ASSERT_OK(device_monitor_send(monitor_server, &sa, device));
- ASSERT_OK((fd = sd_device_monitor_get_fd(monitor_client)));
+ ASSERT_OK(fd = sd_device_monitor_get_fd(monitor_client));
for (;;) {
usec_t timeout;
int events;
- ASSERT_OK((events = sd_device_monitor_get_events(monitor_client)));
+ ASSERT_OK(events = sd_device_monitor_get_events(monitor_client));
ASSERT_EQ(events, (int) EPOLLIN);
ASSERT_OK(sd_device_monitor_get_timeout(monitor_client, &timeout));
ASSERT_EQ(timeout, USEC_INFINITY);
ASSERT_OK(sd_device_new_from_syspath(&dev, syspath));
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
ASSERT_OK(sd_device_new_from_path(&dev, syspath));
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
r = sd_device_get_ifindex(d, &ifindex);
if (r < 0)
} else {
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
}
/* This does not require the interface really exists on the network namespace.
ASSERT_OK(sd_device_new_from_ifname(&dev, sysname));
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
}
r = sd_device_get_subsystem(d, &subsystem);
else {
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
}
/* The device ID depends on subsystem. */
} else {
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
}
/* These require udev database, and reading database requires device ID. */
- ASSERT_OK((r = sd_device_get_is_initialized(d)));
+ ASSERT_OK(r = sd_device_get_is_initialized(d));
if (r > 0) {
r = sd_device_get_usec_since_initialized(d, &usec);
if (r < 0)
else {
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
}
r = sd_device_new_from_path(&dev, devname);
else {
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
_cleanup_close_ int fd = -EBADF;
fd = sd_device_open(d, O_CLOEXEC| O_NONBLOCK | (is_block ? O_RDONLY : O_NOCTTY | O_PATH));
ASSERT_OK(sd_device_new_from_devnum(&dev, is_block ? 'b' : 'c', devnum));
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
ASSERT_OK(asprintf(&p, "/dev/%s/%u:%u", is_block ? "block" : "char", major(devnum), minor(devnum)));
ASSERT_OK(sd_device_new_from_devname(&dev, p));
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
ASSERT_OK(sd_device_new_from_path(&dev, p));
ASSERT_OK(sd_device_get_syspath(dev, &val));
ASSERT_STREQ(syspath, val);
- ASSERT_NULL((dev = sd_device_unref(dev)));
+ ASSERT_NULL(dev = sd_device_unref(dev));
}
ASSERT_OK(sd_device_get_devpath(d, &val));
ASSERT_TRUE(ERRNO_IS_NEG_PRIVILEGE(r) || IN_SET(r, -ENOENT, -EINVAL));
else {
unsigned x;
- ASSERT_OK((r = device_get_sysattr_unsigned(d, "nsid", &x)));
- ASSERT_EQ((x > 0), (r > 0));
+ ASSERT_OK(r = device_get_sysattr_unsigned(d, "nsid", &x));
+ ASSERT_EQ(x > 0, r > 0);
}
}
ASSERT_OK(sd_device_new_from_path(&d, syspath));
ASSERT_OK(sd_device_get_syspath(d, &s));
ASSERT_STREQ(s, syspath);
- ASSERT_NULL((d = sd_device_unref(d)));
+ ASSERT_NULL(d = sd_device_unref(d));
ASSERT_OK(sd_device_get_devname(dev, &devpath));
r = sd_device_new_from_path(&d, devpath);
else {
ASSERT_OK(sd_device_get_syspath(d, &s));
ASSERT_STREQ(s, syspath);
- ASSERT_NULL((d = sd_device_unref(d)));
+ ASSERT_NULL(d = sd_device_unref(d));
}
ASSERT_NOT_NULL((path = path_join(tmpdir, sysname)));
ASSERT_OK(devname_from_devnum(st.st_mode, st.st_rdev, &resolved));
ASSERT_TRUE(path_equal(path, resolved));
- ASSERT_NULL((resolved = mfree(resolved)));
+ ASSERT_NULL(resolved = mfree(resolved));
ASSERT_OK(devname_from_stat_rdev(&st, &resolved));
ASSERT_TRUE(path_equal(path, resolved));
}
assert_se(pid > 1);
- ASSERT_OK((pidfd = pidfd_open(pid, 0)));
+ ASSERT_OK(pidfd = pidfd_open(pid, 0));
pid2 = fork();
if (pid2 == 0)
ASSERT_OK(sd_journal_seek_head(j));
for (;;) {
- ASSERT_OK((r = sd_journal_next(j)));
+ ASSERT_OK(r = sd_journal_next(j));
if (r == 0)
break;
ASSERT_OK(sd_rtnl_message_new_addr(rtnl, &message, RTM_GETADDR, ifindex, AF_INET));
ASSERT_OK(sd_netlink_message_set_request_dump(message, true));
- ASSERT_OK((r = sd_netlink_call(rtnl, message, 0, &reply)));
+ ASSERT_OK(r = sd_netlink_call(rtnl, message, 0, &reply));
/* If the loopback device is down we won't get any results. */
if (r > 0) {
ASSERT_OK(sd_netlink_message_read_u32(req, RTA_OIF, &u32_data));
ASSERT_EQ(u32_data, index);
- ASSERT_NULL((req = sd_netlink_message_unref(req)));
+ ASSERT_NULL(req = sd_netlink_message_unref(req));
}
static int link_handler(sd_netlink *rtnl, sd_netlink_message *m, void *userdata) {
ASSERT_OK(sd_event_run(event, 0));
ASSERT_OK(sd_netlink_detach_event(rtnl));
- ASSERT_NULL((rtnl = sd_netlink_unref(rtnl)));
+ ASSERT_NULL(rtnl = sd_netlink_unref(rtnl));
}
static void test_async_destroy(void *userdata) {
ASSERT_OK(sd_netlink_wait(rtnl, 0));
ASSERT_OK(sd_netlink_process(rtnl, &reply));
- ASSERT_NULL((rtnl = sd_netlink_unref(rtnl)));
+ ASSERT_NULL(rtnl = sd_netlink_unref(rtnl));
}
struct test_async_object {
ASSERT_PTR_EQ(test_async_object_ref(t), t);
ASSERT_EQ(t->n_ref, 2U);
- ASSERT_NULL((slot = sd_netlink_slot_unref(slot)));
+ ASSERT_NULL(slot = sd_netlink_slot_unref(slot));
ASSERT_EQ(t->n_ref, 1U);
ASSERT_NULL(sd_netlink_message_unref(m));
ASSERT_PTR_EQ(test_async_object_ref(t), t);
ASSERT_EQ(t->n_ref, 2U);
- ASSERT_NULL((rtnl = sd_netlink_unref(rtnl)));
+ ASSERT_NULL(rtnl = sd_netlink_unref(rtnl));
ASSERT_EQ(t->n_ref, 1U);
}
(*counter)--;
- ASSERT_OK((r = sd_netlink_message_get_errno(m)));
+ ASSERT_OK(r = sd_netlink_message_get_errno(m));
log_info_errno(r, "%d left in pipe. got reply: %m", *counter);
return 1;
}
ASSERT_OK(sd_netlink_process(rtnl, NULL));
}
- ASSERT_NULL((rtnl = sd_netlink_unref(rtnl)));
+ ASSERT_NULL(rtnl = sd_netlink_unref(rtnl));
}
TEST(message_container) {
ASSERT_OK(sd_netlink_add_match(rtnl, &s2, RTM_NEWLINK, link_handler, NULL, NULL, NULL));
ASSERT_OK(sd_netlink_add_match(rtnl, NULL, RTM_NEWLINK, link_handler, NULL, NULL, NULL));
- ASSERT_NULL((s1 = sd_netlink_slot_unref(s1)));
- ASSERT_NULL((s2 = sd_netlink_slot_unref(s2)));
+ ASSERT_NULL(s1 = sd_netlink_slot_unref(s1));
+ ASSERT_NULL(s2 = sd_netlink_slot_unref(s2));
- ASSERT_NULL((rtnl = sd_netlink_unref(rtnl)));
+ ASSERT_NULL(rtnl = sd_netlink_unref(rtnl));
}
TEST(dump_addresses) {
ASSERT_OK(sd_genl_add_match(genl, NULL, CTRL_GENL_NAME, "notify", 0, genl_ctrl_match_callback, NULL, NULL, "genl-ctrl-notify"));
- ASSERT_NULL((m = sd_netlink_message_unref(m)));
+ ASSERT_NULL(m = sd_netlink_message_unref(m));
ASSERT_FAIL(sd_genl_message_new(genl, "should-not-exist", CTRL_CMD_GETFAMILY, &m));
ASSERT_ERROR(sd_genl_message_new(genl, "should-not-exist", CTRL_CMD_GETFAMILY, &m), EOPNOTSUPP);
/* These families may not be supported by kernel. Hence, ignore results. */
(void) sd_genl_message_new(genl, FOU_GENL_NAME, 0, &m);
- ASSERT_NULL((m = sd_netlink_message_unref(m)));
+ ASSERT_NULL(m = sd_netlink_message_unref(m));
(void) sd_genl_message_new(genl, L2TP_GENL_NAME, 0, &m);
- ASSERT_NULL((m = sd_netlink_message_unref(m)));
+ ASSERT_NULL(m = sd_netlink_message_unref(m));
(void) sd_genl_message_new(genl, MACSEC_GENL_NAME, 0, &m);
- ASSERT_NULL((m = sd_netlink_message_unref(m)));
+ ASSERT_NULL(m = sd_netlink_message_unref(m));
(void) sd_genl_message_new(genl, NL80211_GENL_NAME, 0, &m);
- ASSERT_NULL((m = sd_netlink_message_unref(m)));
+ ASSERT_NULL(m = sd_netlink_message_unref(m));
(void) sd_genl_message_new(genl, NETLBL_NLTYPE_UNLABELED_NAME, 0, &m);
for (;;) {
- ASSERT_OK((r = sd_event_run(event, 500 * USEC_PER_MSEC)));
+ ASSERT_OK(r = sd_event_run(event, 500 * USEC_PER_MSEC));
if (r == 0)
return;
}
return (void) log_tests_skipped("dummy network interface is not supported");
ASSERT_OK(r);
- ASSERT_NULL((message = sd_netlink_message_unref(message)));
- ASSERT_NULL((reply = sd_netlink_message_unref(reply)));
+ ASSERT_NULL(message = sd_netlink_message_unref(message));
+ ASSERT_NULL(reply = sd_netlink_message_unref(reply));
ASSERT_OK(sd_rtnl_message_new_link(rtnl, &message, RTM_GETLINK, 0));
ASSERT_OK(sd_netlink_message_append_string(message, IFLA_IFNAME, "test-netlink"));
ASSERT_ERROR(rtnl_set_link_name(&rtnl, ifindex, "testlongalternativename", NULL), EINVAL);
ASSERT_OK(rtnl_set_link_name(&rtnl, ifindex, "test-shortname", STRV_MAKE("testlongalternativename", "test-shortname", "test-additional-name")));
- ASSERT_NULL((alternative_names = strv_free(alternative_names)));
+ ASSERT_NULL(alternative_names = strv_free(alternative_names));
ASSERT_OK(rtnl_get_link_alternative_names(&rtnl, ifindex, &alternative_names));
ASSERT_TRUE(strv_contains(alternative_names, "testlongalternativename"));
ASSERT_TRUE(strv_contains(alternative_names, "test-additional-name"));
ASSERT_OK(rtnl_delete_link_alternative_names(&rtnl, ifindex, STRV_MAKE("testlongalternativename")));
- ASSERT_NULL((alternative_names = strv_free(alternative_names)));
+ ASSERT_NULL(alternative_names = strv_free(alternative_names));
ASSERT_OK_EQ(rtnl_get_link_alternative_names(&rtnl, ifindex, &alternative_names), ifindex);
ASSERT_FALSE(strv_contains(alternative_names, "testlongalternativename"));
ASSERT_TRUE(strv_contains(alternative_names, "test-additional-name"));
ASSERT_OK_EQ(rtnl_resolve_link_alternative_name(&rtnl, "test-additional-name", NULL), ifindex);
ASSERT_OK_EQ(rtnl_resolve_link_alternative_name(&rtnl, "test-additional-name", &resolved), ifindex);
ASSERT_STREQ(resolved, "test-shortname");
- ASSERT_NULL((resolved = mfree(resolved)));
+ ASSERT_NULL(resolved = mfree(resolved));
ASSERT_OK(rtnl_rename_link(&rtnl, "test-shortname", "test-shortname"));
ASSERT_OK(rtnl_rename_link(&rtnl, "test-shortname", "test-shortname2"));
ASSERT_OK_EQ(rtnl_resolve_link_alternative_name(&rtnl, "test-additional-name", NULL), ifindex);
ASSERT_OK_EQ(rtnl_resolve_link_alternative_name(&rtnl, "test-additional-name", &resolved), ifindex);
ASSERT_STREQ(resolved, "test-shortname3");
- ASSERT_NULL((resolved = mfree(resolved)));
+ ASSERT_NULL(resolved = mfree(resolved));
ASSERT_OK_EQ(rtnl_resolve_link_alternative_name(&rtnl, "test-shortname3", NULL), ifindex);
ASSERT_OK_EQ(rtnl_resolve_link_alternative_name(&rtnl, "test-shortname3", &resolved), ifindex);
ASSERT_STREQ(resolved, "test-shortname3");
- ASSERT_NULL((resolved = mfree(resolved)));
+ ASSERT_NULL(resolved = mfree(resolved));
}
DEFINE_TEST_MAIN(LOG_DEBUG);
}, &ans));
ASSERT_NULL(ans);
- ASSERT_OK((r = find_converted_keymap(
+ ASSERT_OK(r = find_converted_keymap(
&(X11Context) {
.layout = (char*) "pl",
- }, &ans)));
+ }, &ans));
if (r == 0)
return (void) log_tests_skipped("keymaps are not installed");
/* "gh" has no mapping in kbd-model-map and kbd provides a converted keymap for this layout. */
log_info("/* test with a converted keymap (gh:) */");
ASSERT_OK(free_and_strdup(&vc.keymap, "gh"));
- ASSERT_OK((r = vconsole_convert_to_x11(&vc, x11_context_verify, &xc)));
+ ASSERT_OK(r = vconsole_convert_to_x11(&vc, x11_context_verify, &xc));
if (r == 0)
return (void) log_tests_skipped("keymaps are not installed");
return log_tests_skipped_errno(r, "Could not find %s binary: %m", s);
}
- ASSERT_OK((fd = mkostemp_safe(fn)));
+ ASSERT_OK(fd = mkostemp_safe(fn));
/* Use the mode that user journal files use */
ASSERT_OK_ZERO_ERRNO(fchmod(fd, 0640));
return log_tests_skipped_errno(r, "Could not find %s binary: %m", s);
}
- ASSERT_OK((fd = mkostemp_safe(fn)));
+ ASSERT_OK(fd = mkostemp_safe(fn));
/* make it more exciting */
(void) fd_add_uid_acl_permission(fd, 1, ACL_READ|ACL_WRITE|ACL_EXECUTE);
ASSERT_OK(calendar_spec_from_string("hourly", &c));
n = now(CLOCK_REALTIME);
- ASSERT_OK((r = calendar_spec_next_usec(c, n, &u)));
+ ASSERT_OK(r = calendar_spec_next_usec(c, n, &u));
log_info("Now: %s (%"PRIu64")", FORMAT_TIMESTAMP_STYLE(n, TIMESTAMP_US), n);
log_info("Next hourly: %s (%"PRIu64")", r < 0 ? STRERROR(r) : FORMAT_TIMESTAMP_STYLE(u, TIMESTAMP_US), u);
struct stat st;
const char *p;
- ASSERT_OK((tfd = mkdtemp_open(NULL, 0, &t)));
+ ASSERT_OK(tfd = mkdtemp_open(NULL, 0, &t));
/* Test that AT_FDCWD with CHASE_AT_RESOLVE_IN_ROOT resolves against / and not the current working
* directory. */
/* Test that absolute path or not are the same when resolving relative to a directory file
* descriptor and that we always get a relative path back. */
- ASSERT_OK((fd = openat(tfd, "def", O_CREAT|O_CLOEXEC, 0700)));
+ ASSERT_OK(fd = openat(tfd, "def", O_CREAT|O_CLOEXEC, 0700));
fd = safe_close(fd);
ASSERT_OK(symlinkat("/def", tfd, "qed"));
ASSERT_OK(chaseat(tfd, "qed", CHASE_AT_RESOLVE_IN_ROOT, &result, NULL));
/* Test CHASE_PARENT */
- ASSERT_OK((fd = open_mkdir_at(tfd, "chase", O_CLOEXEC, 0755)));
+ ASSERT_OK(fd = open_mkdir_at(tfd, "chase", O_CLOEXEC, 0755));
ASSERT_OK(symlinkat("/def", fd, "parent"));
fd = safe_close(fd);
/* Test chase_and_open_parent_at() */
- ASSERT_OK((fd = chase_and_open_parent_at(tfd, "chase/parent", CHASE_AT_RESOLVE_IN_ROOT|CHASE_NOFOLLOW, &result)));
+ ASSERT_OK(fd = chase_and_open_parent_at(tfd, "chase/parent", CHASE_AT_RESOLVE_IN_ROOT|CHASE_NOFOLLOW, &result));
ASSERT_OK(faccessat(fd, result, F_OK, AT_SYMLINK_NOFOLLOW));
ASSERT_STREQ(result, "parent");
fd = safe_close(fd);
result = mfree(result);
- ASSERT_OK((fd = chase_and_open_parent_at(tfd, "chase", CHASE_AT_RESOLVE_IN_ROOT, &result)));
+ ASSERT_OK(fd = chase_and_open_parent_at(tfd, "chase", CHASE_AT_RESOLVE_IN_ROOT, &result));
ASSERT_OK(faccessat(fd, result, F_OK, 0));
ASSERT_STREQ(result, "chase");
fd = safe_close(fd);
result = mfree(result);
- ASSERT_OK((fd = chase_and_open_parent_at(tfd, "/", CHASE_AT_RESOLVE_IN_ROOT, &result)));
+ ASSERT_OK(fd = chase_and_open_parent_at(tfd, "/", CHASE_AT_RESOLVE_IN_ROOT, &result));
ASSERT_STREQ(result, ".");
fd = safe_close(fd);
result = mfree(result);
- ASSERT_OK((fd = chase_and_open_parent_at(tfd, ".", CHASE_AT_RESOLVE_IN_ROOT, &result)));
+ ASSERT_OK(fd = chase_and_open_parent_at(tfd, ".", CHASE_AT_RESOLVE_IN_ROOT, &result));
ASSERT_STREQ(result, ".");
fd = safe_close(fd);
result = mfree(result);
log_debug("/* create source from %s */", srcfile);
- ASSERT_OK((src = open(srcfile, O_RDONLY|O_CLOEXEC)));
+ ASSERT_OK(src = open(srcfile, O_RDONLY|O_CLOEXEC));
log_debug("/* test compression */");
const char *sa;
Architecture a;
- ASSERT_OK((a = uname_architecture()));
+ ASSERT_OK(a = uname_architecture());
ASSERT_NOT_NULL((sa = architecture_to_string(a)));
ASSERT_NOT_NULL((condition = condition_new(CONDITION_ARCHITECTURE, sa, false, false)));
_cleanup_close_ int rfd = -EBADF;
int r;
- ASSERT_OK((rfd = mkdtemp_open("/tmp/test-config-parse-XXXXXX", 0, &root)));
+ ASSERT_OK(rfd = mkdtemp_open("/tmp/test-config-parse-XXXXXX", 0, &root));
assert_se(mkdir_p_root(root, "/etc/kernel/install.conf.d", UID_INVALID, GID_INVALID, 0755));
assert_se(mkdir_p_root(root, "/run/kernel/install.conf.d", UID_INVALID, GID_INVALID, 0755));
assert_se(mkdir_p_root(root, "/usr/lib/kernel/install.conf.d", UID_INVALID, GID_INVALID, 0755));
f = prefix_roota(p, "/run/systemd/inaccessible/reg");
ASSERT_OK_ERRNO(stat(f, &st));
ASSERT_TRUE(S_ISREG(st.st_mode));
- ASSERT_EQ((st.st_mode & 07777), 0000U);
+ ASSERT_EQ(st.st_mode & 07777, 0000U);
f = prefix_roota(p, "/run/systemd/inaccessible/dir");
ASSERT_OK_ERRNO(stat(f, &st));
ASSERT_TRUE(S_ISDIR(st.st_mode));
- ASSERT_EQ((st.st_mode & 07777), 0000U);
+ ASSERT_EQ(st.st_mode & 07777, 0000U);
f = prefix_roota(p, "/run/systemd/inaccessible/fifo");
ASSERT_OK_ERRNO(stat(f, &st));
ASSERT_TRUE(S_ISFIFO(st.st_mode));
- ASSERT_EQ((st.st_mode & 07777), 0000U);
+ ASSERT_EQ(st.st_mode & 07777, 0000U);
f = prefix_roota(p, "/run/systemd/inaccessible/sock");
ASSERT_OK_ERRNO(stat(f, &st));
ASSERT_TRUE(S_ISSOCK(st.st_mode));
- ASSERT_EQ((st.st_mode & 07777), 0000U);
+ ASSERT_EQ(st.st_mode & 07777, 0000U);
f = prefix_roota(p, "/run/systemd/inaccessible/chr");
if (stat(f, &st) < 0)
ASSERT_EQ(errno, ENOENT);
else {
ASSERT_TRUE(S_ISCHR(st.st_mode));
- ASSERT_EQ((st.st_mode & 07777), 0000U);
+ ASSERT_EQ(st.st_mode & 07777, 0000U);
}
f = prefix_roota(p, "/run/systemd/inaccessible/blk");
ASSERT_EQ(errno, ENOENT);
else {
ASSERT_TRUE(S_ISBLK(st.st_mode));
- ASSERT_EQ((st.st_mode & 07777), 0000U);
+ ASSERT_EQ(st.st_mode & 07777, 0000U);
}
return EXIT_SUCCESS;
_cleanup_close_ int tfd = -EBADF, fd = -EBADF;
bool b;
- ASSERT_OK((tfd = mkdtemp_open(NULL, 0, &t)));
+ ASSERT_OK(tfd = mkdtemp_open(NULL, 0, &t));
fd = openat_report_new(tfd, "test", O_RDWR|O_CREAT, 0666, &b);
ASSERT_OK(fd);
ASSERT_NOT_NULL((buf = strdup("")));
ASSERT_OK(hostname_substitute_wildcards(buf));
ASSERT_STREQ(buf, "");
- ASSERT_NULL((buf = mfree(buf)));
+ ASSERT_NULL(buf = mfree(buf));
ASSERT_NOT_NULL((buf = strdup("hogehoge")));
ASSERT_OK(hostname_substitute_wildcards(buf));
ASSERT_STREQ(buf, "hogehoge");
- ASSERT_NULL((buf = mfree(buf)));
+ ASSERT_NULL(buf = mfree(buf));
ASSERT_NOT_NULL((buf = strdup("hoge??hoge??foo?")));
ASSERT_OK(hostname_substitute_wildcards(buf));
log_debug("hostname_substitute_wildcards(\"hoge??hoge??foo?\"): → \"%s\"", buf);
ASSERT_EQ(fnmatch("hoge??hoge??foo?", buf, /* flags= */ 0), 0);
ASSERT_TRUE(hostname_is_valid(buf, /* flags= */ 0));
- ASSERT_NULL((buf = mfree(buf)));
+ ASSERT_NULL(buf = mfree(buf));
}
TEST(hostname_setup) {
fd = safe_close(fd);
/* regular file */
- ASSERT_OK((fd = open_tmpfile_unlinkable(NULL, O_RDWR)));
+ ASSERT_OK(fd = open_tmpfile_unlinkable(NULL, O_RDWR));
ASSERT_OK(json_variant_new_fd_info(&v, fd));
ASSERT_OK(sd_json_variant_dump(v, SD_JSON_FORMAT_PRETTY_AUTO | SD_JSON_FORMAT_COLOR_AUTO, NULL, NULL));
v = sd_json_variant_unref(v);
_cleanup_close_ int dir_fd = -EBADF;
int r;
- ASSERT_OK((dir_fd = open("/", O_PATH | O_CLOEXEC)));
+ ASSERT_OK(dir_fd = open("/", O_PATH | O_CLOEXEC));
FOREACH_STRING(s,
"/", "/dev/", "/proc/", "/run/", "/sys/", "/tmp/", "/usr/", "/var/tmp/",
"", ".", "../../../", "/this/path/should/not/exist/for/test-mount-util/") {
ASSERT_OK_ZERO(fd_is_namespace(fd, NAMESPACE_NET));
fd = safe_close(fd);
- ASSERT_OK((fd = namespace_open_by_type(NAMESPACE_IPC)));
+ ASSERT_OK(fd = namespace_open_by_type(NAMESPACE_IPC));
ASSERT_OK_POSITIVE(fd_is_namespace(fd, NAMESPACE_IPC));
fd = safe_close(fd);
- ASSERT_OK((fd = namespace_open_by_type(NAMESPACE_NET)));
+ ASSERT_OK(fd = namespace_open_by_type(NAMESPACE_NET));
ASSERT_OK_POSITIVE(fd_is_namespace(fd, NAMESPACE_NET));
}
ASSERT_OK_POSITIVE(sd_netlink_call(rtnl, m, -1, NULL));
- ASSERT_NULL((m = sd_netlink_message_unref(m)));
+ ASSERT_NULL(m = sd_netlink_message_unref(m));
/* sit */
assert_se(sd_rtnl_message_new_link(rtnl, &n, RTM_NEWLINK, 0) >= 0);
ASSERT_OK_POSITIVE(sd_netlink_call(rtnl, n, -1, NULL));
- ASSERT_NULL((n = sd_netlink_message_unref(n)));
+ ASSERT_NULL(n = sd_netlink_message_unref(n));
return EXIT_SUCCESS;
}
r = test_tunnel_configure(rtnl);
- ASSERT_NULL((rtnl = sd_netlink_unref(rtnl)));
+ ASSERT_NULL(rtnl = sd_netlink_unref(rtnl));
return r;
}
_cleanup_close_ int pty_fd = -EBADF, peer_fd = -EBADF;
int r;
- ASSERT_OK((pty_fd = openpt_allocate(O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK, NULL)));
- ASSERT_OK((peer_fd = pty_open_peer(pty_fd, O_RDWR|O_NOCTTY|O_CLOEXEC)));
+ ASSERT_OK(pty_fd = openpt_allocate(O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK, NULL));
+ ASSERT_OK(peer_fd = pty_open_peer(pty_fd, O_RDWR|O_NOCTTY|O_CLOEXEC));
r = safe_fork_full("test-term-session",
(int[]) { peer_fd, peer_fd, peer_fd },
ASSERT_OK_ERRNO(unlink(path));
- ASSERT_OK((r = unit_file_remove_from_name_map(lp, &cache_timestamp_hash, &unit_ids, &unit_names, &path_cache, path)));
+ ASSERT_OK(r = unit_file_remove_from_name_map(lp, &cache_timestamp_hash, &unit_ids, &unit_names, &path_cache, path));
if (r > 0)
return false; /* someone touches unit files. Retrying. */
assert_se(nresult >= 0);
assert_se(memcmp_nn(result2, ELEMENTSOF(result2), res4, nresult) == 0);
- ASSERT_OK((nresult = getgroups_alloc(&gids)));
+ ASSERT_OK(nresult = getgroups_alloc(&gids));
assert_se(gids || nresult == 0);
}