| Index: chrome/common/extensions/permissions/socket_permission_data.cc
|
| diff --git a/chrome/common/extensions/permissions/socket_permission_data.cc b/chrome/common/extensions/permissions/socket_permission_data.cc
|
| index 4b8b689223d91052abe4381eecd1a3a1b7b2ab1d..2a89cc074422fb142eb61a0007780b0c81c29676 100644
|
| --- a/chrome/common/extensions/permissions/socket_permission_data.cc
|
| +++ b/chrome/common/extensions/permissions/socket_permission_data.cc
|
| @@ -16,6 +16,7 @@
|
|
|
| namespace {
|
|
|
| +using content::SocketPermissionRequest;
|
| using extensions::SocketPermissionData;
|
|
|
| const char kColon = ':';
|
| @@ -29,27 +30,27 @@ const char kUDPSendTo[] = "udp-send-to";
|
| const int kAnyPort = 0;
|
| const int kInvalidPort = -1;
|
|
|
| -SocketPermissionData::OperationType StringToType(const std::string& s) {
|
| +SocketPermissionRequest::OperationType StringToType(const std::string& s) {
|
| if (s == kTCPConnect)
|
| - return SocketPermissionData::TCP_CONNECT;
|
| + return SocketPermissionRequest::TCP_CONNECT;
|
| if (s == kTCPListen)
|
| - return SocketPermissionData::TCP_LISTEN;
|
| + return SocketPermissionRequest::TCP_LISTEN;
|
| if (s == kUDPBind)
|
| - return SocketPermissionData::UDP_BIND;
|
| + return SocketPermissionRequest::UDP_BIND;
|
| if (s == kUDPSendTo)
|
| - return SocketPermissionData::UDP_SEND_TO;
|
| - return SocketPermissionData::NONE;
|
| + return SocketPermissionRequest::UDP_SEND_TO;
|
| + return SocketPermissionRequest::NONE;
|
| }
|
|
|
| -const char* TypeToString(SocketPermissionData::OperationType type) {
|
| +const char* TypeToString(SocketPermissionRequest::OperationType type) {
|
| switch (type) {
|
| - case SocketPermissionData::TCP_CONNECT:
|
| + case SocketPermissionRequest::TCP_CONNECT:
|
| return kTCPConnect;
|
| - case SocketPermissionData::TCP_LISTEN:
|
| + case SocketPermissionRequest::TCP_LISTEN:
|
| return kTCPListen;
|
| - case SocketPermissionData::UDP_BIND:
|
| + case SocketPermissionRequest::UDP_BIND:
|
| return kUDPBind;
|
| - case SocketPermissionData::UDP_SEND_TO:
|
| + case SocketPermissionRequest::UDP_SEND_TO:
|
| return kUDPSendTo;
|
| default:
|
| return kInvalid;
|
| @@ -102,12 +103,11 @@ bool SocketPermissionData::operator==(const SocketPermissionData& rhs) const {
|
| (port_ == rhs.port_);
|
| }
|
|
|
| -bool SocketPermissionData::Match(
|
| - OperationType type, const std::string& host, int port) const {
|
| - if (type_ != type)
|
| +bool SocketPermissionData::Match(SocketPermissionRequest request) const {
|
| + if (type_ != request.type)
|
| return false;
|
|
|
| - std::string lhost = StringToLowerASCII(host);
|
| + std::string lhost = StringToLowerASCII(request.host);
|
| if (host_ != lhost) {
|
| if (!match_subdomains_)
|
| return false;
|
| @@ -135,7 +135,7 @@ bool SocketPermissionData::Match(
|
| }
|
| }
|
|
|
| - if (port_ != port && port_ != kAnyPort)
|
| + if (port_ != request.port && port_ != kAnyPort)
|
| return false;
|
|
|
| return true;
|
| @@ -155,7 +155,7 @@ bool SocketPermissionData::Parse(const std::string& permission) {
|
| break;
|
|
|
| type_ = StringToType(tokens[0]);
|
| - if (type_ == NONE)
|
| + if (type_ == SocketPermissionRequest::NONE)
|
| break;
|
|
|
| if (tokens.size() == 1)
|
| @@ -231,7 +231,7 @@ const std::string& SocketPermissionData::GetAsString() const {
|
| }
|
|
|
| void SocketPermissionData::Reset() {
|
| - type_ = NONE;
|
| + type_ = SocketPermissionRequest::NONE;
|
| host_.clear();
|
| match_subdomains_ = false;
|
| port_ = kInvalidPort;
|
|
|