| Index: chrome/browser/extensions/api/messaging/native_messaging_host_manifest.cc
|
| ===================================================================
|
| --- chrome/browser/extensions/api/messaging/native_messaging_host_manifest.cc (revision 185206)
|
| +++ chrome/browser/extensions/api/messaging/native_messaging_host_manifest.cc (working copy)
|
| @@ -1,138 +0,0 @@
|
| -// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/extensions/api/messaging/native_messaging_host_manifest.h"
|
| -
|
| -#include "base/json/json_file_value_serializer.h"
|
| -#include "base/logging.h"
|
| -#include "base/values.h"
|
| -
|
| -namespace extensions {
|
| -
|
| -NativeMessagingHostManifest::~NativeMessagingHostManifest() {}
|
| -
|
| -// static
|
| -bool NativeMessagingHostManifest::IsValidName(const std::string& name) {
|
| - if (name.empty()) {
|
| - return false;
|
| - }
|
| -
|
| - for (size_t i = 0; i < name.size(); ++i) {
|
| - char c = name[i];
|
| -
|
| - // Verify that only the following characters are used: [a-z0-9._].
|
| - if (!((c >= 'a' && c <= 'z') || (c >= '0' && c <= '9') ||
|
| - c == '.' || c == '_')) {
|
| - return false;
|
| - }
|
| -
|
| - // Verify that dots are separated by other characters and that string
|
| - // doesn't begin or end with a dot.
|
| - if (c == '.' && (i == 0 || name[i - 1] == '.' || i == name.size() - 1)) {
|
| - return false;
|
| - }
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -// static
|
| -scoped_ptr<NativeMessagingHostManifest> NativeMessagingHostManifest::Load(
|
| - const base::FilePath& file_path,
|
| - std::string* error_message) {
|
| - DCHECK(error_message);
|
| -
|
| - JSONFileValueSerializer serializer(file_path);
|
| - scoped_ptr<base::Value> parsed(serializer.Deserialize(NULL, error_message));
|
| - if (!parsed) {
|
| - return scoped_ptr<NativeMessagingHostManifest>();
|
| - }
|
| -
|
| - base::DictionaryValue* dictionary;
|
| - if (!parsed->GetAsDictionary(&dictionary)) {
|
| - *error_message = "Invalid manifest file.";
|
| - return scoped_ptr<NativeMessagingHostManifest>();
|
| - }
|
| -
|
| - scoped_ptr<NativeMessagingHostManifest> result(
|
| - new NativeMessagingHostManifest());
|
| - if (!result->Parse(dictionary, error_message)) {
|
| - return scoped_ptr<NativeMessagingHostManifest>();
|
| - }
|
| -
|
| - return result.Pass();
|
| -}
|
| -
|
| -NativeMessagingHostManifest::NativeMessagingHostManifest() {
|
| -}
|
| -
|
| -bool NativeMessagingHostManifest::Parse(base::DictionaryValue* dictionary,
|
| - std::string* error_message) {
|
| - if (!dictionary->GetString("name", &name_) ||
|
| - !IsValidName(name_)) {
|
| - *error_message = "Invalid value for name.";
|
| - return false;
|
| - }
|
| -
|
| - if (!dictionary->GetString("description", &description_) ||
|
| - description_.empty()) {
|
| - *error_message = "Invalid value for description.";
|
| - return false;
|
| - }
|
| -
|
| - std::string type;
|
| - // stdio is the only host type that's currently supported.
|
| - if (!dictionary->GetString("type", &type) ||
|
| - type != "stdio") {
|
| - *error_message = "Invalid value for type.";
|
| - return false;
|
| - }
|
| - interface_ = HOST_INTERFACE_STDIO;
|
| -
|
| - std::string path;
|
| - // JSON parsed checks that all strings are valid UTF8.
|
| - if (!dictionary->GetString("path", &path) ||
|
| - (path_ = base::FilePath::FromUTF8Unsafe(path)).empty() ||
|
| - !path_.IsAbsolute()) {
|
| - *error_message = "Invalid value for path.";
|
| - return false;
|
| - }
|
| -
|
| - const base::ListValue* allowed_origins_list;
|
| - if (!dictionary->GetList("allowed_origins", &allowed_origins_list)) {
|
| - *error_message =
|
| - "Invalid value for allowed_origins. Expected a list of strings.";
|
| - return false;
|
| - }
|
| - allowed_origins_.ClearPatterns();
|
| - for (base::ListValue::const_iterator it = allowed_origins_list->begin();
|
| - it != allowed_origins_list->end(); ++it) {
|
| - std::string pattern_string;
|
| - if (!(*it)->GetAsString(&pattern_string)) {
|
| - *error_message = "allowed_origins must be list of strings.";
|
| - return false;
|
| - }
|
| -
|
| - URLPattern pattern(URLPattern::SCHEME_EXTENSION);
|
| - URLPattern::ParseResult result = pattern.Parse(pattern_string);
|
| - if (result != URLPattern::PARSE_SUCCESS) {
|
| - *error_message = "Failed to parse pattern \"" + pattern_string +
|
| - "\": " + URLPattern::GetParseResultString(result);
|
| - return false;
|
| - }
|
| -
|
| - // Disallow patterns that are too broad. Set of allowed origins must be a
|
| - // fixed list of extensions.
|
| - if (pattern.match_all_urls() || pattern.match_subdomains()) {
|
| - *error_message = "Pattern \"" + pattern_string + "\" is not allowed.";
|
| - return false;
|
| - }
|
| -
|
| - allowed_origins_.AddPattern(pattern);
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -} // namespace extensions
|
|
|