OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "components/policy/core/browser/url_blacklist_manager.h" | 5 #include "components/policy/core/browser/url_blacklist_manager.h" |
6 | 6 |
7 #include <stdint.h> | |
8 | |
9 #include <limits> | |
10 | |
11 #include "base/bind.h" | 7 #include "base/bind.h" |
12 #include "base/files/file_path.h" | 8 #include "base/files/file_path.h" |
13 #include "base/location.h" | 9 #include "base/location.h" |
14 #include "base/prefs/pref_service.h" | 10 #include "base/prefs/pref_service.h" |
15 #include "base/sequenced_task_runner.h" | 11 #include "base/sequenced_task_runner.h" |
16 #include "base/single_thread_task_runner.h" | 12 #include "base/single_thread_task_runner.h" |
17 #include "base/stl_util.h" | 13 #include "base/stl_util.h" |
18 #include "base/strings/string_number_conversions.h" | 14 #include "base/strings/string_number_conversions.h" |
19 #include "base/task_runner_util.h" | 15 #include "base/task_runner_util.h" |
20 #include "base/thread_task_runner_handle.h" | 16 #include "base/thread_task_runner_handle.h" |
(...skipping 113 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
134 | 130 |
135 // Returns true if |this| represents the "*" filter in the blacklist. | 131 // Returns true if |this| represents the "*" filter in the blacklist. |
136 bool IsBlacklistWildcard() const { | 132 bool IsBlacklistWildcard() const { |
137 return !allow && host.empty() && scheme.empty() && path.empty() && | 133 return !allow && host.empty() && scheme.empty() && path.empty() && |
138 query.empty() && port == 0 && number_of_key_value_pairs == 0 && | 134 query.empty() && port == 0 && number_of_key_value_pairs == 0 && |
139 match_subdomains; | 135 match_subdomains; |
140 } | 136 } |
141 | 137 |
142 std::string scheme; | 138 std::string scheme; |
143 std::string host; | 139 std::string host; |
144 uint16_t port; | 140 uint16 port; |
145 std::string path; | 141 std::string path; |
146 std::string query; | 142 std::string query; |
147 int number_of_key_value_pairs; | 143 int number_of_key_value_pairs; |
148 bool match_subdomains; | 144 bool match_subdomains; |
149 bool allow; | 145 bool allow; |
150 }; | 146 }; |
151 | 147 |
152 URLBlacklist::URLBlacklist(SegmentURLCallback segment_url) | 148 URLBlacklist::URLBlacklist(SegmentURLCallback segment_url) |
153 : segment_url_(segment_url), id_(0), url_matcher_(new URLMatcher) {} | 149 : segment_url_(segment_url), id_(0), url_matcher_(new URLMatcher) {} |
154 | 150 |
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
232 size_t URLBlacklist::Size() const { | 228 size_t URLBlacklist::Size() const { |
233 return filters_.size(); | 229 return filters_.size(); |
234 } | 230 } |
235 | 231 |
236 // static | 232 // static |
237 bool URLBlacklist::FilterToComponents(SegmentURLCallback segment_url, | 233 bool URLBlacklist::FilterToComponents(SegmentURLCallback segment_url, |
238 const std::string& filter, | 234 const std::string& filter, |
239 std::string* scheme, | 235 std::string* scheme, |
240 std::string* host, | 236 std::string* host, |
241 bool* match_subdomains, | 237 bool* match_subdomains, |
242 uint16_t* port, | 238 uint16* port, |
243 std::string* path, | 239 std::string* path, |
244 std::string* query) { | 240 std::string* query) { |
245 url::Parsed parsed; | 241 url::Parsed parsed; |
246 | 242 |
247 if (segment_url(filter, &parsed) == url::kFileScheme) { | 243 if (segment_url(filter, &parsed) == url::kFileScheme) { |
248 base::FilePath file_path; | 244 base::FilePath file_path; |
249 if (!net::FileURLToFilePath(GURL(filter), &file_path)) | 245 if (!net::FileURLToFilePath(GURL(filter), &file_path)) |
250 return false; | 246 return false; |
251 | 247 |
252 *scheme = url::kFileScheme; | 248 *scheme = url::kFileScheme; |
(...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
295 *match_subdomains = false; | 291 *match_subdomains = false; |
296 } | 292 } |
297 } | 293 } |
298 | 294 |
299 if (parsed.port.is_nonempty()) { | 295 if (parsed.port.is_nonempty()) { |
300 int int_port; | 296 int int_port; |
301 if (!base::StringToInt(filter.substr(parsed.port.begin, parsed.port.len), | 297 if (!base::StringToInt(filter.substr(parsed.port.begin, parsed.port.len), |
302 &int_port)) { | 298 &int_port)) { |
303 return false; | 299 return false; |
304 } | 300 } |
305 if (int_port <= 0 || int_port > std::numeric_limits<uint16_t>::max()) | 301 if (int_port <= 0 || int_port > kuint16max) |
306 return false; | 302 return false; |
307 *port = int_port; | 303 *port = int_port; |
308 } else { | 304 } else { |
309 // Match any port. | 305 // Match any port. |
310 *port = 0; | 306 *port = 0; |
311 } | 307 } |
312 | 308 |
313 if (parsed.path.is_nonempty()) | 309 if (parsed.path.is_nonempty()) |
314 path->assign(filter, parsed.path.begin, parsed.path.len); | 310 path->assign(filter, parsed.path.begin, parsed.path.len); |
315 else | 311 else |
316 path->clear(); | 312 path->clear(); |
317 | 313 |
318 if (query) { | 314 if (query) { |
319 if (parsed.query.is_nonempty()) | 315 if (parsed.query.is_nonempty()) |
320 query->assign(filter, parsed.query.begin, parsed.query.len); | 316 query->assign(filter, parsed.query.begin, parsed.query.len); |
321 else | 317 else |
322 query->clear(); | 318 query->clear(); |
323 } | 319 } |
324 | 320 |
325 return true; | 321 return true; |
326 } | 322 } |
327 | 323 |
328 // static | 324 // static |
329 scoped_refptr<URLMatcherConditionSet> URLBlacklist::CreateConditionSet( | 325 scoped_refptr<URLMatcherConditionSet> URLBlacklist::CreateConditionSet( |
330 URLMatcher* url_matcher, | 326 URLMatcher* url_matcher, |
331 int id, | 327 int id, |
332 const std::string& scheme, | 328 const std::string& scheme, |
333 const std::string& host, | 329 const std::string& host, |
334 bool match_subdomains, | 330 bool match_subdomains, |
335 uint16_t port, | 331 uint16 port, |
336 const std::string& path, | 332 const std::string& path, |
337 const std::string& query, | 333 const std::string& query, |
338 bool allow) { | 334 bool allow) { |
339 URLMatcherConditionFactory* condition_factory = | 335 URLMatcherConditionFactory* condition_factory = |
340 url_matcher->condition_factory(); | 336 url_matcher->condition_factory(); |
341 std::set<URLMatcherCondition> conditions; | 337 std::set<URLMatcherCondition> conditions; |
342 conditions.insert(match_subdomains ? | 338 conditions.insert(match_subdomains ? |
343 condition_factory->CreateHostSuffixPathPrefixCondition(host, path) : | 339 condition_factory->CreateHostSuffixPathPrefixCondition(host, path) : |
344 condition_factory->CreateHostEqualsPathPrefixCondition(host, path)); | 340 condition_factory->CreateHostEqualsPathPrefixCondition(host, path)); |
345 | 341 |
(...skipping 159 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
505 } | 501 } |
506 | 502 |
507 // static | 503 // static |
508 void URLBlacklistManager::RegisterProfilePrefs( | 504 void URLBlacklistManager::RegisterProfilePrefs( |
509 user_prefs::PrefRegistrySyncable* registry) { | 505 user_prefs::PrefRegistrySyncable* registry) { |
510 registry->RegisterListPref(policy_prefs::kUrlBlacklist); | 506 registry->RegisterListPref(policy_prefs::kUrlBlacklist); |
511 registry->RegisterListPref(policy_prefs::kUrlWhitelist); | 507 registry->RegisterListPref(policy_prefs::kUrlWhitelist); |
512 } | 508 } |
513 | 509 |
514 } // namespace policy | 510 } // namespace policy |
OLD | NEW |