diff options
author | Michael Biebl <biebl@debian.org> | 2017-10-10 00:22:57 +0200 |
---|---|---|
committer | Michael Biebl <biebl@debian.org> | 2017-10-10 00:22:57 +0200 |
commit | f5e65279187b6aa0c0c5a00b14dca9eab441ffb2 (patch) | |
tree | b834735b2b8fabf24499bb8cc12d4f24870436f7 /src/journal/journalctl.c | |
parent | 81c583552ee1c3355cdef1b11a33737dd98e6971 (diff) | |
download | systemd-f5e65279187b6aa0c0c5a00b14dca9eab441ffb2.tar.gz |
New upstream version 235
Diffstat (limited to 'src/journal/journalctl.c')
-rw-r--r-- | src/journal/journalctl.c | 26 |
1 files changed, 11 insertions, 15 deletions
diff --git a/src/journal/journalctl.c b/src/journal/journalctl.c index 2313c8c678..e826fa631e 100644 --- a/src/journal/journalctl.c +++ b/src/journal/journalctl.c @@ -105,7 +105,7 @@ static char **arg_file = NULL; static bool arg_file_stdin = false; static int arg_priorities = 0xFF; static char *arg_verify_key = NULL; -#ifdef HAVE_GCRYPT +#if HAVE_GCRYPT static usec_t arg_interval = DEFAULT_FSS_INTERVAL_USEC; static bool arg_force = false; #endif @@ -248,7 +248,7 @@ static int parse_boot_descriptor(const char *x, sd_id128_t *boot_id, int *offset if (r >= 0) x += 32; - if (*x != '-' && *x != '+' && *x != 0) + if (!IN_SET(*x, 0, '-', '+')) return -EINVAL; if (*x != 0) { @@ -313,7 +313,7 @@ static void help(void) { " -D --directory=PATH Show journal files from directory\n" " --file=PATH Show journal file\n" " --root=ROOT Operate on files below a root directory\n" -#ifdef HAVE_GCRYPT +#if HAVE_GCRYPT " --interval=TIME Time interval for changing the FSS sealing key\n" " --verify-key=KEY Specify FSS verification key\n" " --force Override of the FSS key pair with --setup-keys\n" @@ -336,7 +336,7 @@ static void help(void) { " --dump-catalog Show entries in the message catalog\n" " --update-catalog Update the message catalog database\n" " --new-id128 Generate a new 128-bit ID\n" -#ifdef HAVE_GCRYPT +#if HAVE_GCRYPT " --setup-keys Generate a new FSS key pair\n" #endif , program_invocation_short_name); @@ -477,11 +477,7 @@ static int parse_argv(int argc, char *argv[]) { return -EINVAL; } - if (arg_output == OUTPUT_EXPORT || - arg_output == OUTPUT_JSON || - arg_output == OUTPUT_JSON_PRETTY || - arg_output == OUTPUT_JSON_SSE || - arg_output == OUTPUT_CAT) + if (IN_SET(arg_output, OUTPUT_EXPORT, OUTPUT_JSON, OUTPUT_JSON_PRETTY, OUTPUT_JSON_SSE, OUTPUT_CAT)) arg_quiet = true; break; @@ -673,7 +669,7 @@ static int parse_argv(int argc, char *argv[]) { arg_action = ACTION_VACUUM; break; -#ifdef HAVE_GCRYPT +#if HAVE_GCRYPT case ARG_FORCE: arg_force = true; break; @@ -1565,7 +1561,7 @@ static int add_syslog_identifier(sd_journal *j) { } static int setup_keys(void) { -#ifdef HAVE_GCRYPT +#if HAVE_GCRYPT size_t mpk_size, seed_size, state_size, i; uint8_t *mpk, *seed, *state; int fd = -1, r; @@ -1576,7 +1572,7 @@ static int setup_keys(void) { struct stat st; r = stat("/var/log/journal", &st); - if (r < 0 && errno != ENOENT && errno != ENOTDIR) + if (r < 0 && !IN_SET(errno, ENOENT, ENOTDIR)) return log_error_errno(errno, "stat(\"%s\") failed: %m", "/var/log/journal"); if (r < 0 || !S_ISDIR(st.st_mode)) { @@ -1731,7 +1727,7 @@ static int setup_keys(void) { } else fprintf(stderr, "\nThe keys have been generated for host " SD_ID128_FORMAT_STR ".\n", SD_ID128_FORMAT_VAL(machine)); -#ifdef HAVE_QRENCODE +#if HAVE_QRENCODE /* If this is not an UTF-8 system don't print any QR codes */ if (is_locale_utf8()) { fputs("\nTo transfer the verification key to your phone please scan the QR code below:\n\n", stderr); @@ -1773,7 +1769,7 @@ static int verify(sd_journal *j) { int k; usec_t first = 0, validated = 0, last = 0; -#ifdef HAVE_GCRYPT +#if HAVE_GCRYPT if (!arg_verify_key && JOURNAL_HEADER_SEALED(f->header)) log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path); #endif @@ -2170,7 +2166,7 @@ int main(int argc, char *argv[]) { if (d->is_root) continue; - q = journal_directory_vacuum(d->path, arg_vacuum_size, arg_vacuum_n_files, arg_vacuum_time, NULL, true); + q = journal_directory_vacuum(d->path, arg_vacuum_size, arg_vacuum_n_files, arg_vacuum_time, NULL, !arg_quiet); if (q < 0) { log_error_errno(q, "Failed to vacuum %s: %m", d->path); r = q; |