}
static void test_ignore_opts(uint8_t *descoption, int *descpos, int *desclen) {
- assert(*descpos >= 0);
+ assert_se(*descpos >= 0);
while (*descpos < *desclen) {
switch(descoption[*descpos]) {
r = bus_set_address_system_remote(b, host);
log_info("\"%s\" → %d, \"%s\"", host, r, strna(r >= 0 ? b->address : NULL));
if (result < 0 || expected) {
- assert(r == result);
+ assert_se(r == result);
if (r >= 0)
assert_se(streq(b->address, expected));
}
static void maybe_exit(sd_event_source *s, struct inotify_context *c) {
unsigned n;
- assert(s);
- assert(c);
+ assert_se(s);
+ assert_se(c);
if (!c->delete_self_handler_called)
return;
compressed = compressed2 = malloc(BUFSIZE_2);
assert_se(compressed2);
r = compress(data, data_len, compressed, BUFSIZE_2, &csize);
- assert(r == 0);
+ assert_se(r == 0);
}
assert_se(r == 0);
};
static struct test_async_object *test_async_object_free(struct test_async_object *t) {
- assert(t);
+ assert_se(t);
free(t->ifname);
return mfree(t);
static void test_async_object_destroy(void *userdata) {
struct test_async_object *t = userdata;
- assert(userdata);
+ assert_se(userdata);
log_info("%s: n_ref=%u", __func__, t->n_ref);
test_async_object_unref(t);
uint16_t id;
uint8_t cmd;
- assert(genl);
- assert(m);
+ assert_se(genl);
+ assert_se(m);
assert_se(sd_genl_message_get_family_name(genl, m, &name) >= 0);
assert_se(streq(name, CTRL_GENL_NAME));
/* Create another cgroup below this one for the pids we forked off. We need this to be managed
* by the test so that pid1 doesn't delete it before we can read the xattrs. */
cgroup = path_join(cgroup_root, "oomdkilltest");
- assert(cgroup);
+ assert_se(cgroup);
assert_se(cg_create(SYSTEMD_CGROUP_CONTROLLER, cgroup) >= 0);
/* If we don't have permissions to set xattrs we're likely in a userns or missing capabilities */
assert_se(address_equal_4(bn->addresses[2], inet_addr("1.2.3.11")));
assert_se(address_equal_4(bn->addresses[3], inet_addr("1.2.3.12")));
- assert(!hashmap_get(hosts.by_name, "within.comment"));
- assert(!hashmap_get(hosts.by_name, "within.comment2"));
- assert(!hashmap_get(hosts.by_name, "within.comment3"));
- assert(!hashmap_get(hosts.by_name, "#"));
-
- assert(!hashmap_get(hosts.by_name, "short.address"));
- assert(!hashmap_get(hosts.by_name, "long.address"));
- assert(!hashmap_get(hosts.by_name, "multi.colon"));
+ assert_se(!hashmap_get(hosts.by_name, "within.comment"));
+ assert_se(!hashmap_get(hosts.by_name, "within.comment2"));
+ assert_se(!hashmap_get(hosts.by_name, "within.comment3"));
+ assert_se(!hashmap_get(hosts.by_name, "#"));
+
+ assert_se(!hashmap_get(hosts.by_name, "short.address"));
+ assert_se(!hashmap_get(hosts.by_name, "long.address"));
+ assert_se(!hashmap_get(hosts.by_name, "multi.colon"));
assert_se(!set_contains(hosts.no_address, "short.address"));
assert_se(!set_contains(hosts.no_address, "long.address"));
assert_se(!set_contains(hosts.no_address, "multi.colon"));
test_setup_logging(LOG_DEBUG);
p = test_acpi_fpdt();
- assert(p >= 0);
+ assert_se(p >= 0);
q = test_efi_loader();
- assert(q >= 0);
+ assert_se(q >= 0);
r = test_boot_timestamps();
- assert(r >= 0);
+ assert_se(r >= 0);
if (p == 0 && q == 0 && r == 0)
return log_tests_skipped("access to firmware variables not possible");
assert_se(runtime_dir = setup_fake_runtime_dir());
r = bpf_program_new(BPF_PROG_TYPE_CGROUP_SKB, &p);
- assert(r == 0);
+ assert_se(r == 0);
r = bpf_program_add_instructions(p, exit_insn, ELEMENTSOF(exit_insn));
- assert(r == 0);
+ assert_se(r == 0);
if (getuid() != 0)
return log_tests_skipped("not running as root");
log_notice("BPF firewalling (though without BPF_F_ALLOW_MULTI) supported. Good.");
r = bpf_program_load_kernel(p, log_buf, ELEMENTSOF(log_buf));
- assert(r >= 0);
+ assert_se(r >= 0);
if (test_custom_filter) {
zero(attr);
return log_tests_skipped("Kernel doesn't support the necessary bpf bits (masked out via seccomp?)");
assert_se(r >= 0);
- assert(u->ip_bpf_ingress);
- assert(u->ip_bpf_egress);
+ assert_se(u->ip_bpf_ingress);
+ assert_se(u->ip_bpf_egress);
r = bpf_program_load_kernel(u->ip_bpf_ingress, log_buf, ELEMENTSOF(log_buf));
log_notice("%s", log_buf);
log_notice("-------");
- assert(r >= 0);
+ assert_se(r >= 0);
r = bpf_program_load_kernel(u->ip_bpf_egress, log_buf, ELEMENTSOF(log_buf));
log_notice("%s", log_buf);
log_notice("-------");
- assert(r >= 0);
+ assert_se(r >= 0);
assert_se(unit_start(u) >= 0);
}
r = sd_bus_request_name_async(bus, &slot, "org.freedesktop.systemd.test-bus-util", 0, callback, &n_called);
- assert(r == 1);
+ assert_se(r == 1);
assert_se(sd_bus_slot_get_destroy_callback(slot, NULL) == 0);
assert_se(sd_bus_slot_get_destroy_callback(slot, &t) == 0);
assert_se(t == destroy_callback);
/* Force cleanup so we can look at n_called */
- assert(n_called == 0);
+ assert_se(n_called == 0);
sd_bus_slot_unref(slot);
- assert(n_called == 1);
+ assert_se(n_called == 1);
}
int main(int argc, char **argv) {
if (expect != USEC_INFINITY)
assert_se(r >= 0 && u == expect);
else
- assert(r == -ENOENT);
+ assert_se(r == -ENOENT);
calendar_spec_free(c);
assert_se(!capability_update_inherited_set(caps, set));
assert_se(!cap_get_flag(caps, CAP_CHOWN, CAP_INHERITABLE, &fv));
- assert(fv == CAP_SET);
+ assert_se(fv == CAP_SET);
cap_free(caps);
}
assert_se(cg_get_keyed_attribute("cpu", "/init.scope", "cpu.stat", STRV_MAKE("usage_usec", "no_such_attr"), vals3) == -ENXIO);
assert_se(cg_get_keyed_attribute_graceful("cpu", "/init.scope", "cpu.stat", STRV_MAKE("usage_usec", "no_such_attr"), vals3) == 1);
- assert(vals3[0] && !vals3[1]);
+ assert_se(vals3[0] && !vals3[1]);
free(vals3[0]);
assert_se(cg_get_keyed_attribute("cpu", "/init.scope", "cpu.stat", STRV_MAKE("usage_usec", "usage_usec"), vals3) == -ENXIO);
assert_se(cg_get_keyed_attribute_graceful("cpu", "/init.scope", "cpu.stat", STRV_MAKE("usage_usec", "usage_usec"), vals3) == 1);
- assert(vals3[0] && !vals3[1]);
+ assert_se(vals3[0] && !vals3[1]);
free(vals3[0]);
assert_se(cg_get_keyed_attribute("cpu", "/init.scope", "cpu.stat",
int c;
- assert(argc >= 0);
- assert(argv);
+ assert_se(argc >= 0);
+ assert_se(argv);
while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0)
switch (c) {
else {
log_info("→ %s", p);
if (arg_open)
- assert(fd >= 0);
+ assert_se(fd >= 0);
else
- assert(fd == -1);
+ assert_se(fd == -1);
}
}
free(gid);
ngroups_max = sysconf(_SC_NGROUPS_MAX);
- assert(ngroups_max > 0);
+ assert_se(ngroups_max > 0);
gids = newa(gid_t, ngroups_max);
ngroups = getgroups(ngroups_max, gids);
- assert(ngroups >= 0);
+ assert_se(ngroups >= 0);
max_gid = getgid();
for (i = 0; i < ngroups; i++) {
assert_se(allocated <= sizeof expected);
assert_se(allocated >= DIV_ROUND_UP(201u, 8u)); /* We need at least 201 bits for our mask */
- assert(memcmp(array, expected, allocated) == 0);
+ assert_se(memcmp(array, expected, allocated) == 0);
assert_se(cpu_set_from_dbus(array, allocated, &c2) == 0);
assert_se(c2.set);
int r;
r = cpus_in_affinity_mask();
- assert(r > 0);
+ assert_se(r > 0);
log_info("cpus_in_affinity_mask: %d", r);
}
log_info("%02d: <%s>", i, q);
if (i > 0)
assert_se(endswith(q, "."));
- assert(strlen(q) <= i);
- assert(strlen(q) + 3 >= strlen(t));
+ assert_se(strlen(q) <= i);
+ assert_se(strlen(q) + 3 >= strlen(t));
}
}
/* noop handlers, just check that arguments are passed correctly */
static int ignore_stdout_func(int fd, void *arg) {
- assert(fd >= 0);
- assert(arg == &here);
+ assert_se(fd >= 0);
+ assert_se(arg == &here);
safe_close(fd);
return 0;
}
static int ignore_stdout_func2(int fd, void *arg) {
- assert(fd >= 0);
- assert(arg == &here2);
+ assert_se(fd >= 0);
+ assert_se(arg == &here2);
safe_close(fd);
return 0;
}
static int ignore_stdout_func3(int fd, void *arg) {
- assert(fd >= 0);
- assert(arg == &here3);
+ assert_se(fd >= 0);
+ assert_se(arg == &here3);
safe_close(fd);
return 0;
struct passwd *p;
struct group *g;
- assert(name);
+ assert_se(name);
p = getpwnam(name);
if (!p ||
char buf[4096];
ssize_t l;
- assert(s);
- assert(fd >= 0);
+ assert_se(s);
+ assert_se(fd >= 0);
l = read(fd, buf, sizeof(buf) - 1);
if (l < 0) {
static int on_spawn_timeout(sd_event_source *s, uint64_t usec, void *userdata) {
pid_t *pid = userdata;
- assert(pid);
+ assert_se(pid);
(void) kill(*pid, SIGKILL);
static int on_spawn_sigchld(sd_event_source *s, const siginfo_t *si, void *userdata) {
int ret = -EIO;
- assert(si);
+ assert_se(si);
if (si->si_code == CLD_EXITED)
ret = si->si_status;
pid_t pid;
int r;
- assert(exec);
- assert(ret);
+ assert_se(exec);
+ assert_se(ret);
assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGCHLD, -1) >= 0);
_cleanup_strv_free_ char **libraries = NULL, **libraries_test = NULL;
int r;
- assert(user_runtime_unit_dir);
+ assert_se(user_runtime_unit_dir);
r = find_executable("touch", &fullpath_touch);
if (r < 0) {
"zzzz=${foobar:-${nothing}}\n"
"zzzzz=${nothing:+${nothing}}\n"
, WRITE_STRING_FILE_AVOID_NEWLINE);
- assert(r >= 0);
+ assert_se(r >= 0);
r = merge_env_file(&a, NULL, t);
assert_se(r >= 0);
"#\n"
"\n\n" /* empty line */
, WRITE_STRING_FILE_AVOID_NEWLINE);
- assert(r >= 0);
+ assert_se(r >= 0);
r = merge_env_file(&a, NULL, t);
assert_se(r >= 0);
}
static union in_addr_union *parse_addr(const char *str, union in_addr_union *u) {
- assert(str);
- assert(u);
+ assert_se(str);
+ assert_se(u);
assert_se(in_addr_from_string(AF_INET, str, u) >= 0);
return u;
}
if (ignore)
return false;
}
- assert(r >= 0);
+ assert_se(r >= 0);
assert_se(fw_add_masquerade(&ctx, true, AF_INET, parse_addr("10.0.2.0", &u), 28) >= 0);
assert_se(fw_add_masquerade(&ctx, false, AF_INET, parse_addr("10.0.2.0", &u), 28) >= 0);
hashmap_put(m, key, (void*) (const char*) "my dummy val");
HASHMAP_FOREACH_KEY(s, key, m) {
- assert(s);
+ assert_se(s);
if (!key_found[0] && streq(key, "key 1"))
key_found[0] = true;
else if (!key_found[1] && streq(key, "key 2"))
int fd;
fd = mkostemp_safe(path);
- assert(fd > 0);
+ assert_se(fd > 0);
close(fd);
/* simple hostname */
else
assert_not_reached();
}
- assert(!p && !q);
+ assert_se(!p && !q);
unit_file_changes_free(changes, n_changes);
changes = NULL; n_changes = 0;
else
assert_not_reached();
}
- assert(!p && !q);
+ assert_se(!p && !q);
unit_file_changes_free(changes, n_changes);
changes = NULL; n_changes = 0;
else
assert_not_reached();
}
- assert(!p && !q);
+ assert_se(!p && !q);
unit_file_changes_free(changes, n_changes);
changes = NULL; n_changes = 0;
UnitFileChange *changes = NULL;
size_t n_changes = 0;
- assert(root);
+ assert_se(root);
assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "xx.service", NULL) == -ENOENT);
assert_se(unit_file_get_state(UNIT_FILE_SYSTEM, root, "yy.service", NULL) == -ENOENT);
i->name, alias, r, expected,
alias2 ? " [" : "", strempty(alias2),
alias2 ? "]" : "");
- assert(r == expected);
+ assert_se(r == expected);
/* This is test for "instance propagation". This propagation matters mostly for WantedBy= and
* RequiredBy= settings, and less so for Alias=. The only case where it should happen is when we have
* an Alias=alias@.service an instantiated template template@instance. In that case the instance name
* should be propagated into the alias as alias@instance. */
- assert(streq_ptr(alias2, updated_name));
+ assert_se(streq_ptr(alias2, updated_name));
}
static void test_verify_alias(void) {
log_info("RELATIVE_SOURCE_PATH: %s", RELATIVE_SOURCE_PATH);
log_info("PROJECT_FILE: %s", PROJECT_FILE);
- assert(startswith(__FILE__, RELATIVE_SOURCE_PATH "/"));
+ assert_se(startswith(__FILE__, RELATIVE_SOURCE_PATH "/"));
}
static void test_log_struct(void) {
k++;
}
- assert(k == 3);
+ assert_se(k == 3);
FOREACH_POINTER(i, &b) {
- assert(k == 3);
- assert(i == &b);
+ assert_se(k == 3);
+ assert_se(i == &b);
k = 4;
}
- assert(k == 4);
+ assert_se(k == 4);
FOREACH_POINTER(i, NULL, &c, NULL, &b, NULL, &a, NULL) {
switch (k) {
k++;
}
- assert(k == 11);
+ assert_se(k == 11);
}
static void test_align_to(void) {
_cleanup_free_ char *z = NULL;
int r;
- assert(t);
+ assert_se(t);
r = normalize_recovery_key(t, &z);
assert_se(expected ?
k++;
}
log_info(" %s", *p);
- assert(u[k]); /* If NULL, we didn't find a matching entry */
+ assert_se(u[k]); /* If NULL, we didn't find a matching entry */
k++;
}
STRV_FOREACH(p, u + k)
assert_se(LOADAVG_INT_SIDE(rp.avg300) == 1);
assert_se(LOADAVG_DECIMAL_SIDE(rp.avg300) == 11);
assert_se(rp.total == 58761459);
- assert(read_resource_pressure(path, PRESSURE_TYPE_FULL, &rp) == 0);
+ assert_se(read_resource_pressure(path, PRESSURE_TYPE_FULL, &rp) == 0);
assert_se(LOADAVG_INT_SIDE(rp.avg10) == 0);
assert_se(LOADAVG_DECIMAL_SIDE(rp.avg10) == 23);
assert_se(LOADAVG_INT_SIDE(rp.avg60) == 0);
assert_se(LOADAVG_INT_SIDE(rp.avg300) == 1);
assert_se(LOADAVG_DECIMAL_SIDE(rp.avg300) == 11);
assert_se(rp.total == 58761459);
- assert(read_resource_pressure(path, PRESSURE_TYPE_FULL, &rp) == 0);
+ assert_se(read_resource_pressure(path, PRESSURE_TYPE_FULL, &rp) == 0);
assert_se(LOADAVG_INT_SIDE(rp.avg10) == 0);
assert_se(LOADAVG_DECIMAL_SIDE(rp.avg10) == 23);
assert_se(LOADAVG_INT_SIDE(rp.avg60) == 0);
char ***l = userdata;
- assert(path);
- assert(de);
+ assert_se(path);
+ assert_se(de);
switch (event) {
for (;;) {
r = sd_hwdb_enumerate(hwdb, &key, &value);
- assert(IN_SET(r, 0, 1));
+ assert_se(IN_SET(r, 0, 1));
if (r == 0)
break;
- assert(key);
- assert(value);
+ assert_se(key);
+ assert_se(value);
log_debug("A: \"%s\" → \"%s\"", key, value);
len1 += strlen(key) + strlen(value);
}
copy = set_copy(s);
assert_se(copy);
- assert(set_equal(s, copy));
+ assert_se(set_equal(s, copy));
set_free(s);
set_free_free(copy);
info(SIGRTMAX);
/* We use signals SIGRTMIN+0 to SIGRTMIN+24 unconditionally */
- assert(SIGRTMAX - SIGRTMIN >= 24);
+ assert_se(SIGRTMAX - SIGRTMIN >= 24);
}
static void test_signal_to_string_one(int val) {
r = socket_address_print(&a, &out);
if (r < 0)
log_error_errno(r, "Printing failed for \"%s\": %m", in);
- assert(r >= 0);
+ assert_se(r >= 0);
assert_se(a.type == 0);
}
static void test_ifname_valid(void) {
log_info("/* %s */", __func__);
- assert( ifname_valid("foo"));
- assert( ifname_valid("eth0"));
-
- assert(!ifname_valid("0"));
- assert(!ifname_valid("99"));
- assert( ifname_valid("a99"));
- assert( ifname_valid("99a"));
-
- assert(!ifname_valid(NULL));
- assert(!ifname_valid(""));
- assert(!ifname_valid(" "));
- assert(!ifname_valid(" foo"));
- assert(!ifname_valid("bar\n"));
- assert(!ifname_valid("."));
- assert(!ifname_valid(".."));
- assert(ifname_valid("foo.bar"));
- assert(!ifname_valid("x:y"));
-
- assert( ifname_valid_full("xxxxxxxxxxxxxxx", 0));
- assert(!ifname_valid_full("xxxxxxxxxxxxxxxx", 0));
- assert( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE));
- assert( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE));
- assert(!ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE));
- assert( ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE | IFNAME_VALID_NUMERIC));
- assert(!ifname_valid_full("0", IFNAME_VALID_ALTERNATIVE | IFNAME_VALID_NUMERIC));
+ assert_se( ifname_valid("foo"));
+ assert_se( ifname_valid("eth0"));
+
+ assert_se(!ifname_valid("0"));
+ assert_se(!ifname_valid("99"));
+ assert_se( ifname_valid("a99"));
+ assert_se( ifname_valid("99a"));
+
+ assert_se(!ifname_valid(NULL));
+ assert_se(!ifname_valid(""));
+ assert_se(!ifname_valid(" "));
+ assert_se(!ifname_valid(" foo"));
+ assert_se(!ifname_valid("bar\n"));
+ assert_se(!ifname_valid("."));
+ assert_se(!ifname_valid(".."));
+ assert_se(ifname_valid("foo.bar"));
+ assert_se(!ifname_valid("x:y"));
+
+ assert_se( ifname_valid_full("xxxxxxxxxxxxxxx", 0));
+ assert_se(!ifname_valid_full("xxxxxxxxxxxxxxxx", 0));
+ assert_se( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE));
+ assert_se( ifname_valid_full("xxxxxxxxxxxxxxxx", IFNAME_VALID_ALTERNATIVE));
+ assert_se(!ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE));
+ assert_se( ifname_valid_full("999", IFNAME_VALID_ALTERNATIVE | IFNAME_VALID_NUMERIC));
+ assert_se(!ifname_valid_full("0", IFNAME_VALID_ALTERNATIVE | IFNAME_VALID_NUMERIC));
}
static void test_socket_print_unix_one(const char *in, size_t len_in, const char *expected) {
_cleanup_free_ char *out = NULL, *c = NULL;
- assert(len_in <= SUN_PATH_LEN);
+ assert_se(len_in <= SUN_PATH_LEN);
SocketAddress a = { .sockaddr = { .un = { .sun_family = AF_UNIX } },
.size = offsetof(struct sockaddr_un, sun_path) + len_in,
.type = SOCK_STREAM,
test_gid = getgid();
ngroups_max = sysconf(_SC_NGROUPS_MAX);
- assert(ngroups_max > 0);
+ assert_se(ngroups_max > 0);
test_gids = newa(gid_t, ngroups_max);
log_debug("> %s", path);
if (stat(path, &st) < 0) {
- assert(errno == ENOENT);
+ assert_se(errno == ENOENT);
log_notice("Path %s not found, skipping test", path);
return;
}
v = strv_new("xxx", "*\\*", "yyy");
assert_se(!strv_fnmatch_full(v, "\\", 0, NULL));
assert_se(strv_fnmatch_full(v, "\\", FNM_NOESCAPE, &pos));
- assert(pos == 1);
+ assert_se(pos == 1);
}
int main(int argc, char *argv[]) {
/* Ensure TIME_T_MAX works correctly */
uintmax_t x = TIME_T_MAX;
x++;
- assert((time_t) x < 0);
+ assert_se((time_t) x < 0);
return 0;
}
r = tempfn_random(p, extra, &s);
log_info_errno(r, "%s+%s → %s vs. %s (%i/%m vs. %i/%s)", p, strna(extra), strna(s), strna(expect), r, ret, strerror_safe(ret));
- assert(!s == !expect);
+ assert_se(!s == !expect);
if (s) {
const char *suffix;
assert_se(in_charset(suffix, HEXDIGITS));
assert_se(strlen(suffix) == 16);
}
- assert(ret == r);
+ assert_se(ret == r);
}
static void test_tempfn_random(void) {
r = tempfn_xxxxxx(p, extra, &s);
log_info_errno(r, "%s+%s → %s vs. %s (%i/%m vs. %i/%s)", p, strna(extra), strna(s), strna(expect), r, ret, strerror_safe(ret));
- assert(!s == !expect);
+ assert_se(!s == !expect);
if (s) {
const char *suffix;
assert_se(suffix = startswith(s, expect));
assert_se(streq(suffix, "XXXXXX"));
}
- assert(ret == r);
+ assert_se(ret == r);
}
static void test_tempfn_xxxxxx(void) {
*id,
&fragment,
&names);
- assert(r == 0);
+ assert_se(r == 0);
log_info("fragment: %s", fragment);
log_info("names:");
SET_FOREACH(name, names)
r = service_deserialize_exec_command(u, key, line);
log_debug("[%s] → %d (expected: %d)", line, r, expected);
- assert(r == expected);
+ assert_se(r == expected);
/* Note that the command doesn't match any command in the empty list of commands in 's', so it is
* always rejected with "Current command vanished from the unit file", and we don't leak anything. */
assert_se(make_salt(&t) == 0);
log_info("got %s", t);
- assert(!streq(s, t));
+ assert_se(!streq(s, t));
}
static void test_in_gid(void) {
- assert(in_gid(getgid()) >= 0);
- assert(in_gid(getegid()) >= 0);
- assert(in_gid(GID_INVALID) < 0);
- assert(in_gid(TTY_GID) == 0); /* The TTY gid is for owning ttys, it would be really really weird if we were in it. */
+ assert_se(in_gid(getgid()) >= 0);
+ assert_se(in_gid(getegid()) >= 0);
+ assert_se(in_gid(GID_INVALID) < 0);
+ assert_se(in_gid(TTY_GID) == 0); /* The TTY gid is for owning ttys, it would be really really weird if we were in it. */
}
static void test_gid_lists_ops(void) {
static int on_connect(VarlinkServer *s, Varlink *link, void *userdata) {
uid_t uid = UID_INVALID;
- assert(s);
- assert(link);
+ assert_se(s);
+ assert_se(link);
assert_se(varlink_get_peer_uid(link, &uid) >= 0);
assert_se(getuid() == uid);
int c;
- assert(argc >= 0);
- assert(argv);
+ assert_se(argc >= 0);
+ assert_se(argv);
while ((c = getopt_long(argc, argv, "r:", options, NULL)) >= 0)
switch(c) {