request->num_scripts_nowait++;
return TRUE;
} else {
- _LOG_S_W (script, "complete: failed to execute script: %s (%d)",
- error->message, error->code);
+ _LOG_S_W (script, "complete: failed to execute script: %s", error->message);
script->result = DISPATCH_RESULT_EXEC_FAILED;
script->error = g_strdup (error->message);
request->num_scripts_done++;
dirname = NMD_SCRIPT_DIR_DEFAULT;
if (!(dir = g_dir_open (dirname, 0, &error))) {
- g_message ("find-scripts: Failed to open dispatcher directory '%s': (%d) %s",
- dirname, error->code, error->message);
+ g_message ("find-scripts: Failed to open dispatcher directory '%s': %s",
+ dirname, error->message);
g_error_free (error);
return NULL;
}
g_bytes_unref (priv->ca_cert);
priv->ca_cert = set_cert_prop_helper (value, NM_SETTING_802_1X_CA_CERT, &error);
if (error) {
- g_warning ("Error setting certificate (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting certificate (invalid data): %s", error->message);
g_error_free (error);
}
break;
g_bytes_unref (priv->client_cert);
priv->client_cert = set_cert_prop_helper (value, NM_SETTING_802_1X_CLIENT_CERT, &error);
if (error) {
- g_warning ("Error setting certificate (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting certificate (invalid data): %s", error->message);
g_error_free (error);
}
break;
g_bytes_unref (priv->phase2_ca_cert);
priv->phase2_ca_cert = set_cert_prop_helper (value, NM_SETTING_802_1X_PHASE2_CA_CERT, &error);
if (error) {
- g_warning ("Error setting certificate (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting certificate (invalid data): %s", error->message);
g_error_free (error);
}
break;
g_bytes_unref (priv->phase2_client_cert);
priv->phase2_client_cert = set_cert_prop_helper (value, NM_SETTING_802_1X_PHASE2_CLIENT_CERT, &error);
if (error) {
- g_warning ("Error setting certificate (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting certificate (invalid data): %s", error->message);
g_error_free (error);
}
break;
g_bytes_unref (priv->private_key);
priv->private_key = set_cert_prop_helper (value, NM_SETTING_802_1X_PRIVATE_KEY, &error);
if (error) {
- g_warning ("Error setting private key (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting private key (invalid data): %s", error->message);
g_error_free (error);
}
break;
g_bytes_unref (priv->phase2_private_key);
priv->phase2_private_key = set_cert_prop_helper (value, NM_SETTING_802_1X_PHASE2_PRIVATE_KEY, &error);
if (error) {
- g_warning ("Error setting private key (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting private key (invalid data): %s", error->message);
g_error_free (error);
}
break;
else
type = NM_TYPE_ACTIVE_CONNECTION;
} else {
- g_warning ("Error in getting active connection 'Vpn' property: (%d) %s",
- error->code, error->message);
+ g_warning ("Error in getting active connection 'Vpn' property: %s",
+ error->message);
g_error_free (error);
type = G_TYPE_INVALID;
}
error,
info->user_data);
} else if (error)
- g_warning ("Device activation failed: (%d) %s", error->code, error->message);
+ g_warning ("Device activation failed: %s", error->message);
priv->pending_activations = g_slist_remove (priv->pending_activations, info);
}
GError *error = NULL;
if (!nm_utils_init (&error)) {
- g_warning ("Couldn't initilize nm-utils/crypto system: %d %s",
- error->code, error->message);
+ g_warning ("Couldn't initilize nm-utils/crypto system: %s",
+ error->message);
g_clear_error (&error);
}
if (info->fn)
info->fn (info->device, error, info->user_data);
else if (error) {
- g_warning ("%s: device %s %s failed: (%d) %s",
+ g_warning ("%s: device %s %s failed: %s",
__func__,
nm_object_get_path (NM_OBJECT (info->device)),
info->method,
- error->code,
NM_G_ERROR_MSG (error));
}
g_clear_error (&error);
G_TYPE_INVALID,
G_TYPE_VALUE, &value,
G_TYPE_INVALID)) {
- dbgmsg ("%s: Error getting '%s' for %s: (%d) %s\n",
+ dbgmsg ("%s: Error getting '%s' for %s: %s\n",
__func__,
prop_name,
nm_object_get_path (object),
- err->code,
err->message);
g_clear_error (&err);
return;
if (nm_connection_replace_settings (NM_CONNECTION (self), new_settings, &error))
g_signal_emit (self, signals[UPDATED], 0, new_settings);
else {
- g_warning ("%s: error updating connection %s settings: (%d) %s",
+ g_warning ("%s: error updating connection %s settings: %s",
__func__,
nm_connection_get_path (NM_CONNECTION (self)),
- error->code, error->message);
+ error->message);
g_clear_error (&error);
g_signal_emit (self, signals[REMOVED], 0);
if ( !g_error_matches (error, DBUS_GERROR, DBUS_GERROR_SERVICE_UNKNOWN)
&& !g_error_matches (error, DBUS_GERROR, DBUS_GERROR_NAME_HAS_NO_OWNER)
&& priv->service_running) {
- g_warning ("%s: error fetching connections: (%d) %s.",
+ g_warning ("%s: error fetching connections: %s.",
__func__,
- error->code,
error->message ? error->message : "(unknown)");
}
g_clear_error (&error);
g_set_error (error,
NM_SECRET_AGENT_ERROR,
NM_SECRET_AGENT_ERROR_INVALID_CONNECTION,
- "Invalid connection: (%d) %s",
- local->code, local->message);
+ "Invalid connection: %s",
+ local->message);
g_clear_error (&local);
}
connection = nm_connection_new_from_hash (properties, &local);
if (!connection) {
g_set_error (error, NM_VPN_PLUGIN_ERROR, NM_VPN_PLUGIN_ERROR_BAD_ARGUMENTS,
- "Invalid connection: (%d) %s",
- local->code, local->message);
+ "Invalid connection: %s", local->message);
g_clear_error (&local);
return FALSE;
}
g_set_error (err,
NM_VPN_PLUGIN_ERROR,
NM_VPN_PLUGIN_ERROR_CONNECTION_INVALID,
- "The connection was invalid: '%s' / '%s' invalid: %d.",
+ "The connection was invalid: '%s' / '%s' invalid.",
g_type_name (nm_connection_lookup_setting_type_by_quark (cnfh_err->domain)),
- cnfh_err->message, cnfh_err->code);
+ cnfh_err->message);
g_error_free (cnfh_err);
return FALSE;
}
connection = nm_connection_new_from_hash (properties, &local);
if (!connection) {
g_set_error (error, NM_VPN_PLUGIN_ERROR, NM_VPN_PLUGIN_ERROR_BAD_ARGUMENTS,
- "Invalid connection: (%d) %s",
- local->code, local->message);
+ "Invalid connection: %s",
+ local->message);
g_clear_error (&local);
return FALSE;
}
}
priv->ca_cert = set_cert_prop_helper (value, NM_SETTING_802_1X_CA_CERT, &error);
if (error) {
- g_warning ("Error setting certificate (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting certificate (invalid data): %s",
+ error->message);
g_error_free (error);
}
break;
}
priv->client_cert = set_cert_prop_helper (value, NM_SETTING_802_1X_CLIENT_CERT, &error);
if (error) {
- g_warning ("Error setting certificate (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting certificate (invalid data): %s",
+ error->message);
g_error_free (error);
}
break;
}
priv->phase2_ca_cert = set_cert_prop_helper (value, NM_SETTING_802_1X_PHASE2_CA_CERT, &error);
if (error) {
- g_warning ("Error setting certificate (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting certificate (invalid data): %s",
+ error->message);
g_error_free (error);
}
break;
}
priv->phase2_client_cert = set_cert_prop_helper (value, NM_SETTING_802_1X_PHASE2_CLIENT_CERT, &error);
if (error) {
- g_warning ("Error setting certificate (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting certificate (invalid data): %s",
+ error->message);
g_error_free (error);
}
break;
}
priv->private_key = set_cert_prop_helper (value, NM_SETTING_802_1X_PRIVATE_KEY, &error);
if (error) {
- g_warning ("Error setting private key (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting private key (invalid data): %s",
+ error->message);
g_error_free (error);
}
break;
}
priv->phase2_private_key = set_cert_prop_helper (value, NM_SETTING_802_1X_PHASE2_PRIVATE_KEY, &error);
if (error) {
- g_warning ("Error setting private key (invalid data): (%d) %s",
- error->code, error->message);
+ g_warning ("Error setting private key (invalid data): %s",
+ error->message);
g_error_free (error);
}
break;
/* Initialize crypto lbrary. */
if (!nm_utils_init (&error)) {
- g_warning ("Couldn't initilize nm-utils/crypto system: %d %s",
- error->code, error->message);
+ g_warning ("Couldn't initilize nm-utils/crypto system: %s",
+ error->message);
g_error_free (error);
}
}
g_return_val_if_fail (s && *s, NULL);
if (!nm_utils_init (&error)) {
- g_warning ("error initializing crypto: (%d) %s",
- error->code, error->message);
+ g_warning ("error initializing crypto: %s", error->message);
if (error)
g_error_free (error);
return NULL;
}
if (!crypto_md5_hash (NULL, 0, s, strlen (s), (char *) uuid, sizeof (uuid), &error)) {
- g_warning ("error generating UUID: (%d) %s",
- error->code, error->message);
+ g_warning ("error generating UUID: %s", error->message);
if (error)
g_error_free (error);
return NULL;
G_DBUS_CALL_FLAGS_NONE, 15000,
NULL, &err);
if (!ret) {
- dbgmsg ("%s: Error getting '%s' for %s: (%d) %s\n",
+ dbgmsg ("%s: Error getting '%s' for %s: %s\n",
__func__,
prop_name,
nm_object_get_path (object),
- err->code,
err->message);
g_clear_error (&err);
return;
GError *error = NULL;
if (!nm_connection_replace_settings (NM_CONNECTION (self), new_settings, &error)) {
- g_warning ("%s: error updating connection %s settings: (%d) %s",
+ g_warning ("%s: error updating connection %s settings: %s",
__func__,
nm_connection_get_path (NM_CONNECTION (self)),
- error->code,
error->message);
g_clear_error (&error);
}
g_dbus_method_invocation_return_error (context,
NM_VPN_PLUGIN_ERROR,
NM_VPN_PLUGIN_ERROR_BAD_ARGUMENTS,
- "Invalid connection: (%d) %s",
- error->code, error->message);
+ "Invalid connection: %s",
+ error->message);
g_clear_error (&error);
}
g_dbus_method_invocation_return_error (context,
NM_VPN_PLUGIN_ERROR,
NM_VPN_PLUGIN_ERROR_BAD_ARGUMENTS,
- "Invalid connection: (%d) %s",
- error->code, error->message);
+ "Invalid connection: %s",
+ error->message);
g_clear_error (&error);
return;
}
g_dbus_method_invocation_return_error (context,
NM_VPN_PLUGIN_ERROR,
NM_VPN_PLUGIN_ERROR_BAD_ARGUMENTS,
- "Invalid connection: (%d) %s",
- error->code, error->message);
+ "Invalid connection: %s",
+ error->message);
g_clear_error (&error);
return;
}
g_dbus_method_invocation_return_error (context,
NM_VPN_PLUGIN_ERROR,
NM_VPN_PLUGIN_ERROR_BAD_ARGUMENTS,
- "Invalid connection: (%d) %s",
- error->code, error->message);
+ "Invalid connection: %s",
+ error->message);
g_clear_error (&error);
return;
}
priv->pan_connection = added;
nm_log_dbg (LOGD_BT, "bluez[%s] added new Bluetooth connection for NAP device: '%s' (%s)", priv->path, id, uuid);
} else {
- nm_log_warn (LOGD_BT, "bluez[%s] couldn't add new Bluetooth connection for NAP device: '%s' (%s): %d / %s",
- priv->path, id, uuid, error->code, error->message);
+ nm_log_warn (LOGD_BT, "bluez[%s] couldn't add new Bluetooth connection for NAP device: '%s' (%s): %s",
+ priv->path, id, uuid, error->message);
g_clear_error (&error);
}
if (error) {
_LOGW (LOGD_MB | LOGD_IP4 | LOGD_BT,
- "retrieving IP4 configuration failed: (%d) %s",
- error->code, error->message);
+ "retrieving IP4 configuration failed: %s",
+ error->message);
nm_device_state_changed (device, NM_DEVICE_STATE_FAILED, NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE);
} else
if (expected) { \
if (!success) { \
g_assert (error != NULL); \
- g_warning ("Failed to complete connection: (%d) %s", error->code, error->message); \
+ g_warning ("Failed to complete connection: %s", error->message); \
} \
g_assert (success == TRUE); \
g_assert (error == NULL); \
g_return_if_fail (nm_device_activate_ip4_state_in_conf (device) == TRUE);
if (error) {
- _LOGW (LOGD_MB | LOGD_IP4, "retrieving IPv4 configuration failed: (%d) %s",
- error->code, error->message);
+ _LOGW (LOGD_MB | LOGD_IP4, "retrieving IPv4 configuration failed: %s",
+ error->message);
nm_device_state_changed (device, NM_DEVICE_STATE_FAILED, NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE);
} else {
g_return_if_fail (nm_device_activate_ip6_state_in_conf (device) == TRUE);
if (error) {
- _LOGW (LOGD_MB | LOGD_IP6, "retrieving IPv6 configuration failed: (%d) %s",
- error->code, error->message);
+ _LOGW (LOGD_MB | LOGD_IP6, "retrieving IPv6 configuration failed: %s", error->message);
nm_device_state_changed (device, NM_DEVICE_STATE_FAILED, NM_DEVICE_STATE_REASON_IP_CONFIG_UNAVAILABLE);
return;
ret = NM_ACT_STAGE_RETURN_POSTPONE;
} else {
- nm_log_err (LOGD_PPP, "(%s): error starting PPP: (%d) %s",
+ nm_log_err (LOGD_PPP, "(%s): error starting PPP: %s",
nm_modem_get_uid (self),
- error->code,
error->message);
g_error_free (error);
priv->lease_file = g_strdup (g_file_get_path (dst));
} else {
/* Failure; just use the existing leasefile */
- nm_log_warn (log_domain, "Failed to copy leasefile %s to %s: (%d) %s",
+ nm_log_warn (log_domain, "Failed to copy leasefile %s to %s: %s",
g_file_get_path (src), g_file_get_path (dst),
- error->code, error->message);
+ error->message);
g_clear_error (&error);
}
g_object_unref (src);
success = nm_dhcp_dhclient_save_duid (priv->lease_file, escaped, &error);
g_free (escaped);
if (!success) {
- nm_log_warn (log_domain, "(%s): failed to save DUID to %s: (%d) %s.",
+ nm_log_warn (log_domain, "(%s): failed to save DUID to %s: %s.",
iface, priv->lease_file,
- error->code,
error->message);
g_free (pid_file);
return FALSE;
duid = nm_dhcp_dhclient_read_duid (leasefile, &error);
if (error) {
- nm_log_warn (LOGD_DHCP, "Failed to read leasefile '%s': (%d) %s",
- leasefile, error->code, error->message);
+ nm_log_warn (LOGD_DHCP, "Failed to read leasefile '%s': %s",
+ leasefile, error->message);
g_clear_error (&error);
}
g_free (leasefile);
nm_log_dbg (LOGD_DHCP, "Looking for default DHCPv6 DUID in '%s'.", priv->def_leasefile);
duid = nm_dhcp_dhclient_read_duid (priv->def_leasefile, &error);
if (error) {
- nm_log_warn (LOGD_DHCP, "Failed to read leasefile '%s': (%d) %s",
+ nm_log_warn (LOGD_DHCP, "Failed to read leasefile '%s': %s",
priv->def_leasefile,
- error->code,
error->message);
g_clear_error (&error);
}
/* Write out the config file */
if (!g_file_set_contents (CONFFILE, conf->str, -1, &error)) {
- nm_log_warn (LOGD_DNS, "Failed to write dnsmasq config file %s: (%d) %s",
+ nm_log_warn (LOGD_DNS, "Failed to write dnsmasq config file %s: %s",
CONFFILE,
- error->code, error->message);
+ error->message);
g_clear_error (&error);
goto out;
}
nm_log_dbg (LOGD_DNS, "%s started with pid %d", priv->progname, priv->pid);
priv->watch_id = g_child_watch_add (priv->pid, (GChildWatchFunc) watch_cb, self);
} else {
- nm_log_warn (LOGD_DNS, "Failed to spawn %s: (%d) %s",
- priv->progname, error->code, error->message);
+ nm_log_warn (LOGD_DNS, "Failed to spawn %s: %s",
+ priv->progname, error->message);
g_clear_error (&error);
}
nm_config_cmd_line_options_free (config_cli);
config_cli = NULL;
if (config == NULL) {
- fprintf (stderr, _("Failed to read configuration: (%d) %s\n"),
- error->code,
+ fprintf (stderr, _("Failed to read configuration: %s\n"),
error->message);
exit (1);
}
/* Parse the state file */
if (!parse_state_file (global_opt.state_file, &net_enabled, &wifi_enabled, &wwan_enabled, &error)) {
- nm_log_err (LOGD_CORE, "State file %s parsing failed: (%d) %s",
+ nm_log_err (LOGD_CORE, "State file %s parsing failed: %s",
global_opt.state_file,
- error->code,
error->message);
/* Not a hard failure */
}
nm_log_info (LOGD_SHARING, "Executing: %s", cmd);
if (!g_spawn_sync ("/", argv, envp, G_SPAWN_STDOUT_TO_DEV_NULL | G_SPAWN_STDERR_TO_DEV_NULL,
NULL, NULL, NULL, NULL, &status, &error)) {
- nm_log_warn (LOGD_SHARING, "Error executing command: (%d) %s",
- error->code, error->message);
+ nm_log_warn (LOGD_SHARING, "Error executing command: %s",
+ error->message);
g_clear_error (&error);
} else if (WEXITSTATUS (status)) {
nm_log_warn (LOGD_SHARING, "** Command returned exit status %d.",
}
if (error) {
- nm_log_warn (LOGD_CORE, "error requesting auth for %s: (%d) %s",
- call->permission, error->code, error->message);
+ nm_log_warn (LOGD_CORE, "error requesting auth for %s: %s",
+ call->permission, error->message);
if (!call->chain->error) {
call->chain->error = error;
g_object_unref (subject);
if (!active) {
- _LOGW (LOGD_DEVICE, "assumed connection %s failed to activate: (%d) %s",
+ _LOGW (LOGD_DEVICE, "assumed connection %s failed to activate: %s",
nm_connection_get_path (NM_CONNECTION (connection)),
- error->code,
error->message);
g_error_free (error);
return FALSE;
G_TYPE_BOOLEAN, (gpointer) &enable,
&err)) {
/* Not a hard error */
- _LOGW (LOGD_SUSPEND, "writing to state file %s failed: (%d) %s.",
+ _LOGW (LOGD_SUSPEND, "writing to state file %s failed: %s",
priv->state_file,
- err->code,
err->message);
}
}
"main", rstate->key,
G_TYPE_BOOLEAN, (gpointer) &enabled,
&error)) {
- _LOGW (LOGD_CORE, "writing to state file %s failed: (%d) %s.",
+ _LOGW (LOGD_CORE, "writing to state file %s failed: %s",
priv->state_file,
- error->code,
error->message);
g_clear_error (&error);
}
G_DBUS_CALL_FLAGS_NONE, -1,
NULL, &err);
if (!ret) {
- g_warning ("nm-ppp-plugin: (%s): could not get secrets: (%d) %s",
+ g_warning ("nm-ppp-plugin: (%s): could not get secrets: %s",
__func__,
- err->code,
err->message);
g_error_free (err);
return -1;
if (error) {
local = g_error_new (NM_AGENT_MANAGER_ERROR,
NM_AGENT_MANAGER_ERROR_PERMISSION_DENIED,
- "Failed to request agent permissions: (%d) %s",
- error->code, error->message);
+ "Failed to request agent permissions: %s",
+ error->message);
g_dbus_method_invocation_take_error (context, local);
} else {
agent = nm_auth_chain_steal_data (chain, "agent");
req->con.chain = NULL;
if (error) {
- _LOGD (req->current, "agent "LOG_REQ_FMT" MODIFY check error: (%d) %s",
+ _LOGD (req->current, "agent "LOG_REQ_FMT" MODIFY check error: %s",
LOG_REQ_ARG (req),
- error->code, error->message);
+ error->message);
/* Try the next agent */
request_next_agent (req);
} else {
GError *error,
gpointer user_data)
{
- if (error) {
- _LOGW ("Error saving new secrets to backing storage: (%d) %s",
- error->code, error->message);
- }
+ if (error)
+ _LOGW ("Error saving new secrets to backing storage: %s", error->message);
}
static void
}
} else {
- _LOGD ("(%s:%p) failed to update with agent secrets: (%d) %s",
+ _LOGD ("(%s:%p) failed to update with agent secrets: %s",
setting_name,
info,
- local->code,
local->message);
}
g_variant_unref (filtered_secrets);
} else {
- _LOGD ("(%s:%p) failed to update with existing secrets: (%d) %s",
+ _LOGD ("(%s:%p) failed to update with existing secrets: %s",
setting_name,
info,
- local->code,
local->message);
}
priv->timestamp = timestamp;
priv->timestamp_set = TRUE;
} else {
- _LOGD ("failed to read connection timestamp: (%d) %s",
- err->code, err->message);
+ _LOGD ("failed to read connection timestamp: %s", err->message);
g_clear_error (&err);
}
g_key_file_free (timestamps_file);
}
if (!ifupdown_update_connection_from_if_block (NM_CONNECTION (object), priv->ifblock, &error)) {
- nm_log_warn (LOGD_SETTINGS, "%s.%d - invalid connection read from /etc/network/interfaces: (%d) %s",
+ nm_log_warn (LOGD_SETTINGS, "%s.%d - invalid connection read from /etc/network/interfaces: %s",
__FILE__,
__LINE__,
- error->code, error->message);
+ error->message);
goto err;
}
dir = g_dir_open (nm_keyfile_plugin_get_path (), 0, &error);
if (!dir) {
- nm_log_warn (LOGD_SETTINGS, "keyfile: cannot read directory '%s': (%d) %s",
+ nm_log_warn (LOGD_SETTINGS, "keyfile: cannot read directory '%s': %s",
nm_keyfile_plugin_get_path (),
- error->code,
error->message);
g_clear_error (&error);
return;
return;
if (error && priv->secrets_idx >= SECRETS_REQ_NEW) {
- _LOGE ("Failed to request VPN secrets #%d: (%d) %s",
- priv->secrets_idx + 1, error->code, error->message);
+ _LOGE ("Failed to request VPN secrets #%d: %s",
+ priv->secrets_idx + 1, error->message);
_set_vpn_state (self, STATE_FAILED, NM_VPN_CONNECTION_STATE_REASON_NO_SECRETS, FALSE);
return;
}