mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2025-12-21 14:30:07 +01:00
```bash
readarray -d '' FILES < <(
git ls-files -z \
':(exclude)po' \
':(exclude)shared/c-rbtree' \
':(exclude)shared/c-list' \
':(exclude)shared/c-siphash' \
':(exclude)shared/c-stdaux' \
':(exclude)shared/n-acd' \
':(exclude)shared/n-dhcp4' \
':(exclude)src/systemd/src' \
':(exclude)shared/systemd/src' \
':(exclude)m4' \
':(exclude)COPYING*'
)
sed \
-e 's/^\(--\|#\| \*\) *\(([cC]) *\)\?Copyright \+\(\(([cC])\) \+\)\?\(\(20\|19\)[0-9][0-9]\) *[-–] *\(\(20\|19\)[0-9][0-9]\) \+\([^ ].*\)$/\1 C1pyright#\5 - \7#\9/' \
-e 's/^\(--\|#\| \*\) *\(([cC]) *\)\?Copyright \+\(\(([cC])\) \+\)\?\(\(20\|19\)[0-9][0-9]\) *[,] *\(\(20\|19\)[0-9][0-9]\) \+\([^ ].*\)$/\1 C2pyright#\5, \7#\9/' \
-e 's/^\(--\|#\| \*\) *\(([cC]) *\)\?Copyright \+\(\(([cC])\) \+\)\?\(\(20\|19\)[0-9][0-9]\) \+\([^ ].*\)$/\1 C3pyright#\5#\7/' \
-e 's/^Copyright \(\(20\|19\)[0-9][0-9]\) \+\([^ ].*\)$/C4pyright#\1#\3/' \
-i \
"${FILES[@]}"
echo ">>> untouched Copyright lines"
git grep Copyright "${FILES[@]}"
echo ">>> Copyright lines with unusual extra"
git grep '\<C[0-9]pyright#' "${FILES[@]}" | grep -i reserved
sed \
-e 's/\<C[0-9]pyright#\([^#]*\)#\(.*\)$/Copyright (C) \1 \2/' \
-i \
"${FILES[@]}"
```
https://gitlab.freedesktop.org/NetworkManager/NetworkManager/merge_requests/298
207 lines
8.2 KiB
C
207 lines
8.2 KiB
C
// SPDX-License-Identifier: LGPL-2.1+
|
|
/*
|
|
* Copyright (C) 2018 - 2019 Red Hat, Inc.
|
|
*/
|
|
|
|
#ifndef __NM_SETTING_WIREGUARD_H__
|
|
#define __NM_SETTING_WIREGUARD_H__
|
|
|
|
#if !defined (__NETWORKMANAGER_H_INSIDE__) && !defined (NETWORKMANAGER_COMPILATION)
|
|
#error "Only <NetworkManager.h> can be included directly."
|
|
#endif
|
|
|
|
#include "nm-setting.h"
|
|
#include "nm-utils.h"
|
|
|
|
G_BEGIN_DECLS
|
|
|
|
/*****************************************************************************/
|
|
|
|
#define NM_WIREGUARD_PUBLIC_KEY_LEN 32
|
|
#define NM_WIREGUARD_SYMMETRIC_KEY_LEN 32
|
|
|
|
/*****************************************************************************/
|
|
|
|
typedef struct _NMWireGuardPeer NMWireGuardPeer;
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
GType nm_wireguard_peer_get_type (void);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_wireguard_peer_new (void);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_wireguard_peer_new_clone (const NMWireGuardPeer *self,
|
|
gboolean with_secrets);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_wireguard_peer_ref (NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_unref (NMWireGuardPeer *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_seal (NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_is_sealed (const NMWireGuardPeer *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *nm_wireguard_peer_get_public_key (const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_set_public_key (NMWireGuardPeer *self,
|
|
const char *public_key,
|
|
gboolean accept_invalid);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *nm_wireguard_peer_get_preshared_key (const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_set_preshared_key (NMWireGuardPeer *self,
|
|
const char *preshared_key,
|
|
gboolean accept_invalid);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMSettingSecretFlags nm_wireguard_peer_get_preshared_key_flags (const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_set_preshared_key_flags (NMWireGuardPeer *self,
|
|
NMSettingSecretFlags preshared_key_flags);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint16 nm_wireguard_peer_get_persistent_keepalive (const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_set_persistent_keepalive (NMWireGuardPeer *self,
|
|
guint16 persistent_keepalive);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *nm_wireguard_peer_get_endpoint (const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_set_endpoint (NMWireGuardPeer *self,
|
|
const char *endpoint,
|
|
gboolean allow_invalid);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint nm_wireguard_peer_get_allowed_ips_len (const NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *nm_wireguard_peer_get_allowed_ip (const NMWireGuardPeer *self,
|
|
guint idx,
|
|
gboolean *out_is_valid);
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_wireguard_peer_clear_allowed_ips (NMWireGuardPeer *self);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_append_allowed_ip (NMWireGuardPeer *self,
|
|
const char *allowed_ip,
|
|
gboolean accept_invalid);
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_remove_allowed_ip (NMWireGuardPeer *self,
|
|
guint idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_wireguard_peer_is_valid (const NMWireGuardPeer *self,
|
|
gboolean check_non_secrets,
|
|
gboolean check_secrets,
|
|
GError **error);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
int nm_wireguard_peer_cmp (const NMWireGuardPeer *a,
|
|
const NMWireGuardPeer *b,
|
|
NMSettingCompareFlags compare_flags);
|
|
|
|
/*****************************************************************************/
|
|
|
|
#define NM_TYPE_SETTING_WIREGUARD (nm_setting_wireguard_get_type ())
|
|
#define NM_SETTING_WIREGUARD(obj) (G_TYPE_CHECK_INSTANCE_CAST ((obj), NM_TYPE_SETTING_WIREGUARD, NMSettingWireGuard))
|
|
#define NM_SETTING_WIREGUARD_CLASS(klass) (G_TYPE_CHECK_CLASS_CAST ((klass), NM_TYPE_SETTING_WIREGUARD, NMSettingWireGuardClass))
|
|
#define NM_IS_SETTING_WIREGUARD(obj) (G_TYPE_CHECK_INSTANCE_TYPE ((obj), NM_TYPE_SETTING_WIREGUARD))
|
|
#define NM_IS_SETTING_WIREGUARD_CLASS(klass) (G_TYPE_CHECK_CLASS_TYPE ((klass), NM_TYPE_SETTING_WIREGUARD))
|
|
#define NM_SETTING_WIREGUARD_GET_CLASS(obj) (G_TYPE_INSTANCE_GET_CLASS ((obj), NM_TYPE_SETTING_WIREGUARD, NMSettingWireGuardClass))
|
|
|
|
#define NM_SETTING_WIREGUARD_SETTING_NAME "wireguard"
|
|
|
|
#define NM_SETTING_WIREGUARD_FWMARK "fwmark"
|
|
#define NM_SETTING_WIREGUARD_LISTEN_PORT "listen-port"
|
|
#define NM_SETTING_WIREGUARD_PRIVATE_KEY "private-key"
|
|
#define NM_SETTING_WIREGUARD_PRIVATE_KEY_FLAGS "private-key-flags"
|
|
|
|
#define NM_SETTING_WIREGUARD_PEERS "peers"
|
|
|
|
#define NM_SETTING_WIREGUARD_MTU "mtu"
|
|
#define NM_SETTING_WIREGUARD_PEER_ROUTES "peer-routes"
|
|
#define NM_SETTING_WIREGUARD_IP4_AUTO_DEFAULT_ROUTE "ip4-auto-default-route"
|
|
#define NM_SETTING_WIREGUARD_IP6_AUTO_DEFAULT_ROUTE "ip6-auto-default-route"
|
|
|
|
#define NM_WIREGUARD_PEER_ATTR_ALLOWED_IPS "allowed-ips"
|
|
#define NM_WIREGUARD_PEER_ATTR_ENDPOINT "endpoint"
|
|
#define NM_WIREGUARD_PEER_ATTR_PERSISTENT_KEEPALIVE "persistent-keepalive"
|
|
#define NM_WIREGUARD_PEER_ATTR_PRESHARED_KEY "preshared-key"
|
|
#define NM_WIREGUARD_PEER_ATTR_PRESHARED_KEY_FLAGS "preshared-key-flags"
|
|
#define NM_WIREGUARD_PEER_ATTR_PUBLIC_KEY "public-key"
|
|
|
|
/*****************************************************************************/
|
|
|
|
typedef struct _NMSettingWireGuardClass NMSettingWireGuardClass;
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
GType nm_setting_wireguard_get_type (void);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMSetting *nm_setting_wireguard_new (void);
|
|
|
|
/*****************************************************************************/
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
const char *nm_setting_wireguard_get_private_key (NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMSettingSecretFlags nm_setting_wireguard_get_private_key_flags (NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint16 nm_setting_wireguard_get_listen_port (NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint32 nm_setting_wireguard_get_fwmark (NMSettingWireGuard *self);
|
|
|
|
/*****************************************************************************/
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint nm_setting_wireguard_get_peers_len (NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_setting_wireguard_get_peer (NMSettingWireGuard *self,
|
|
guint idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
NMWireGuardPeer *nm_setting_wireguard_get_peer_by_public_key (NMSettingWireGuard *self,
|
|
const char *public_key,
|
|
guint *out_idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_setting_wireguard_set_peer (NMSettingWireGuard *self,
|
|
NMWireGuardPeer *peer,
|
|
guint idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
void nm_setting_wireguard_append_peer (NMSettingWireGuard *self,
|
|
NMWireGuardPeer *peer);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_setting_wireguard_remove_peer (NMSettingWireGuard *self,
|
|
guint idx);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint nm_setting_wireguard_clear_peers (NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
gboolean nm_setting_wireguard_get_peer_routes (NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_16
|
|
guint32 nm_setting_wireguard_get_mtu (NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_20
|
|
NMTernary nm_setting_wireguard_get_ip4_auto_default_route (NMSettingWireGuard *self);
|
|
|
|
NM_AVAILABLE_IN_1_20
|
|
NMTernary nm_setting_wireguard_get_ip6_auto_default_route (NMSettingWireGuard *self);
|
|
|
|
/*****************************************************************************/
|
|
|
|
G_END_DECLS
|
|
|
|
#endif /* __NM_SETTING_WIREGUARD_H__ */
|