609 lines
18 KiB
C++
609 lines
18 KiB
C++
/**
|
|
* SPDX-FileCopyrightText: 2013 Albert Vaca <albertvaka@gmail.com>
|
|
*
|
|
* SPDX-License-Identifier: GPL-2.0-only OR GPL-3.0-only OR LicenseRef-KDE-Accepted-GPL
|
|
*/
|
|
|
|
#include "device.h"
|
|
|
|
#include <QSet>
|
|
#include <QSslCertificate>
|
|
#include <QSslKey>
|
|
#include <QVector>
|
|
|
|
#include <KConfigGroup>
|
|
#include <KLocalizedString>
|
|
#include <KSharedConfig>
|
|
|
|
#include "backends/devicelink.h"
|
|
#include "backends/lan/landevicelink.h"
|
|
#include "backends/linkprovider.h"
|
|
#include "core_debug.h"
|
|
#include "daemon.h"
|
|
#include "dbushelper.h"
|
|
#include "kdeconnectconfig.h"
|
|
#include "kdeconnectplugin.h"
|
|
#include "networkpacket.h"
|
|
#include "pluginloader.h"
|
|
|
|
// In older Qt released, qAsConst isn't available
|
|
#include "qtcompat_p.h"
|
|
|
|
class Device::DevicePrivate
|
|
{
|
|
public:
|
|
DevicePrivate(const QString &id)
|
|
: m_deviceId(id)
|
|
{
|
|
}
|
|
|
|
~DevicePrivate()
|
|
{
|
|
qDeleteAll(m_deviceLinks);
|
|
m_deviceLinks.clear();
|
|
}
|
|
|
|
const QString m_deviceId;
|
|
QString m_deviceName;
|
|
DeviceType m_deviceType;
|
|
int m_protocolVersion;
|
|
|
|
QVector<DeviceLink *> m_deviceLinks;
|
|
QHash<QString, KdeConnectPlugin *> m_plugins;
|
|
|
|
QMultiMap<QString, KdeConnectPlugin *> m_pluginsByIncomingCapability;
|
|
QSet<QString> m_supportedPlugins;
|
|
QSet<QString> m_allPlugins;
|
|
QSet<PairingHandler *> m_pairRequests;
|
|
};
|
|
|
|
static void warn(const QString &info)
|
|
{
|
|
qWarning() << "Device pairing error" << info;
|
|
}
|
|
|
|
Device::Device(QObject *parent, const QString &id)
|
|
: QObject(parent)
|
|
, d(new Device::DevicePrivate(id))
|
|
{
|
|
d->m_protocolVersion = NetworkPacket::s_protocolVersion;
|
|
KdeConnectConfig::DeviceInfo info = KdeConnectConfig::instance().getTrustedDevice(d->m_deviceId);
|
|
|
|
d->m_deviceName = info.deviceName;
|
|
d->m_deviceType = str2type(info.deviceType);
|
|
|
|
// Register in bus
|
|
QDBusConnection::sessionBus().registerObject(dbusPath(), this, QDBusConnection::ExportScriptableContents | QDBusConnection::ExportAdaptors);
|
|
|
|
// Assume every plugin is supported until addLink is called and we can get the actual list
|
|
d->m_allPlugins = PluginLoader::instance()->getPluginSet();
|
|
d->m_supportedPlugins = d->m_allPlugins;
|
|
|
|
connect(this, &Device::pairingError, this, &warn);
|
|
}
|
|
|
|
Device::Device(QObject *parent, const NetworkPacket &identityPacket, DeviceLink *dl)
|
|
: QObject(parent)
|
|
, d(new Device::DevicePrivate(identityPacket.get<QString>(QStringLiteral("deviceId"))))
|
|
{
|
|
d->m_deviceName = identityPacket.get<QString>(QStringLiteral("deviceName"));
|
|
d->m_allPlugins = PluginLoader::instance()->getPluginSet();
|
|
|
|
addLink(identityPacket, dl);
|
|
|
|
// Register in bus
|
|
QDBusConnection::sessionBus().registerObject(dbusPath(), this, QDBusConnection::ExportScriptableContents | QDBusConnection::ExportAdaptors);
|
|
|
|
connect(this, &Device::pairingError, this, &warn);
|
|
|
|
connect(this, &Device::reachableChanged, this, &Device::statusIconNameChanged);
|
|
connect(this, &Device::trustedChanged, this, &Device::statusIconNameChanged);
|
|
}
|
|
|
|
Device::~Device()
|
|
{
|
|
delete d;
|
|
}
|
|
|
|
QString Device::id() const
|
|
{
|
|
return d->m_deviceId;
|
|
}
|
|
|
|
QString Device::name() const
|
|
{
|
|
return d->m_deviceName;
|
|
}
|
|
|
|
QString Device::type() const
|
|
{
|
|
return type2str(d->m_deviceType);
|
|
}
|
|
|
|
bool Device::isReachable() const
|
|
{
|
|
return !d->m_deviceLinks.isEmpty();
|
|
}
|
|
|
|
int Device::protocolVersion()
|
|
{
|
|
return d->m_protocolVersion;
|
|
}
|
|
|
|
QStringList Device::supportedPlugins() const
|
|
{
|
|
return QList(d->m_supportedPlugins.cbegin(), d->m_supportedPlugins.cend());
|
|
}
|
|
|
|
bool Device::hasPlugin(const QString &name) const
|
|
{
|
|
return d->m_plugins.contains(name);
|
|
}
|
|
|
|
QStringList Device::loadedPlugins() const
|
|
{
|
|
return d->m_plugins.keys();
|
|
}
|
|
|
|
void Device::reloadPlugins()
|
|
{
|
|
QHash<QString, KdeConnectPlugin *> newPluginMap, oldPluginMap = d->m_plugins;
|
|
QMultiMap<QString, KdeConnectPlugin *> newPluginsByIncomingCapability;
|
|
|
|
if (isTrusted() && isReachable()) { // Do not load any plugin for unpaired devices, nor useless loading them for unreachable devices
|
|
|
|
PluginLoader *loader = PluginLoader::instance();
|
|
|
|
for (const QString &pluginName : qAsConst(d->m_supportedPlugins)) {
|
|
const KPluginMetaData service = loader->getPluginInfo(pluginName);
|
|
|
|
const bool pluginEnabled = isPluginEnabled(pluginName);
|
|
const QStringList incomingCapabilities = service.rawData().value(QStringLiteral("X-KdeConnect-SupportedPacketType")).toVariant().toStringList();
|
|
|
|
if (pluginEnabled) {
|
|
KdeConnectPlugin *plugin = d->m_plugins.take(pluginName);
|
|
|
|
if (!plugin) {
|
|
plugin = loader->instantiatePluginForDevice(pluginName, this);
|
|
}
|
|
Q_ASSERT(plugin);
|
|
|
|
for (const QString &interface : incomingCapabilities) {
|
|
newPluginsByIncomingCapability.insert(interface, plugin);
|
|
}
|
|
|
|
newPluginMap[pluginName] = plugin;
|
|
}
|
|
}
|
|
}
|
|
|
|
const bool differentPlugins = oldPluginMap != newPluginMap;
|
|
|
|
// Erase all left plugins in the original map (meaning that we don't want
|
|
// them anymore, otherwise they would have been moved to the newPluginMap)
|
|
qDeleteAll(d->m_plugins);
|
|
d->m_plugins = newPluginMap;
|
|
d->m_pluginsByIncomingCapability = newPluginsByIncomingCapability;
|
|
|
|
QDBusConnection bus = QDBusConnection::sessionBus();
|
|
for (KdeConnectPlugin *plugin : qAsConst(d->m_plugins)) {
|
|
// TODO: see how it works in Android (only done once, when created)
|
|
plugin->connected();
|
|
|
|
const QString dbusPath = plugin->dbusPath();
|
|
if (!dbusPath.isEmpty()) {
|
|
bus.registerObject(dbusPath,
|
|
plugin,
|
|
QDBusConnection::ExportAllProperties | QDBusConnection::ExportScriptableInvokables | QDBusConnection::ExportScriptableSignals
|
|
| QDBusConnection::ExportScriptableSlots);
|
|
}
|
|
}
|
|
if (differentPlugins) {
|
|
Q_EMIT pluginsChanged();
|
|
}
|
|
}
|
|
|
|
QString Device::pluginsConfigFile() const
|
|
{
|
|
return KdeConnectConfig::instance().deviceConfigDir(id()).absoluteFilePath(QStringLiteral("config"));
|
|
}
|
|
|
|
void Device::requestPair()
|
|
{
|
|
if (isTrusted()) {
|
|
Q_EMIT pairingError(i18n("Already paired"));
|
|
return;
|
|
}
|
|
|
|
if (!isReachable()) {
|
|
Q_EMIT pairingError(i18n("Device not reachable"));
|
|
return;
|
|
}
|
|
|
|
for (DeviceLink *dl : qAsConst(d->m_deviceLinks)) {
|
|
dl->userRequestsPair();
|
|
}
|
|
}
|
|
|
|
void Device::unpair()
|
|
{
|
|
for (DeviceLink *dl : qAsConst(d->m_deviceLinks)) {
|
|
dl->userRequestsUnpair();
|
|
}
|
|
KdeConnectConfig::instance().removeTrustedDevice(id());
|
|
Q_EMIT trustedChanged(false);
|
|
}
|
|
|
|
void Device::pairStatusChanged(DeviceLink::PairStatus status)
|
|
{
|
|
if (status == DeviceLink::NotPaired) {
|
|
KdeConnectConfig::instance().removeTrustedDevice(id());
|
|
|
|
for (DeviceLink *dl : qAsConst(d->m_deviceLinks)) {
|
|
if (dl != sender()) {
|
|
dl->setPairStatus(DeviceLink::NotPaired);
|
|
}
|
|
}
|
|
} else {
|
|
KdeConnectConfig::instance().addTrustedDevice(id(), name(), type());
|
|
}
|
|
|
|
reloadPlugins(); // Will load/unload plugins
|
|
|
|
bool isTrusted = (status == DeviceLink::Paired);
|
|
Q_EMIT trustedChanged(isTrusted);
|
|
Q_ASSERT(isTrusted == this->isTrusted());
|
|
}
|
|
|
|
static bool lessThan(DeviceLink *p1, DeviceLink *p2)
|
|
{
|
|
return p1->provider()->priority() > p2->provider()->priority();
|
|
}
|
|
|
|
void Device::addLink(const NetworkPacket &identityPacket, DeviceLink *link)
|
|
{
|
|
// qCDebug(KDECONNECT_CORE) << "Adding link to" << id() << "via" << link->provider();
|
|
|
|
setName(identityPacket.get<QString>(QStringLiteral("deviceName")));
|
|
setType(identityPacket.get<QString>(QStringLiteral("deviceType")));
|
|
|
|
if (d->m_deviceLinks.contains(link)) {
|
|
return;
|
|
}
|
|
|
|
d->m_protocolVersion = identityPacket.get<int>(QStringLiteral("protocolVersion"), -1);
|
|
if (d->m_protocolVersion != NetworkPacket::s_protocolVersion) {
|
|
qCWarning(KDECONNECT_CORE) << d->m_deviceName << "- warning, device uses a different protocol version" << d->m_protocolVersion << "expected"
|
|
<< NetworkPacket::s_protocolVersion;
|
|
}
|
|
|
|
connect(link, &QObject::destroyed, this, &Device::linkDestroyed);
|
|
|
|
d->m_deviceLinks.append(link);
|
|
|
|
// Theoretically we will never add two links from the same provider (the provider should destroy
|
|
// the old one before this is called), so we do not have to worry about destroying old links.
|
|
//-- Actually, we should not destroy them or the provider will store an invalid ref!
|
|
|
|
connect(link, &DeviceLink::receivedPacket, this, &Device::privateReceivedPacket);
|
|
|
|
std::sort(d->m_deviceLinks.begin(), d->m_deviceLinks.end(), lessThan);
|
|
|
|
const bool capabilitiesSupported = identityPacket.has(QStringLiteral("incomingCapabilities")) || identityPacket.has(QStringLiteral("outgoingCapabilities"));
|
|
const auto toSet = [](const QStringList &l) {
|
|
#if QT_VERSION < QT_VERSION_CHECK(5, 14, 0)
|
|
return l.toSet();
|
|
#else
|
|
return QSet(l.begin(), l.end());
|
|
#endif
|
|
};
|
|
|
|
if (capabilitiesSupported) {
|
|
const QSet<QString> outgoingCapabilities = toSet(identityPacket.get<QStringList>(QStringLiteral("outgoingCapabilities"))),
|
|
incomingCapabilities = toSet(identityPacket.get<QStringList>(QStringLiteral("incomingCapabilities")));
|
|
|
|
d->m_supportedPlugins = PluginLoader::instance()->pluginsForCapabilities(incomingCapabilities, outgoingCapabilities);
|
|
// qDebug() << "new plugins for" << m_deviceName << m_supportedPlugins << incomingCapabilities << outgoingCapabilities;
|
|
} else {
|
|
d->m_supportedPlugins = PluginLoader::instance()->getPluginSet();
|
|
}
|
|
|
|
reloadPlugins();
|
|
|
|
if (d->m_deviceLinks.size() == 1) {
|
|
Q_EMIT reachableChanged(true);
|
|
}
|
|
|
|
connect(link, &DeviceLink::pairStatusChanged, this, &Device::pairStatusChanged);
|
|
connect(link, &DeviceLink::pairingRequest, this, &Device::addPairingRequest);
|
|
connect(link, &DeviceLink::pairingRequestExpired, this, &Device::removePairingRequest);
|
|
connect(link, &DeviceLink::pairingError, this, &Device::pairingError);
|
|
}
|
|
|
|
void Device::addPairingRequest(PairingHandler *handler)
|
|
{
|
|
const bool wasEmpty = d->m_pairRequests.isEmpty();
|
|
d->m_pairRequests.insert(handler);
|
|
|
|
if (wasEmpty != d->m_pairRequests.isEmpty())
|
|
Q_EMIT hasPairingRequestsChanged(!d->m_pairRequests.isEmpty());
|
|
}
|
|
|
|
void Device::removePairingRequest(PairingHandler *handler)
|
|
{
|
|
const bool wasEmpty = d->m_pairRequests.isEmpty();
|
|
d->m_pairRequests.remove(handler);
|
|
|
|
if (wasEmpty != d->m_pairRequests.isEmpty())
|
|
Q_EMIT hasPairingRequestsChanged(!d->m_pairRequests.isEmpty());
|
|
}
|
|
|
|
bool Device::hasPairingRequests() const
|
|
{
|
|
return !d->m_pairRequests.isEmpty();
|
|
}
|
|
|
|
void Device::acceptPairing()
|
|
{
|
|
if (d->m_pairRequests.isEmpty())
|
|
qWarning() << "no pair requests to accept!";
|
|
|
|
// copying because the pairing handler will be removed upon accept
|
|
const auto prCopy = d->m_pairRequests;
|
|
for (auto ph : prCopy)
|
|
ph->acceptPairing();
|
|
}
|
|
|
|
void Device::rejectPairing()
|
|
{
|
|
if (d->m_pairRequests.isEmpty())
|
|
qWarning() << "no pair requests to reject!";
|
|
|
|
// copying because the pairing handler will be removed upon reject
|
|
const auto prCopy = d->m_pairRequests;
|
|
for (auto ph : prCopy)
|
|
ph->rejectPairing();
|
|
}
|
|
|
|
void Device::linkDestroyed(QObject *o)
|
|
{
|
|
removeLink(static_cast<DeviceLink *>(o));
|
|
}
|
|
|
|
void Device::removeLink(DeviceLink *link)
|
|
{
|
|
d->m_deviceLinks.removeAll(link);
|
|
|
|
// qCDebug(KDECONNECT_CORE) << "RemoveLink" << m_deviceLinks.size() << "links remaining";
|
|
|
|
if (d->m_deviceLinks.isEmpty()) {
|
|
reloadPlugins();
|
|
Q_EMIT reachableChanged(false);
|
|
}
|
|
}
|
|
|
|
bool Device::sendPacket(NetworkPacket &np)
|
|
{
|
|
Q_ASSERT(np.type() != PACKET_TYPE_PAIR);
|
|
Q_ASSERT(isTrusted());
|
|
|
|
// Maybe we could block here any packet that is not an identity or a pairing packet to prevent sending non encrypted data
|
|
for (DeviceLink *dl : qAsConst(d->m_deviceLinks)) {
|
|
if (dl->sendPacket(np))
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
void Device::privateReceivedPacket(const NetworkPacket &np)
|
|
{
|
|
Q_ASSERT(np.type() != PACKET_TYPE_PAIR);
|
|
if (isTrusted()) {
|
|
const QList<KdeConnectPlugin *> plugins = d->m_pluginsByIncomingCapability.values(np.type());
|
|
if (plugins.isEmpty()) {
|
|
qWarning() << "discarding unsupported packet" << np.type() << "for" << name();
|
|
}
|
|
for (KdeConnectPlugin *plugin : plugins) {
|
|
plugin->receivePacket(np);
|
|
}
|
|
} else {
|
|
qCDebug(KDECONNECT_CORE) << "device" << name() << "not paired, ignoring packet" << np.type();
|
|
unpair();
|
|
}
|
|
}
|
|
|
|
bool Device::isTrusted() const
|
|
{
|
|
return KdeConnectConfig::instance().trustedDevices().contains(id());
|
|
}
|
|
|
|
QStringList Device::availableLinks() const
|
|
{
|
|
QStringList sl;
|
|
sl.reserve(d->m_deviceLinks.size());
|
|
for (DeviceLink *dl : qAsConst(d->m_deviceLinks)) {
|
|
sl.append(dl->provider()->name());
|
|
}
|
|
return sl;
|
|
}
|
|
|
|
void Device::cleanUnneededLinks()
|
|
{
|
|
if (isTrusted()) {
|
|
return;
|
|
}
|
|
for (int i = 0; i < d->m_deviceLinks.size();) {
|
|
DeviceLink *dl = d->m_deviceLinks[i];
|
|
if (!dl->linkShouldBeKeptAlive()) {
|
|
dl->deleteLater();
|
|
d->m_deviceLinks.remove(i);
|
|
} else {
|
|
i++;
|
|
}
|
|
}
|
|
}
|
|
|
|
QHostAddress Device::getLocalIpAddress() const
|
|
{
|
|
for (DeviceLink *dl : qAsConst(d->m_deviceLinks)) {
|
|
LanDeviceLink *ldl = dynamic_cast<LanDeviceLink *>(dl);
|
|
if (ldl) {
|
|
return ldl->hostAddress();
|
|
}
|
|
}
|
|
return QHostAddress::Null;
|
|
}
|
|
|
|
Device::DeviceType Device::str2type(const QString &deviceType)
|
|
{
|
|
if (deviceType == QLatin1String("desktop"))
|
|
return Desktop;
|
|
if (deviceType == QLatin1String("laptop"))
|
|
return Laptop;
|
|
if (deviceType == QLatin1String("smartphone") || deviceType == QLatin1String("phone"))
|
|
return Phone;
|
|
if (deviceType == QLatin1String("tablet"))
|
|
return Tablet;
|
|
if (deviceType == QLatin1String("tv"))
|
|
return Tv;
|
|
return Unknown;
|
|
}
|
|
|
|
QString Device::type2str(Device::DeviceType deviceType)
|
|
{
|
|
if (deviceType == Desktop)
|
|
return QStringLiteral("desktop");
|
|
if (deviceType == Laptop)
|
|
return QStringLiteral("laptop");
|
|
if (deviceType == Phone)
|
|
return QStringLiteral("smartphone");
|
|
if (deviceType == Tablet)
|
|
return QStringLiteral("tablet");
|
|
if (deviceType == Tv)
|
|
return QStringLiteral("tv");
|
|
return QStringLiteral("unknown");
|
|
}
|
|
|
|
QString Device::statusIconName() const
|
|
{
|
|
return iconForStatus(isReachable(), isTrusted());
|
|
}
|
|
|
|
QString Device::iconName() const
|
|
{
|
|
return iconForStatus(true, false);
|
|
}
|
|
|
|
QString Device::iconForStatus(bool reachable, bool trusted) const
|
|
{
|
|
Device::DeviceType deviceType = d->m_deviceType;
|
|
if (deviceType == Device::Unknown) {
|
|
deviceType = Device::Phone; // Assume phone if we don't know the type
|
|
} else if (deviceType == Device::Desktop) {
|
|
deviceType = Device::Device::Laptop; // We don't have desktop icon yet
|
|
}
|
|
|
|
QString status = (reachable ? (trusted ? QStringLiteral("connected") : QStringLiteral("disconnected")) : QStringLiteral("trusted"));
|
|
QString type = type2str(deviceType);
|
|
|
|
return type + status;
|
|
}
|
|
|
|
void Device::setName(const QString &name)
|
|
{
|
|
if (d->m_deviceName != name) {
|
|
d->m_deviceName = name;
|
|
KdeConnectConfig::instance().setDeviceProperty(d->m_deviceId, QStringLiteral("name"), name);
|
|
Q_EMIT nameChanged(name);
|
|
}
|
|
}
|
|
|
|
void Device::setType(const QString &strtype)
|
|
{
|
|
auto type = str2type(strtype);
|
|
if (d->m_deviceType != type) {
|
|
d->m_deviceType = type;
|
|
KdeConnectConfig::instance().setDeviceProperty(d->m_deviceId, QStringLiteral("type"), strtype);
|
|
Q_EMIT typeChanged(strtype);
|
|
}
|
|
}
|
|
|
|
KdeConnectPlugin *Device::plugin(const QString &pluginName) const
|
|
{
|
|
return d->m_plugins[pluginName];
|
|
}
|
|
|
|
void Device::setPluginEnabled(const QString &pluginName, bool enabled)
|
|
{
|
|
if (!d->m_allPlugins.contains(pluginName)) {
|
|
return;
|
|
}
|
|
|
|
KConfigGroup pluginStates = KSharedConfig::openConfig(pluginsConfigFile())->group("Plugins");
|
|
|
|
const QString enabledKey = pluginName + QStringLiteral("Enabled");
|
|
pluginStates.writeEntry(enabledKey, enabled);
|
|
reloadPlugins();
|
|
}
|
|
|
|
bool Device::isPluginEnabled(const QString &pluginName) const
|
|
{
|
|
const QString enabledKey = pluginName + QStringLiteral("Enabled");
|
|
KConfigGroup pluginStates = KSharedConfig::openConfig(pluginsConfigFile())->group("Plugins");
|
|
|
|
return (pluginStates.hasKey(enabledKey) ? pluginStates.readEntry(enabledKey, false)
|
|
: PluginLoader::instance()->getPluginInfo(pluginName).isEnabledByDefault());
|
|
}
|
|
|
|
QString Device::encryptionInfo() const
|
|
{
|
|
QString result;
|
|
const QCryptographicHash::Algorithm digestAlgorithm = QCryptographicHash::Algorithm::Sha256;
|
|
|
|
QString localChecksum = QString::fromLatin1(KdeConnectConfig::instance().certificate().digest(digestAlgorithm).toHex());
|
|
for (int i = 2; i < localChecksum.size(); i += 3) {
|
|
localChecksum.insert(i, QStringLiteral(":")); // Improve readability
|
|
}
|
|
result += i18n("SHA256 fingerprint of your device certificate is: %1\n", localChecksum);
|
|
|
|
std::string remotePem = KdeConnectConfig::instance().getDeviceProperty(id(), QStringLiteral("certificate")).toStdString();
|
|
QSslCertificate remoteCertificate = QSslCertificate(QByteArray(remotePem.c_str(), (int)remotePem.size()));
|
|
QString remoteChecksum = QString::fromLatin1(remoteCertificate.digest(digestAlgorithm).toHex());
|
|
for (int i = 2; i < remoteChecksum.size(); i += 3) {
|
|
remoteChecksum.insert(i, QStringLiteral(":")); // Improve readability
|
|
}
|
|
result += i18n("SHA256 fingerprint of remote device certificate is: %1\n", remoteChecksum);
|
|
|
|
return result;
|
|
}
|
|
|
|
QSslCertificate Device::certificate() const
|
|
{
|
|
if (!d->m_deviceLinks.isEmpty()) {
|
|
return d->m_deviceLinks[0]->certificate();
|
|
}
|
|
return QSslCertificate();
|
|
}
|
|
|
|
QByteArray Device::verificationKey() const
|
|
{
|
|
auto a = KdeConnectConfig::instance().certificate().publicKey().toDer();
|
|
auto b = certificate().publicKey().toDer();
|
|
if (a < b) {
|
|
std::swap(a, b);
|
|
}
|
|
|
|
QCryptographicHash hash(QCryptographicHash::Sha256);
|
|
hash.addData(a);
|
|
hash.addData(b);
|
|
return hash.result().toHex();
|
|
}
|
|
|
|
QString Device::pluginIconName(const QString &pluginName)
|
|
{
|
|
if (hasPlugin(pluginName)) {
|
|
return d->m_plugins[pluginName]->iconName();
|
|
}
|
|
return QString();
|
|
}
|