The (transfer) annotation is only valid on parameters which
are non-scalar in nature. Latest gobject will warn about
this mistake.

Signed-off-by: Daniel P. Berrange <berra...@redhat.com>
---
 libvirt-sandbox/libvirt-sandbox-config-interactive.c   |  4 ++--
 libvirt-sandbox/libvirt-sandbox-config-network-route.c |  2 +-
 libvirt-sandbox/libvirt-sandbox-config.c               | 16 ++++++++--------
 3 files changed, 11 insertions(+), 11 deletions(-)

diff --git a/libvirt-sandbox/libvirt-sandbox-config-interactive.c 
b/libvirt-sandbox/libvirt-sandbox-config-interactive.c
index 27b4c16..88bc015 100644
--- a/libvirt-sandbox/libvirt-sandbox-config-interactive.c
+++ b/libvirt-sandbox/libvirt-sandbox-config-interactive.c
@@ -246,7 +246,7 @@ GVirSandboxConfigInteractive 
*gvir_sandbox_config_interactive_new(const gchar *n
 /**
  * gvir_sandbox_config_interactive_set_tty:
  * @config: (transfer none): the sandbox config
- * @tty: (transfer none): true if the container should have a tty
+ * @tty: true if the container should have a tty
  *
  * Set whether the container console should have a interactive tty.
  */
@@ -263,7 +263,7 @@ void 
gvir_sandbox_config_interactive_set_tty(GVirSandboxConfigInteractive *confi
  *
  * Retrieves the sandbox tty flag
  *
- * Returns: (transfer none): the tty flag
+ * Returns: the tty flag
  */
 gboolean gvir_sandbox_config_interactive_get_tty(GVirSandboxConfigInteractive 
*config)
 {
diff --git a/libvirt-sandbox/libvirt-sandbox-config-network-route.c 
b/libvirt-sandbox/libvirt-sandbox-config-network-route.c
index 1664d18..c6bf6f3 100644
--- a/libvirt-sandbox/libvirt-sandbox-config-network-route.c
+++ b/libvirt-sandbox/libvirt-sandbox-config-network-route.c
@@ -234,7 +234,7 @@ void 
gvir_sandbox_config_network_route_set_prefix(GVirSandboxConfigNetworkRoute
  *
  * Retrieves the prefix length of the route
  *
- * Returns: (transfer none): the prefix length
+ * Returns: the prefix length
  */
 guint 
gvir_sandbox_config_network_route_get_prefix(GVirSandboxConfigNetworkRoute 
*config)
 {
diff --git a/libvirt-sandbox/libvirt-sandbox-config.c 
b/libvirt-sandbox/libvirt-sandbox-config.c
index 0ade178..8709736 100644
--- a/libvirt-sandbox/libvirt-sandbox-config.c
+++ b/libvirt-sandbox/libvirt-sandbox-config.c
@@ -699,7 +699,7 @@ const gchar 
*gvir_sandbox_config_get_kmodpath(GVirSandboxConfig *config)
 /**
  * gvir_sandbox_config_set_shell:
  * @config: (transfer none): the sandbox config
- * @shell: (transfer none): true if the container should have a shell
+ * @shell: true if the container should have a shell
  *
  * Set whether the container console should have a interactive shell.
  */
@@ -716,7 +716,7 @@ void gvir_sandbox_config_set_shell(GVirSandboxConfig 
*config, gboolean shell)
  *
  * Retrieves the sandbox shell flag
  *
- * Returns: (transfer none): the shell flag
+ * Returns: the shell flag
  */
 gboolean gvir_sandbox_config_get_shell(GVirSandboxConfig *config)
 {
@@ -728,7 +728,7 @@ gboolean gvir_sandbox_config_get_shell(GVirSandboxConfig 
*config)
 /**
  * gvir_sandbox_config_set_userid:
  * @config: (transfer none): the sandbox config
- * @uid: (transfer none): the sandbox user ID
+ * @uid: the sandbox user ID
  *
  * Set the user ID to invoke the sandbox application under.
  * Defaults to the user ID of the current program.
@@ -746,7 +746,7 @@ void gvir_sandbox_config_set_userid(GVirSandboxConfig 
*config, guint uid)
  *
  * Get the user ID to invoke the sandbox application under.
  *
- * Returns: (transfer none): the user ID
+ * Returns: the user ID
  */
 guint gvir_sandbox_config_get_userid(GVirSandboxConfig *config)
 {
@@ -758,7 +758,7 @@ guint gvir_sandbox_config_get_userid(GVirSandboxConfig 
*config)
 /**
  * gvir_sandbox_config_set_groupid:
  * @config: (transfer none): the sandbox config
- * @gid: (transfer none): the sandbox group ID
+ * @gid: the sandbox group ID
  *
  * Set the group ID to invoke the sandbox application under.
  * Defaults to the group ID of the current program.
@@ -776,7 +776,7 @@ void gvir_sandbox_config_set_groupid(GVirSandboxConfig 
*config, guint gid)
  *
  * Get the group ID to invoke the sandbox application under.
  *
- * Returns: (transfer none): the group ID
+ * Returns: the group ID
  */
 guint gvir_sandbox_config_get_groupid(GVirSandboxConfig *config)
 {
@@ -1849,7 +1849,7 @@ const gchar 
*gvir_sandbox_config_get_security_label(GVirSandboxConfig *config)
 /**
  * gvir_sandbox_config_set_security_dynamic:
  * @config: (transfer none): the sandbox config
- * @dynamic: (transfer none): the security mode
+ * @dynamic: the security mode
  *
  * Set the SELinux security dynamic for the sandbox. The default
  * dynamic is "svirt_sandbox_t"
@@ -1866,7 +1866,7 @@ void 
gvir_sandbox_config_set_security_dynamic(GVirSandboxConfig *config, gboolea
  *
  * Retrieve the sandbox security mode
  *
- * Returns: (transfer none): the security mode
+ * Returns: the security mode
  */
 gboolean gvir_sandbox_config_get_security_dynamic(GVirSandboxConfig *config)
 {
-- 
2.7.4

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list

Reply via email to