mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-05-01 11:28:02 +02:00
We use clang-format for automatic formatting of our source files. Since clang-format is actively maintained software, the actual formatting depends on the used version of clang-format. That is unfortunate and painful, but really unavoidable unless clang-format would be strictly bug-compatible. So the version that we must use is from the current Fedora release, which is also tested by our gitlab-ci. Previously, we were using Fedora 34 with clang-tools-extra-12.0.1-1.fc34.x86_64. As Fedora 35 comes along, we need to update our formatting as Fedora 35 comes with version "13.0.0~rc1-1.fc35". An alternative would be to freeze on version 12, but that has different problems (like, it's cumbersome to rebuild clang 12 on Fedora 35 and it would be cumbersome for our developers which are on Fedora 35 to use a clang that they cannot easily install). The (differently painful) solution is to reformat from time to time, as we switch to a new Fedora (and thus clang) version. Usually we would expect that such a reformatting brings minor changes. But this time, the changes are huge. That is mentioned in the release notes [1] as Makes PointerAligment: Right working with AlignConsecutiveDeclarations. (Fixes https://llvm.org/PR27353) [1] https://releases.llvm.org/13.0.0/tools/clang/docs/ReleaseNotes.html#clang-format
202 lines
7.8 KiB
C
202 lines
7.8 KiB
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
/*
|
|
* Copyright (C) 2018 - 2019 Red Hat, Inc.
|
|
*/
|
|
|
|
#ifndef __NM_SETTING_WIREGUARD_H__
|
|
#define __NM_SETTING_WIREGUARD_H__
|
|
|
|
#if !defined(__NETWORKMANAGER_H_INSIDE__) && !defined(NETWORKMANAGER_COMPILATION)
|
|
#error "Only <NetworkManager.h> can be included directly."
|
|
#endif
|
|
|
|
#include "nm-setting.h"
|
|
#include "nm-utils.h"
|
|
|
|
G_BEGIN_DECLS
|
|
|
|
/*****************************************************************************/
|
|
|
|
#define NM_WIREGUARD_PUBLIC_KEY_LEN 32
|
|
#define NM_WIREGUARD_SYMMETRIC_KEY_LEN 32
|
|
|
|
/*****************************************************************************/
|
|
|
|
typedef struct _NMWireGuardPeer NMWireGuardPeer;
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
GType nm_wireguard_peer_get_type(void);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_wireguard_peer_new(void);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_wireguard_peer_new_clone(const NMWireGuardPeer *self, gboolean with_secrets);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_wireguard_peer_ref(NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_unref(NMWireGuardPeer *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_seal(NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_is_sealed(const NMWireGuardPeer *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *nm_wireguard_peer_get_public_key(const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_set_public_key(NMWireGuardPeer *self,
|
|
const char *public_key,
|
|
gboolean accept_invalid);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *nm_wireguard_peer_get_preshared_key(const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_set_preshared_key(NMWireGuardPeer *self,
|
|
const char *preshared_key,
|
|
gboolean accept_invalid);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMSettingSecretFlags nm_wireguard_peer_get_preshared_key_flags(const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_set_preshared_key_flags(NMWireGuardPeer *self,
|
|
NMSettingSecretFlags preshared_key_flags);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint16 nm_wireguard_peer_get_persistent_keepalive(const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_set_persistent_keepalive(NMWireGuardPeer *self,
|
|
guint16 persistent_keepalive);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *nm_wireguard_peer_get_endpoint(const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean
|
|
nm_wireguard_peer_set_endpoint(NMWireGuardPeer *self, const char *endpoint, gboolean allow_invalid);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint nm_wireguard_peer_get_allowed_ips_len(const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *
|
|
nm_wireguard_peer_get_allowed_ip(const NMWireGuardPeer *self, guint idx, gboolean *out_is_valid);
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_clear_allowed_ips(NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_append_allowed_ip(NMWireGuardPeer *self,
|
|
const char *allowed_ip,
|
|
gboolean accept_invalid);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_remove_allowed_ip(NMWireGuardPeer *self, guint idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_is_valid(const NMWireGuardPeer *self,
|
|
gboolean check_non_secrets,
|
|
gboolean check_secrets,
|
|
GError **error);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
int nm_wireguard_peer_cmp(const NMWireGuardPeer *a,
|
|
const NMWireGuardPeer *b,
|
|
NMSettingCompareFlags compare_flags);
|
|
|
|
/*****************************************************************************/
|
|
|
|
#define NM_TYPE_SETTING_WIREGUARD (nm_setting_wireguard_get_type())
|
|
#define NM_SETTING_WIREGUARD(obj) \
|
|
(G_TYPE_CHECK_INSTANCE_CAST((obj), NM_TYPE_SETTING_WIREGUARD, NMSettingWireGuard))
|
|
#define NM_SETTING_WIREGUARD_CLASS(klass) \
|
|
(G_TYPE_CHECK_CLASS_CAST((klass), NM_TYPE_SETTING_WIREGUARD, NMSettingWireGuardClass))
|
|
#define NM_IS_SETTING_WIREGUARD(obj) (G_TYPE_CHECK_INSTANCE_TYPE((obj), NM_TYPE_SETTING_WIREGUARD))
|
|
#define NM_IS_SETTING_WIREGUARD_CLASS(klass) \
|
|
(G_TYPE_CHECK_CLASS_TYPE((klass), NM_TYPE_SETTING_WIREGUARD))
|
|
#define NM_SETTING_WIREGUARD_GET_CLASS(obj) \
|
|
(G_TYPE_INSTANCE_GET_CLASS((obj), NM_TYPE_SETTING_WIREGUARD, NMSettingWireGuardClass))
|
|
|
|
#define NM_SETTING_WIREGUARD_SETTING_NAME "wireguard"
|
|
|
|
#define NM_SETTING_WIREGUARD_FWMARK "fwmark"
|
|
#define NM_SETTING_WIREGUARD_LISTEN_PORT "listen-port"
|
|
#define NM_SETTING_WIREGUARD_PRIVATE_KEY "private-key"
|
|
#define NM_SETTING_WIREGUARD_PRIVATE_KEY_FLAGS "private-key-flags"
|
|
|
|
#define NM_SETTING_WIREGUARD_PEERS "peers"
|
|
|
|
#define NM_SETTING_WIREGUARD_MTU "mtu"
|
|
#define NM_SETTING_WIREGUARD_PEER_ROUTES "peer-routes"
|
|
#define NM_SETTING_WIREGUARD_IP4_AUTO_DEFAULT_ROUTE "ip4-auto-default-route"
|
|
#define NM_SETTING_WIREGUARD_IP6_AUTO_DEFAULT_ROUTE "ip6-auto-default-route"
|
|
|
|
#define NM_WIREGUARD_PEER_ATTR_ALLOWED_IPS "allowed-ips"
|
|
#define NM_WIREGUARD_PEER_ATTR_ENDPOINT "endpoint"
|
|
#define NM_WIREGUARD_PEER_ATTR_PERSISTENT_KEEPALIVE "persistent-keepalive"
|
|
#define NM_WIREGUARD_PEER_ATTR_PRESHARED_KEY "preshared-key"
|
|
#define NM_WIREGUARD_PEER_ATTR_PRESHARED_KEY_FLAGS "preshared-key-flags"
|
|
#define NM_WIREGUARD_PEER_ATTR_PUBLIC_KEY "public-key"
|
|
|
|
/*****************************************************************************/
|
|
|
|
typedef struct _NMSettingWireGuardClass NMSettingWireGuardClass;
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
GType nm_setting_wireguard_get_type(void);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMSetting *nm_setting_wireguard_new(void);
|
|
|
|
/*****************************************************************************/
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *nm_setting_wireguard_get_private_key(NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMSettingSecretFlags nm_setting_wireguard_get_private_key_flags(NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint16 nm_setting_wireguard_get_listen_port(NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint32 nm_setting_wireguard_get_fwmark(NMSettingWireGuard *self);
|
|
|
|
/*****************************************************************************/
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint nm_setting_wireguard_get_peers_len(NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_setting_wireguard_get_peer(NMSettingWireGuard *self, guint idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_setting_wireguard_get_peer_by_public_key(NMSettingWireGuard *self,
|
|
const char *public_key,
|
|
guint *out_idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_setting_wireguard_set_peer(NMSettingWireGuard *self, NMWireGuardPeer *peer, guint idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_setting_wireguard_append_peer(NMSettingWireGuard *self, NMWireGuardPeer *peer);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_setting_wireguard_remove_peer(NMSettingWireGuard *self, guint idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint nm_setting_wireguard_clear_peers(NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_setting_wireguard_get_peer_routes(NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint32 nm_setting_wireguard_get_mtu(NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_20
|
|
NMTernary nm_setting_wireguard_get_ip4_auto_default_route(NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_20
|
|
NMTernary nm_setting_wireguard_get_ip6_auto_default_route(NMSettingWireGuard *self);
|
|
|
|
/*****************************************************************************/
|
|
|
|
G_END_DECLS
|
|
|
|
#endif /* __NM_SETTING_WIREGUARD_H__ */
|