mirror of https://gitee.com/openkylin/libvirt.git
secret: Change virSecretDef variable names
Change 'ephemeral' to 'isephemeral' and 'private' to 'isprivate' since both are bools.
This commit is contained in:
parent
43d3e3c130
commit
662bf30c0f
|
@ -183,9 +183,9 @@ secretXMLParseNode(xmlDocPtr xml, xmlNodePtr root)
|
||||||
prop = virXPathString("string(./@ephemeral)", ctxt);
|
prop = virXPathString("string(./@ephemeral)", ctxt);
|
||||||
if (prop != NULL) {
|
if (prop != NULL) {
|
||||||
if (STREQ(prop, "yes")) {
|
if (STREQ(prop, "yes")) {
|
||||||
def->ephemeral = true;
|
def->isephemeral = true;
|
||||||
} else if (STREQ(prop, "no")) {
|
} else if (STREQ(prop, "no")) {
|
||||||
def->ephemeral = false;
|
def->isephemeral = false;
|
||||||
} else {
|
} else {
|
||||||
virReportError(VIR_ERR_XML_ERROR, "%s",
|
virReportError(VIR_ERR_XML_ERROR, "%s",
|
||||||
_("invalid value of 'ephemeral'"));
|
_("invalid value of 'ephemeral'"));
|
||||||
|
@ -197,9 +197,9 @@ secretXMLParseNode(xmlDocPtr xml, xmlNodePtr root)
|
||||||
prop = virXPathString("string(./@private)", ctxt);
|
prop = virXPathString("string(./@private)", ctxt);
|
||||||
if (prop != NULL) {
|
if (prop != NULL) {
|
||||||
if (STREQ(prop, "yes")) {
|
if (STREQ(prop, "yes")) {
|
||||||
def->private = true;
|
def->isprivate = true;
|
||||||
} else if (STREQ(prop, "no")) {
|
} else if (STREQ(prop, "no")) {
|
||||||
def->private = false;
|
def->isprivate = false;
|
||||||
} else {
|
} else {
|
||||||
virReportError(VIR_ERR_XML_ERROR, "%s",
|
virReportError(VIR_ERR_XML_ERROR, "%s",
|
||||||
_("invalid value of 'private'"));
|
_("invalid value of 'private'"));
|
||||||
|
@ -325,8 +325,8 @@ virSecretDefFormat(const virSecretDef *def)
|
||||||
char uuidstr[VIR_UUID_STRING_BUFLEN];
|
char uuidstr[VIR_UUID_STRING_BUFLEN];
|
||||||
|
|
||||||
virBufferAsprintf(&buf, "<secret ephemeral='%s' private='%s'>\n",
|
virBufferAsprintf(&buf, "<secret ephemeral='%s' private='%s'>\n",
|
||||||
def->ephemeral ? "yes" : "no",
|
def->isephemeral ? "yes" : "no",
|
||||||
def->private ? "yes" : "no");
|
def->isprivate ? "yes" : "no");
|
||||||
|
|
||||||
uuid = def->uuid;
|
uuid = def->uuid;
|
||||||
virUUIDFormat(uuid, uuidstr);
|
virUUIDFormat(uuid, uuidstr);
|
||||||
|
|
|
@ -31,8 +31,8 @@ VIR_ENUM_DECL(virSecretUsage)
|
||||||
typedef struct _virSecretDef virSecretDef;
|
typedef struct _virSecretDef virSecretDef;
|
||||||
typedef virSecretDef *virSecretDefPtr;
|
typedef virSecretDef *virSecretDefPtr;
|
||||||
struct _virSecretDef {
|
struct _virSecretDef {
|
||||||
bool ephemeral;
|
bool isephemeral;
|
||||||
bool private;
|
bool isprivate;
|
||||||
unsigned char uuid[VIR_UUID_BUFLEN];
|
unsigned char uuid[VIR_UUID_BUFLEN];
|
||||||
char *description; /* May be NULL */
|
char *description; /* May be NULL */
|
||||||
int usage_type;
|
int usage_type;
|
||||||
|
|
|
@ -369,7 +369,7 @@ virSecretObjListAddLocked(virSecretObjListPtr secrets,
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (secret->def->private && !def->private) {
|
if (secret->def->isprivate && !def->isprivate) {
|
||||||
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
||||||
_("cannot change private flag on existing secret"));
|
_("cannot change private flag on existing secret"));
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
@ -517,17 +517,17 @@ virSecretObjMatchFlags(virSecretObjPtr secret,
|
||||||
/* filter by whether it's ephemeral */
|
/* filter by whether it's ephemeral */
|
||||||
if (MATCH(VIR_CONNECT_LIST_SECRETS_FILTERS_EPHEMERAL) &&
|
if (MATCH(VIR_CONNECT_LIST_SECRETS_FILTERS_EPHEMERAL) &&
|
||||||
!((MATCH(VIR_CONNECT_LIST_SECRETS_EPHEMERAL) &&
|
!((MATCH(VIR_CONNECT_LIST_SECRETS_EPHEMERAL) &&
|
||||||
secret->def->ephemeral) ||
|
secret->def->isephemeral) ||
|
||||||
(MATCH(VIR_CONNECT_LIST_SECRETS_NO_EPHEMERAL) &&
|
(MATCH(VIR_CONNECT_LIST_SECRETS_NO_EPHEMERAL) &&
|
||||||
!secret->def->ephemeral)))
|
!secret->def->isephemeral)))
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
/* filter by whether it's private */
|
/* filter by whether it's private */
|
||||||
if (MATCH(VIR_CONNECT_LIST_SECRETS_FILTERS_PRIVATE) &&
|
if (MATCH(VIR_CONNECT_LIST_SECRETS_FILTERS_PRIVATE) &&
|
||||||
!((MATCH(VIR_CONNECT_LIST_SECRETS_PRIVATE) &&
|
!((MATCH(VIR_CONNECT_LIST_SECRETS_PRIVATE) &&
|
||||||
secret->def->private) ||
|
secret->def->isprivate) ||
|
||||||
(MATCH(VIR_CONNECT_LIST_SECRETS_NO_PRIVATE) &&
|
(MATCH(VIR_CONNECT_LIST_SECRETS_NO_PRIVATE) &&
|
||||||
!secret->def->private)))
|
!secret->def->isprivate)))
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
return true;
|
return true;
|
||||||
|
@ -660,7 +660,7 @@ virSecretObjListGetUUIDs(virSecretObjListPtr secrets,
|
||||||
int
|
int
|
||||||
virSecretObjDeleteConfig(virSecretObjPtr secret)
|
virSecretObjDeleteConfig(virSecretObjPtr secret)
|
||||||
{
|
{
|
||||||
if (!secret->def->ephemeral &&
|
if (!secret->def->isephemeral &&
|
||||||
unlink(secret->configFile) < 0 && errno != ENOENT) {
|
unlink(secret->configFile) < 0 && errno != ENOENT) {
|
||||||
virReportSystemError(errno, _("cannot unlink '%s'"),
|
virReportSystemError(errno, _("cannot unlink '%s'"),
|
||||||
secret->configFile);
|
secret->configFile);
|
||||||
|
@ -804,7 +804,7 @@ virSecretObjSetValue(virSecretObjPtr secret,
|
||||||
secret->value = new_value;
|
secret->value = new_value;
|
||||||
secret->value_size = value_size;
|
secret->value_size = value_size;
|
||||||
|
|
||||||
if (!secret->def->ephemeral && virSecretObjSaveData(secret) < 0)
|
if (!secret->def->isephemeral && virSecretObjSaveData(secret) < 0)
|
||||||
goto error;
|
goto error;
|
||||||
|
|
||||||
/* Saved successfully - drop old value */
|
/* Saved successfully - drop old value */
|
||||||
|
|
|
@ -231,23 +231,23 @@ secretDefineXML(virConnectPtr conn,
|
||||||
driver->configDir, &backup)))
|
driver->configDir, &backup)))
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
|
||||||
if (!new_attrs->ephemeral) {
|
if (!new_attrs->isephemeral) {
|
||||||
if (secretEnsureDirectory() < 0)
|
if (secretEnsureDirectory() < 0)
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
|
||||||
if (backup && backup->ephemeral) {
|
if (backup && backup->isephemeral) {
|
||||||
if (virSecretObjSaveData(secret) < 0)
|
if (virSecretObjSaveData(secret) < 0)
|
||||||
goto restore_backup;
|
goto restore_backup;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (virSecretObjSaveConfig(secret) < 0) {
|
if (virSecretObjSaveConfig(secret) < 0) {
|
||||||
if (backup && backup->ephemeral) {
|
if (backup && backup->isephemeral) {
|
||||||
/* Undo the virSecretObjSaveData() above; ignore errors */
|
/* Undo the virSecretObjSaveData() above; ignore errors */
|
||||||
virSecretObjDeleteData(secret);
|
virSecretObjDeleteData(secret);
|
||||||
}
|
}
|
||||||
goto restore_backup;
|
goto restore_backup;
|
||||||
}
|
}
|
||||||
} else if (backup && !backup->ephemeral) {
|
} else if (backup && !backup->isephemeral) {
|
||||||
if (virSecretObjDeleteConfig(secret) < 0)
|
if (virSecretObjDeleteConfig(secret) < 0)
|
||||||
goto restore_backup;
|
goto restore_backup;
|
||||||
|
|
||||||
|
@ -358,7 +358,7 @@ secretGetValue(virSecretPtr obj,
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
|
||||||
if ((internalFlags & VIR_SECRET_GET_VALUE_INTERNAL_CALL) == 0 &&
|
if ((internalFlags & VIR_SECRET_GET_VALUE_INTERNAL_CALL) == 0 &&
|
||||||
def->private) {
|
def->isprivate) {
|
||||||
virReportError(VIR_ERR_INVALID_SECRET, "%s",
|
virReportError(VIR_ERR_INVALID_SECRET, "%s",
|
||||||
_("secret is private"));
|
_("secret is private"));
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
|
|
@ -620,8 +620,8 @@ virStorageGenerateQcowEncryption(virConnectPtr conn,
|
||||||
VIR_ALLOC(def) < 0)
|
VIR_ALLOC(def) < 0)
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
|
||||||
def->ephemeral = false;
|
def->isephemeral = false;
|
||||||
def->private = false;
|
def->isprivate = false;
|
||||||
if (virStorageGenerateSecretUUID(conn, def->uuid) < 0)
|
if (virStorageGenerateSecretUUID(conn, def->uuid) < 0)
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue