE_SYSTEM); |
|
+ test_generator_binary_paths_one(LOOKUP_SCOPE_USER); |
|
} |
|
|
|
DEFINE_TEST_MAIN(LOG_DEBUG); |
|
diff --git a/src/test/test-path.c b/src/test/test-path.c |
|
index 2690dc0aa4..7fb1f7363c 100644 |
|
--- a/src/test/test-path.c |
|
+++ b/src/test/test-path.c |
|
@@ -33,7 +33,7 @@ static int setup_test(Manager **m) { |
|
if (r == -ENOMEDIUM) |
|
return log_tests_skipped("cgroupfs not available"); |
|
|
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_BASIC, &tmp); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_BASIC, &tmp); |
|
if (manager_errno_skip_test(r)) |
|
return log_tests_skipped_errno(r, "manager_new"); |
|
assert_se(r >= 0); |
|
diff --git a/src/test/test-sched-prio.c b/src/test/test-sched-prio.c |
|
index 35f7be491a..721c4b61a1 100644 |
|
--- a/src/test/test-sched-prio.c |
|
+++ b/src/test/test-sched-prio.c |
|
@@ -30,7 +30,7 @@ int main(int argc, char *argv[]) { |
|
assert_se(set_unit_path(unit_dir) >= 0); |
|
assert_se(runtime_dir = setup_fake_runtime_dir()); |
|
|
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_BASIC, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_BASIC, &m); |
|
if (manager_errno_skip_test(r)) |
|
return log_tests_skipped_errno(r, "manager_new"); |
|
assert_se(r >= 0); |
|
diff --git a/src/test/test-socket-bind.c b/src/test/test-socket-bind.c |
|
index c5c5477f69..b5f8eb9357 100644 |
|
--- a/src/test/test-socket-bind.c |
|
+++ b/src/test/test-socket-bind.c |
|
@@ -136,7 +136,7 @@ int main(int argc, char *argv[]) { |
|
assert_se(set_unit_path(unit_dir) >= 0); |
|
assert_se(runtime_dir = setup_fake_runtime_dir()); |
|
|
|
- assert_se(manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
+ assert_se(manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
assert_se(manager_startup(m, NULL, NULL, NULL) >= 0); |
|
|
|
assert_se(test_socket_bind(m, "socket_bind_test.service", netcat_path, "2000", STRV_MAKE("2000"), STRV_MAKE("any")) >= 0); |
|
diff --git a/src/test/test-specifier.c b/src/test/test-specifier.c |
|
index dd47f0285e..71fb06963c 100644 |
|
--- a/src/test/test-specifier.c |
|
+++ b/src/test/test-specifier.c |
|
@@ -46,7 +46,7 @@ TEST(specifier_escape_strv) { |
|
static const Specifier specifier_table[] = { |
|
COMMON_SYSTEM_SPECIFIERS, |
|
|
|
- COMMON_CREDS_SPECIFIERS(UNIT_FILE_USER), |
|
+ COMMON_CREDS_SPECIFIERS(LOOKUP_SCOPE_USER), |
|
{ 'h', specifier_user_home, NULL }, |
|
|
|
COMMON_TMP_SPECIFIERS, |
|
diff --git a/src/test/test-unit-file.c b/src/test/test-unit-file.c |
|
index 261bd7412f..dffa2822e6 100644 |
|
--- a/src/test/test-unit-file.c |
|
+++ b/src/test/test-unit-file.c |
|
@@ -35,7 +35,7 @@ TEST(unit_file_build_name_map) { |
|
|
|
ids = strv_skip(saved_argv, 1); |
|
|
|
- assert_se(lookup_paths_init(&lp, UNIT_FILE_SYSTEM, 0, NULL) >= 0); |
|
+ assert_se(lookup_paths_init(&lp, LOOKUP_SCOPE_SYSTEM, 0, NULL) >= 0); |
|
|
|
assert_se(unit_file_build_name_map(&lp, &mtime, &unit_ids, &unit_names, NULL) == 1); |
|
|
|
diff --git a/src/test/test-unit-name.c b/src/test/test-unit-name.c |
|
index b6137333aa..90539f108f 100644 |
|
--- a/src/test/test-unit-name.c |
|
+++ b/src/test/test-unit-name.c |
|
@@ -248,7 +248,7 @@ TEST_RET(unit_printf, .sd_booted = true) { |
|
assert_se(get_home_dir(&home) >= 0); |
|
assert_se(get_shell(&shell) >= 0); |
|
|
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
if (manager_errno_skip_test(r)) |
|
return log_tests_skipped_errno(r, "manager_new"); |
|
assert_se(r == 0); |
|
diff --git a/src/test/test-unit-serialize.c b/src/test/test-unit-serialize.c |
|
index 3ef15f3b1e..f84435f480 100644 |
|
--- a/src/test/test-unit-serialize.c |
|
+++ b/src/test/test-unit-serialize.c |
|
@@ -31,7 +31,7 @@ TEST(deserialize_exec_command) { |
|
_cleanup_(manager_freep) Manager *m = NULL; |
|
int r; |
|
|
|
- r = manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
+ r = manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_MINIMAL, &m); |
|
if (manager_errno_skip_test(r)) { |
|
log_notice_errno(r, "Skipping test: manager_new: %m"); |
|
return; |
|
diff --git a/src/test/test-watch-pid.c b/src/test/test-watch-pid.c |
|
index 885ed802d4..8c355c1d5f 100644 |
|
--- a/src/test/test-watch-pid.c |
|
+++ b/src/test/test-watch-pid.c |
|
@@ -26,7 +26,7 @@ int main(int argc, char *argv[]) { |
|
|
|
assert_se(runtime_dir = setup_fake_runtime_dir()); |
|
|
|
- assert_se(manager_new(UNIT_FILE_USER, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
+ assert_se(manager_new(LOOKUP_SCOPE_USER, MANAGER_TEST_RUN_BASIC, &m) >= 0); |
|
assert_se(manager_startup(m, NULL, NULL, NULL) >= 0); |
|
|
|
assert_se(a = unit_new(m, sizeof(Service))); |
|
diff --git a/src/tmpfiles/tmpfiles.c b/src/tmpfiles/tmpfiles.c |
|
index 17b9c6ab9a..023207bc60 100644 |
|
--- a/src/tmpfiles/tmpfiles.c |
|
+++ b/src/tmpfiles/tmpfiles.c |
|
@@ -2938,7 +2938,7 @@ static int parse_line( |
|
{ 'S', specifier_directory, UINT_TO_PTR(DIRECTORY_STATE) }, |
|
{ 't', specifier_directory, UINT_TO_PTR(DIRECTORY_RUNTIME) }, |
|
|
|
- COMMON_CREDS_SPECIFIERS(arg_user ? UNIT_FILE_USER : UNIT_FILE_SYSTEM), |
|
+ COMMON_CREDS_SPECIFIERS(arg_user ? LOOKUP_SCOPE_USER : LOOKUP_SCOPE_SYSTEM), |
|
COMMON_TMP_SPECIFIERS, |
|
{} |
|
};
|
|
|