2020-12-23 22:21:36 +01:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
2019-09-25 13:13:40 +02:00
|
|
|
/*
|
2014-10-29 09:36:47 -05:00
|
|
|
* Copyright (C) 2004 - 2012 Red Hat, Inc.
|
|
|
|
|
* Copyright (C) 2005 - 2008 Novell, Inc.
|
|
|
|
|
*/
|
|
|
|
|
|
2021-02-04 18:04:13 +01:00
|
|
|
#include "src/core/nm-default-daemon.h"
|
2014-11-13 10:07:02 -05:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <fcntl.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <unistd.h>
|
|
|
|
|
#include <sys/stat.h>
|
|
|
|
|
#include <locale.h>
|
|
|
|
|
|
2016-03-21 12:01:26 +01:00
|
|
|
#include <glib/gstdio.h>
|
2014-10-29 09:36:47 -05:00
|
|
|
|
|
|
|
|
#include "main-utils.h"
|
2015-03-13 20:57:18 +01:00
|
|
|
#include "NetworkManagerUtils.h"
|
2016-04-04 18:18:49 +02:00
|
|
|
#include "nm-config.h"
|
2014-10-29 09:36:47 -05:00
|
|
|
|
2015-01-12 11:31:10 -05:00
|
|
|
static gboolean
|
|
|
|
|
sighup_handler(gpointer user_data)
|
|
|
|
|
{
|
2015-06-25 21:10:32 +02:00
|
|
|
nm_main_config_reload(GPOINTER_TO_INT(user_data));
|
2015-01-12 11:31:10 -05:00
|
|
|
return G_SOURCE_CONTINUE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static gboolean
|
|
|
|
|
sigint_handler(gpointer user_data)
|
2014-10-29 09:36:47 -05:00
|
|
|
{
|
2015-01-12 11:31:10 -05:00
|
|
|
GMainLoop *main_loop = user_data;
|
|
|
|
|
|
|
|
|
|
nm_log_info(LOGD_CORE, "caught SIGINT, shutting down normally.");
|
|
|
|
|
g_main_loop_quit(main_loop);
|
|
|
|
|
|
|
|
|
|
return G_SOURCE_REMOVE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static gboolean
|
|
|
|
|
sigterm_handler(gpointer user_data)
|
|
|
|
|
{
|
|
|
|
|
GMainLoop *main_loop = user_data;
|
|
|
|
|
|
|
|
|
|
nm_log_info(LOGD_CORE, "caught SIGTERM, shutting down normally.");
|
|
|
|
|
g_main_loop_quit(main_loop);
|
|
|
|
|
|
|
|
|
|
return G_SOURCE_REMOVE;
|
2014-10-29 09:36:47 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_main_utils_setup_signals:
|
|
|
|
|
* @main_loop: the #GMainLoop to quit when SIGINT or SIGTERM is received
|
|
|
|
|
*
|
2015-01-12 11:31:10 -05:00
|
|
|
* Sets up signal handling for NetworkManager.
|
2014-10-29 09:36:47 -05:00
|
|
|
*/
|
2015-01-12 11:31:10 -05:00
|
|
|
void
|
|
|
|
|
nm_main_utils_setup_signals(GMainLoop *main_loop)
|
2014-10-29 09:36:47 -05:00
|
|
|
{
|
2015-01-12 11:31:10 -05:00
|
|
|
g_return_if_fail(main_loop != NULL);
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2015-01-12 11:31:10 -05:00
|
|
|
signal(SIGPIPE, SIG_IGN);
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2015-06-25 21:10:32 +02:00
|
|
|
g_unix_signal_add(SIGHUP, sighup_handler, GINT_TO_POINTER(SIGHUP));
|
2015-11-25 10:51:43 +01:00
|
|
|
if (nm_glib_check_version(2, 36, 0)) {
|
|
|
|
|
g_unix_signal_add(SIGUSR1, sighup_handler, GINT_TO_POINTER(SIGUSR1));
|
|
|
|
|
g_unix_signal_add(SIGUSR2, sighup_handler, GINT_TO_POINTER(SIGUSR2));
|
|
|
|
|
} else
|
|
|
|
|
nm_log_warn(LOGD_CORE,
|
|
|
|
|
"glib-version: cannot handle SIGUSR1 and SIGUSR2 signals. Consider upgrading "
|
|
|
|
|
"glib to 2.36.0 or newer");
|
2015-01-12 11:31:10 -05:00
|
|
|
g_unix_signal_add(SIGINT, sigint_handler, main_loop);
|
|
|
|
|
g_unix_signal_add(SIGTERM, sigterm_handler, main_loop);
|
2014-10-29 09:36:47 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
gboolean
|
|
|
|
|
nm_main_utils_write_pidfile(const char *pidfile)
|
|
|
|
|
{
|
|
|
|
|
char pid[16];
|
|
|
|
|
int fd;
|
2019-01-31 13:29:21 +01:00
|
|
|
int errsv;
|
2014-10-29 09:36:47 -05:00
|
|
|
gboolean success = FALSE;
|
all: cleanup close() handling and clarify nm_close()/nm_close_with_error()
Cleanup the handling of close().
First of all, closing an invalid (non-negative) file descriptor (EBADF) is
always a serious bug. We want to catch that. Hence, we should use nm_close()
(or nm_close_with_error()) which asserts against such bugs. Don't ever use
close() directly, to get that additional assertion.
Also, our nm_close() handles EINTR internally and correctly. Recent
POSIX defines that on EINTR the close should be retried. On Linux,
that is never correct. After close() returns, the file descriptor is
always closed (or invalid). nm_close() gets this right, and pretends
that EINTR is a success (without retrying).
The majority of our file descriptors are sockets, etc. That means,
often an error from close isn't something that we want to handle. Adjust
nm_close() to return no error and preserve the caller's errno. That is
the appropriate reaction to error (ignoring it) in most of our cases.
And error from close may mean that there was an IO error (except EINTR
and EBADF). In a few cases, we may want to handle that. For those
cases we have nm_close_with_error().
TL;DR: use almost always nm_close(). Unless you want to handle the error
code, then use nm_close_with_error(). Never use close() directly.
There is much reading on the internet about handling errors of close and
in particular EINTR. See the following links:
https://lwn.net/Articles/576478/
https://askcodes.net/coding/what-to-do-if-a-posix-close-call-fails-
https://www.austingroupbugs.net/view.php?id=529
https://sourceware.org/bugzilla/show_bug.cgi?id=14627
https://news.ycombinator.com/item?id=3363819
https://peps.python.org/pep-0475/
2022-10-14 20:15:46 +02:00
|
|
|
int r;
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2016-12-10 15:28:15 +01:00
|
|
|
if ((fd = open(pidfile, O_CREAT | O_WRONLY | O_TRUNC | O_CLOEXEC, 00644)) < 0) {
|
2019-01-31 13:29:21 +01:00
|
|
|
errsv = errno;
|
2019-01-31 17:22:18 +01:00
|
|
|
fprintf(stderr, _("Opening %s failed: %s\n"), pidfile, nm_strerror_native(errsv));
|
2014-10-29 09:36:47 -05:00
|
|
|
return FALSE;
|
|
|
|
|
}
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
g_snprintf(pid, sizeof(pid), "%d", getpid());
|
2019-01-31 13:29:21 +01:00
|
|
|
if (write(fd, pid, strlen(pid)) < 0) {
|
|
|
|
|
errsv = errno;
|
2019-01-31 17:22:18 +01:00
|
|
|
fprintf(stderr, _("Writing to %s failed: %s\n"), pidfile, nm_strerror_native(errsv));
|
2019-01-31 13:29:21 +01:00
|
|
|
} else
|
2014-10-29 09:36:47 -05:00
|
|
|
success = TRUE;
|
2020-09-28 16:03:33 +02:00
|
|
|
|
all: cleanup close() handling and clarify nm_close()/nm_close_with_error()
Cleanup the handling of close().
First of all, closing an invalid (non-negative) file descriptor (EBADF) is
always a serious bug. We want to catch that. Hence, we should use nm_close()
(or nm_close_with_error()) which asserts against such bugs. Don't ever use
close() directly, to get that additional assertion.
Also, our nm_close() handles EINTR internally and correctly. Recent
POSIX defines that on EINTR the close should be retried. On Linux,
that is never correct. After close() returns, the file descriptor is
always closed (or invalid). nm_close() gets this right, and pretends
that EINTR is a success (without retrying).
The majority of our file descriptors are sockets, etc. That means,
often an error from close isn't something that we want to handle. Adjust
nm_close() to return no error and preserve the caller's errno. That is
the appropriate reaction to error (ignoring it) in most of our cases.
And error from close may mean that there was an IO error (except EINTR
and EBADF). In a few cases, we may want to handle that. For those
cases we have nm_close_with_error().
TL;DR: use almost always nm_close(). Unless you want to handle the error
code, then use nm_close_with_error(). Never use close() directly.
There is much reading on the internet about handling errors of close and
in particular EINTR. See the following links:
https://lwn.net/Articles/576478/
https://askcodes.net/coding/what-to-do-if-a-posix-close-call-fails-
https://www.austingroupbugs.net/view.php?id=529
https://sourceware.org/bugzilla/show_bug.cgi?id=14627
https://news.ycombinator.com/item?id=3363819
https://peps.python.org/pep-0475/
2022-10-14 20:15:46 +02:00
|
|
|
r = nm_close_with_error(fd);
|
|
|
|
|
if (r < 0) {
|
|
|
|
|
fprintf(stderr, _("Closing %s failed: %s\n"), pidfile, nm_strerror_native(-r));
|
2019-01-31 13:29:21 +01:00
|
|
|
}
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
return success;
|
|
|
|
|
}
|
|
|
|
|
|
2016-03-21 12:01:26 +01:00
|
|
|
void
|
2022-10-11 11:09:44 +02:00
|
|
|
nm_main_utils_ensure_statedir(void)
|
2016-03-21 12:01:26 +01:00
|
|
|
{
|
|
|
|
|
gs_free char *parent = NULL;
|
|
|
|
|
int errsv;
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2016-03-21 12:01:26 +01:00
|
|
|
parent = g_path_get_dirname(NMSTATEDIR);
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2016-03-21 12:01:26 +01:00
|
|
|
/* Ensure parent state directories exists */
|
|
|
|
|
if (parent && parent[0] == '/' && parent[1] != '\0'
|
|
|
|
|
&& g_mkdir_with_parents(parent, 0755) != 0) {
|
|
|
|
|
errsv = errno;
|
2019-01-31 17:08:03 +01:00
|
|
|
fprintf(stderr,
|
|
|
|
|
"Cannot create parents for '%s': %s",
|
|
|
|
|
NMSTATEDIR,
|
|
|
|
|
nm_strerror_native(errsv));
|
2016-03-21 12:01:26 +01:00
|
|
|
exit(1);
|
|
|
|
|
}
|
|
|
|
|
/* Ensure state directory exists */
|
|
|
|
|
if (g_mkdir_with_parents(NMSTATEDIR, 0700) != 0) {
|
|
|
|
|
errsv = errno;
|
2019-01-31 17:08:03 +01:00
|
|
|
fprintf(stderr, "Cannot create '%s': %s", NMSTATEDIR, nm_strerror_native(errsv));
|
2016-03-21 12:01:26 +01:00
|
|
|
exit(1);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2015-03-13 22:55:39 +01:00
|
|
|
void
|
2022-10-11 11:09:44 +02:00
|
|
|
nm_main_utils_ensure_rundir(void)
|
2015-03-13 22:55:39 +01:00
|
|
|
{
|
2016-04-04 18:18:49 +02:00
|
|
|
int errsv;
|
|
|
|
|
|
2015-03-13 22:55:39 +01:00
|
|
|
/* Setup runtime directory */
|
|
|
|
|
if (g_mkdir_with_parents(NMRUNDIR, 0755) != 0) {
|
2016-04-04 18:18:49 +02:00
|
|
|
errsv = errno;
|
2019-01-31 17:08:03 +01:00
|
|
|
fprintf(stderr, _("Cannot create '%s': %s"), NMRUNDIR, nm_strerror_native(errsv));
|
2015-03-13 22:55:39 +01:00
|
|
|
exit(1);
|
|
|
|
|
}
|
2016-04-04 18:18:49 +02:00
|
|
|
|
2017-04-19 15:56:24 +02:00
|
|
|
/* NM_CONFIG_DEVICE_STATE_DIR is used to determine whether NM is restarted or not.
|
|
|
|
|
* It is important to set NMConfigCmdLineOptions.first_start before creating
|
|
|
|
|
* the directory. */
|
2016-04-04 18:18:49 +02:00
|
|
|
nm_assert(g_str_has_prefix(NM_CONFIG_DEVICE_STATE_DIR, NMRUNDIR "/"));
|
|
|
|
|
if (g_mkdir(NM_CONFIG_DEVICE_STATE_DIR, 0755) != 0) {
|
|
|
|
|
errsv = errno;
|
|
|
|
|
if (errsv != EEXIST) {
|
2019-01-31 17:08:03 +01:00
|
|
|
fprintf(stderr,
|
|
|
|
|
_("Cannot create '%s': %s"),
|
|
|
|
|
NM_CONFIG_DEVICE_STATE_DIR,
|
|
|
|
|
nm_strerror_native(errsv));
|
2016-04-04 18:18:49 +02:00
|
|
|
exit(1);
|
|
|
|
|
}
|
|
|
|
|
}
|
2015-03-13 22:55:39 +01:00
|
|
|
}
|
|
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
/**
|
2015-03-13 23:06:29 +01:00
|
|
|
* nm_main_utils_ensure_not_running_pidfile:
|
2014-10-29 09:36:47 -05:00
|
|
|
* @pidfile: the pid file
|
|
|
|
|
*
|
|
|
|
|
* Checks whether the pidfile already exists and contains PID of a running
|
|
|
|
|
* process.
|
|
|
|
|
*
|
2015-03-13 23:06:29 +01:00
|
|
|
* Exits with code 1 if a conflicting process is running.
|
2014-10-29 09:36:47 -05:00
|
|
|
*/
|
2015-03-13 23:06:29 +01:00
|
|
|
void
|
|
|
|
|
nm_main_utils_ensure_not_running_pidfile(const char *pidfile)
|
2014-10-29 09:36:47 -05:00
|
|
|
{
|
2015-03-13 23:06:29 +01:00
|
|
|
gs_free char *contents = NULL;
|
|
|
|
|
gs_free char *proc_cmdline = NULL;
|
2014-10-29 09:36:47 -05:00
|
|
|
gsize len = 0;
|
all: don't use gchar/gshort/gint/glong but C types
We commonly don't use the glib typedefs for char/short/int/long,
but their C types directly.
$ git grep '\<g\(char\|short\|int\|long\|float\|double\)\>' | wc -l
587
$ git grep '\<\(char\|short\|int\|long\|float\|double\)\>' | wc -l
21114
One could argue that using the glib typedefs is preferable in
public API (of our glib based libnm library) or where it clearly
is related to glib, like during
g_object_set (obj, PROPERTY, (gint) value, NULL);
However, that argument does not seem strong, because in practice we don't
follow that argument today, and seldomly use the glib typedefs.
Also, the style guide for this would be hard to formalize, because
"using them where clearly related to a glib" is a very loose suggestion.
Also note that glib typedefs will always just be typedefs of the
underlying C types. There is no danger of glib changing the meaning
of these typedefs (because that would be a major API break of glib).
A simple style guide is instead: don't use these typedefs.
No manual actions, I only ran the bash script:
FILES=($(git ls-files '*.[hc]'))
sed -i \
-e 's/\<g\(char\|short\|int\|long\|float\|double\)\>\( [^ ]\)/\1\2/g' \
-e 's/\<g\(char\|short\|int\|long\|float\|double\)\> /\1 /g' \
-e 's/\<g\(char\|short\|int\|long\|float\|double\)\>/\1/g' \
"${FILES[@]}"
2018-07-11 07:40:19 +02:00
|
|
|
long pid;
|
2021-11-09 13:28:54 +01:00
|
|
|
const char *process_name;
|
|
|
|
|
const char *prgname = g_get_prgname();
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2015-03-13 23:06:29 +01:00
|
|
|
g_return_if_fail(prgname);
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2015-03-13 23:06:29 +01:00
|
|
|
if (!pidfile || !*pidfile)
|
|
|
|
|
return;
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2015-03-13 23:06:29 +01:00
|
|
|
if (!g_file_get_contents(pidfile, &contents, &len, NULL))
|
|
|
|
|
return;
|
2014-10-29 09:36:47 -05:00
|
|
|
if (len <= 0)
|
2015-03-13 23:06:29 +01:00
|
|
|
return;
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
errno = 0;
|
|
|
|
|
pid = strtol(contents, NULL, 10);
|
|
|
|
|
if (pid <= 0 || pid > 65536 || errno)
|
2015-03-13 23:06:29 +01:00
|
|
|
return;
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2020-03-23 11:00:43 +01:00
|
|
|
nm_clear_g_free(&contents);
|
2014-10-29 09:36:47 -05:00
|
|
|
proc_cmdline = g_strdup_printf("/proc/%ld/cmdline", pid);
|
|
|
|
|
if (!g_file_get_contents(proc_cmdline, &contents, &len, NULL))
|
2015-03-13 23:06:29 +01:00
|
|
|
return;
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
process_name = strrchr(contents, '/');
|
|
|
|
|
if (process_name)
|
|
|
|
|
process_name++;
|
|
|
|
|
else
|
|
|
|
|
process_name = contents;
|
2015-03-13 23:06:29 +01:00
|
|
|
if (strcmp(process_name, prgname) == 0) {
|
2014-10-29 09:36:47 -05:00
|
|
|
/* Check that the process exists */
|
|
|
|
|
if (kill(pid, 0) == 0) {
|
2015-03-13 23:06:29 +01:00
|
|
|
fprintf(stderr, _("%s is already running (pid %ld)\n"), prgname, pid);
|
|
|
|
|
exit(1);
|
2014-10-29 09:36:47 -05:00
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
gboolean
|
2021-11-09 13:28:54 +01:00
|
|
|
nm_main_utils_early_setup(const char *progname,
|
|
|
|
|
int *argc,
|
|
|
|
|
char **argv[],
|
2014-10-29 09:36:47 -05:00
|
|
|
GOptionEntry *options,
|
2014-07-09 15:17:01 +02:00
|
|
|
void (*option_context_hook)(gpointer user_data, GOptionContext *opt_ctx),
|
|
|
|
|
gpointer option_context_hook_data,
|
2014-10-29 09:36:47 -05:00
|
|
|
const char *summary)
|
|
|
|
|
{
|
|
|
|
|
GOptionContext *opt_ctx = NULL;
|
2021-11-09 13:28:54 +01:00
|
|
|
GError *error = NULL;
|
2014-10-29 09:36:47 -05:00
|
|
|
gboolean success = FALSE;
|
|
|
|
|
int i;
|
2021-11-09 13:28:54 +01:00
|
|
|
const char *opt_fmt_log_level = NULL, *opt_fmt_log_domains = NULL;
|
|
|
|
|
const char **opt_loc_log_level = NULL, **opt_loc_log_domains = NULL;
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
/* Make GIO ignore the remote VFS service; otherwise it tries to use the
|
|
|
|
|
* session bus to contact the remote service, and NM shouldn't ever be
|
|
|
|
|
* talking on the session bus. See rh #588745
|
|
|
|
|
*/
|
|
|
|
|
setenv("GIO_USE_VFS", "local", 1);
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Set the umask to 0022, which results in 0666 & ~0022 = 0644.
|
|
|
|
|
* Otherwise, if root (or an su'ing user) has a wacky umask, we could
|
|
|
|
|
* write out an unreadable resolv.conf.
|
|
|
|
|
*/
|
|
|
|
|
umask(022);
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
/* Ensure gettext() gets the right environment (bgo #666516) */
|
|
|
|
|
setlocale(LC_ALL, "");
|
|
|
|
|
textdomain(GETTEXT_PACKAGE);
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
for (i = 0; options[i].long_name; i++) {
|
2016-06-05 11:46:06 +02:00
|
|
|
NM_PRAGMA_WARNING_DISABLE("-Wformat-nonliteral")
|
2015-03-19 16:28:59 +01:00
|
|
|
if (!strcmp(options[i].long_name, "log-level")) {
|
|
|
|
|
opt_fmt_log_level = options[i].description;
|
|
|
|
|
opt_loc_log_level = &options[i].description;
|
2014-10-29 09:36:47 -05:00
|
|
|
options[i].description =
|
|
|
|
|
g_strdup_printf(options[i].description, nm_logging_all_levels_to_string());
|
2015-03-19 16:28:59 +01:00
|
|
|
} else if (!strcmp(options[i].long_name, "log-domains")) {
|
|
|
|
|
opt_fmt_log_domains = options[i].description;
|
|
|
|
|
opt_loc_log_domains = &options[i].description;
|
2014-10-29 09:36:47 -05:00
|
|
|
options[i].description =
|
|
|
|
|
g_strdup_printf(options[i].description, nm_logging_all_domains_to_string());
|
2015-03-19 16:28:59 +01:00
|
|
|
}
|
2016-06-05 11:46:06 +02:00
|
|
|
NM_PRAGMA_WARNING_REENABLE
|
2014-10-29 09:36:47 -05:00
|
|
|
}
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
/* Parse options */
|
|
|
|
|
opt_ctx = g_option_context_new(NULL);
|
|
|
|
|
g_option_context_set_translation_domain(opt_ctx, GETTEXT_PACKAGE);
|
|
|
|
|
g_option_context_set_ignore_unknown_options(opt_ctx, FALSE);
|
|
|
|
|
g_option_context_set_help_enabled(opt_ctx, TRUE);
|
|
|
|
|
g_option_context_add_main_entries(opt_ctx, options, NULL);
|
|
|
|
|
g_option_context_set_summary(opt_ctx, summary);
|
2014-07-09 15:17:01 +02:00
|
|
|
if (option_context_hook)
|
|
|
|
|
option_context_hook(option_context_hook_data, opt_ctx);
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
success = g_option_context_parse(opt_ctx, argc, argv, &error);
|
|
|
|
|
if (!success) {
|
|
|
|
|
fprintf(stderr,
|
|
|
|
|
_("%s. Please use --help to see a list of valid options.\n"),
|
|
|
|
|
error->message);
|
|
|
|
|
g_clear_error(&error);
|
|
|
|
|
}
|
|
|
|
|
g_option_context_free(opt_ctx);
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2015-03-19 16:28:59 +01:00
|
|
|
if (opt_loc_log_level) {
|
|
|
|
|
g_free((char *) *opt_loc_log_level);
|
|
|
|
|
*opt_loc_log_level = opt_fmt_log_level;
|
|
|
|
|
}
|
|
|
|
|
if (opt_loc_log_domains) {
|
|
|
|
|
g_free((char *) *opt_loc_log_domains);
|
|
|
|
|
*opt_loc_log_domains = opt_fmt_log_domains;
|
|
|
|
|
}
|
2020-09-28 16:03:33 +02:00
|
|
|
|
2014-10-29 09:36:47 -05:00
|
|
|
return success;
|
|
|
|
|
}
|