NetworkManager/libnm/nm-device-wireguard.c
Thomas Haller 57aa5e2a9d libnm: hide GObject structs from public API and embed private data
These types are all subclasses of NMObject. These instances are commonly
created by NMClient itself. It makes no sense that a user would
instantiate the type. Much less does it make sense to subclass them.

Hide the object and class structures from public API.

This is an API and ABI break, but of something that is very likely
unused.

This is mainly done to embed the private structure in the object itself.
This has benefits for performance and debugability. But most
importantly, we can obtain a static offset where to access the private data.
That means, we can use the information to access the data pointer
generically, as we will need later.

This is not done for the internal types NMManager, NMRemoteSettings,
and NMDnsManager. These types will be dropped later.
2019-10-22 10:58:52 +02:00

207 lines
5.2 KiB
C

// SPDX-License-Identifier: LGPL-2.1+
/*
* Copyright (C) 2018 Javier Arteaga <jarteaga@jbeta.is>
*/
#include "nm-default.h"
#include "nm-device-wireguard.h"
#include "nm-object-private.h"
/*****************************************************************************/
NM_GOBJECT_PROPERTIES_DEFINE_BASE (
PROP_PUBLIC_KEY,
PROP_LISTEN_PORT,
PROP_FWMARK,
);
typedef struct {
GBytes *public_key;
guint listen_port;
guint fwmark;
} NMDeviceWireGuardPrivate;
struct _NMDeviceWireGuard {
NMDevice parent;
NMDeviceWireGuardPrivate _priv;
};
struct _NMDeviceWireGuardClass {
NMDeviceClass parent;
};
G_DEFINE_TYPE (NMDeviceWireGuard, nm_device_wireguard, NM_TYPE_DEVICE)
#define NM_DEVICE_WIREGUARD_GET_PRIVATE(self) _NM_GET_PRIVATE(self, NMDeviceWireGuard, NM_IS_DEVICE_WIREGUARD, NMObject, NMDevice)
/*****************************************************************************/
/**
* nm_device_wireguard_get_public_key:
* @device: a #NMDeviceWireGuard
*
* Gets the public key for this interface
*
* Returns: (transfer none): the #GBytes containing the 32-byte public key
*
* Since: 1.14
**/
GBytes *
nm_device_wireguard_get_public_key (NMDeviceWireGuard *device)
{
g_return_val_if_fail (NM_IS_DEVICE_WIREGUARD (device), NULL);
return NM_DEVICE_WIREGUARD_GET_PRIVATE (device)->public_key;
}
/**
* nm_device_wireguard_get_listen_port:
* @device: a #NMDeviceWireGuard
*
* Gets the local UDP port this interface listens on
*
* Returns: UDP listen port
*
* Since: 1.14
**/
guint16
nm_device_wireguard_get_listen_port (NMDeviceWireGuard *device)
{
g_return_val_if_fail (NM_IS_DEVICE_WIREGUARD (device), 0);
return NM_DEVICE_WIREGUARD_GET_PRIVATE (device)->listen_port;
}
/**
* nm_device_wireguard_get_fwmark:
* @device: a #NMDeviceWireGuard
*
* Gets the fwmark (firewall mark) for this interface.
* It can be used to set routing policy for outgoing encrypted packets.
* See: ip-rule(8)
*
* Returns: 0 if fwmark not in use, 32-bit fwmark value otherwise
*
* Since: 1.14
**/
guint32
nm_device_wireguard_get_fwmark (NMDeviceWireGuard *device)
{
g_return_val_if_fail (NM_IS_DEVICE_WIREGUARD (device), 0);
return NM_DEVICE_WIREGUARD_GET_PRIVATE (device)->fwmark;
}
/***********************************************************/
static void
get_property (GObject *object,
guint prop_id,
GValue *value,
GParamSpec *pspec)
{
NMDeviceWireGuard *device = NM_DEVICE_WIREGUARD (object);
switch (prop_id) {
case PROP_PUBLIC_KEY:
g_value_set_boxed (value, nm_device_wireguard_get_public_key (device));
break;
case PROP_LISTEN_PORT:
g_value_set_uint (value, nm_device_wireguard_get_listen_port (device));
break;
case PROP_FWMARK:
g_value_set_uint (value, nm_device_wireguard_get_fwmark (device));
break;
default:
G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
break;
}
}
static void
nm_device_wireguard_init (NMDeviceWireGuard *device)
{
}
static void
init_dbus (NMObject *object)
{
NMDeviceWireGuardPrivate *priv = NM_DEVICE_WIREGUARD_GET_PRIVATE (object);
const NMPropertiesInfo property_info[] = {
{ NM_DEVICE_WIREGUARD_PUBLIC_KEY, &priv->public_key },
{ NM_DEVICE_WIREGUARD_LISTEN_PORT, &priv->listen_port },
{ NM_DEVICE_WIREGUARD_FWMARK, &priv->fwmark },
{ NULL }
};
NM_OBJECT_CLASS (nm_device_wireguard_parent_class)->init_dbus (object);
_nm_object_register_properties (object,
NM_DBUS_INTERFACE_DEVICE_WIREGUARD,
property_info);
}
static void
finalize (GObject *object)
{
NMDeviceWireGuardPrivate *priv = NM_DEVICE_WIREGUARD_GET_PRIVATE (object);
g_bytes_unref (priv->public_key);
G_OBJECT_CLASS (nm_device_wireguard_parent_class)->finalize (object);
}
static void
nm_device_wireguard_class_init (NMDeviceWireGuardClass *wireguard_class)
{
GObjectClass *object_class = G_OBJECT_CLASS (wireguard_class);
NMObjectClass *nm_object_class = NM_OBJECT_CLASS (wireguard_class);
object_class->get_property = get_property;
object_class->finalize = finalize;
nm_object_class->init_dbus = init_dbus;
/**
* NMDeviceWireGuard:public-key:
*
* 32-byte public key, derived from the current private key.
*
* Since: 1.14
**/
obj_properties[PROP_PUBLIC_KEY] =
g_param_spec_boxed (NM_DEVICE_WIREGUARD_PUBLIC_KEY, "", "",
G_TYPE_BYTES,
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
/**
* NMDeviceWireGuard:listen-port:
*
* Local UDP listen port.
* Set to 0 to allow a random port to be chosen (default).
*
* Since: 1.14
**/
obj_properties[PROP_LISTEN_PORT] =
g_param_spec_uint (NM_DEVICE_WIREGUARD_LISTEN_PORT, "", "",
0, G_MAXUINT16, 0,
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
/**
* NMDeviceWireGuard:fwmark:
*
* Optional firewall mark - see ip-rule(8).
* Used when setting routing policy for outgoing encrypted packets.
* Set to 0 to disable the mark (default).
*
* Since: 1.14
**/
obj_properties[PROP_FWMARK] =
g_param_spec_uint (NM_DEVICE_WIREGUARD_FWMARK, "", "",
0, G_MAXUINT32, 0,
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
g_object_class_install_properties (object_class, _PROPERTY_ENUMS_LAST, obj_properties);
}