| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/common/extensions/permissions/socket_permission_data.h" | |
| 6 | |
| 7 #include <cstdlib> | |
| 8 #include <sstream> | |
| 9 #include <vector> | |
| 10 | |
| 11 #include "base/logging.h" | |
| 12 #include "base/memory/scoped_ptr.h" | |
| 13 #include "base/strings/string_number_conversions.h" | |
| 14 #include "base/strings/string_split.h" | |
| 15 #include "base/strings/string_util.h" | |
| 16 #include "chrome/common/extensions/permissions/socket_permission.h" | |
| 17 #include "extensions/common/permissions/api_permission.h" | |
| 18 #include "url/url_canon.h" | |
| 19 | |
| 20 namespace { | |
| 21 | |
| 22 using content::SocketPermissionRequest; | |
| 23 using extensions::SocketPermissionData; | |
| 24 | |
| 25 const char kColon = ':'; | |
| 26 const char kInvalid[] = "invalid"; | |
| 27 const char kTCPConnect[] = "tcp-connect"; | |
| 28 const char kTCPListen[] = "tcp-listen"; | |
| 29 const char kUDPBind[] = "udp-bind"; | |
| 30 const char kUDPSendTo[] = "udp-send-to"; | |
| 31 const char kUDPMulticastMembership[] = "udp-multicast-membership"; | |
| 32 const char kResolveHost[] = "resolve-host"; | |
| 33 const char kResolveProxy[] = "resolve-proxy"; | |
| 34 const char kNetworkState[] = "network-state"; | |
| 35 | |
| 36 SocketPermissionRequest::OperationType StringToType(const std::string& s) { | |
| 37 if (s == kTCPConnect) | |
| 38 return SocketPermissionRequest::TCP_CONNECT; | |
| 39 if (s == kTCPListen) | |
| 40 return SocketPermissionRequest::TCP_LISTEN; | |
| 41 if (s == kUDPBind) | |
| 42 return SocketPermissionRequest::UDP_BIND; | |
| 43 if (s == kUDPSendTo) | |
| 44 return SocketPermissionRequest::UDP_SEND_TO; | |
| 45 if (s == kUDPMulticastMembership) | |
| 46 return SocketPermissionRequest::UDP_MULTICAST_MEMBERSHIP; | |
| 47 if (s == kResolveHost) | |
| 48 return SocketPermissionRequest::RESOLVE_HOST; | |
| 49 if (s == kResolveProxy) | |
| 50 return SocketPermissionRequest::RESOLVE_PROXY; | |
| 51 if (s == kNetworkState) | |
| 52 return SocketPermissionRequest::NETWORK_STATE; | |
| 53 return SocketPermissionRequest::NONE; | |
| 54 } | |
| 55 | |
| 56 const char* TypeToString(SocketPermissionRequest::OperationType type) { | |
| 57 switch (type) { | |
| 58 case SocketPermissionRequest::TCP_CONNECT: | |
| 59 return kTCPConnect; | |
| 60 case SocketPermissionRequest::TCP_LISTEN: | |
| 61 return kTCPListen; | |
| 62 case SocketPermissionRequest::UDP_BIND: | |
| 63 return kUDPBind; | |
| 64 case SocketPermissionRequest::UDP_SEND_TO: | |
| 65 return kUDPSendTo; | |
| 66 case SocketPermissionRequest::UDP_MULTICAST_MEMBERSHIP: | |
| 67 return kUDPMulticastMembership; | |
| 68 case SocketPermissionRequest::RESOLVE_HOST: | |
| 69 return kResolveHost; | |
| 70 case SocketPermissionRequest::RESOLVE_PROXY: | |
| 71 return kResolveProxy; | |
| 72 case SocketPermissionRequest::NETWORK_STATE: | |
| 73 return kNetworkState; | |
| 74 default: | |
| 75 return kInvalid; | |
| 76 } | |
| 77 } | |
| 78 | |
| 79 } // namespace | |
| 80 | |
| 81 namespace extensions { | |
| 82 | |
| 83 SocketPermissionData::SocketPermissionData() { } | |
| 84 | |
| 85 SocketPermissionData::~SocketPermissionData() { } | |
| 86 | |
| 87 bool SocketPermissionData::operator<(const SocketPermissionData& rhs) const { | |
| 88 return entry_ < rhs.entry_; | |
| 89 } | |
| 90 | |
| 91 bool SocketPermissionData::operator==(const SocketPermissionData& rhs) const { | |
| 92 return entry_ == rhs.entry_; | |
| 93 } | |
| 94 | |
| 95 bool SocketPermissionData::Check( | |
| 96 const APIPermission::CheckParam* param) const { | |
| 97 if (!param) | |
| 98 return false; | |
| 99 const SocketPermission::CheckParam& specific_param = | |
| 100 *static_cast<const SocketPermission::CheckParam*>(param); | |
| 101 const SocketPermissionRequest &request = specific_param.request; | |
| 102 | |
| 103 return entry_.Check(request); | |
| 104 } | |
| 105 | |
| 106 scoped_ptr<base::Value> SocketPermissionData::ToValue() const { | |
| 107 return scoped_ptr<base::Value>(new base::StringValue(GetAsString())); | |
| 108 } | |
| 109 | |
| 110 bool SocketPermissionData::FromValue(const base::Value* value) { | |
| 111 std::string spec; | |
| 112 if (!value->GetAsString(&spec)) | |
| 113 return false; | |
| 114 | |
| 115 return Parse(spec); | |
| 116 } | |
| 117 | |
| 118 SocketPermissionEntry& SocketPermissionData::entry() { | |
| 119 // Clear the spec because the caller could mutate |this|. | |
| 120 spec_.clear(); | |
| 121 return entry_; | |
| 122 } | |
| 123 | |
| 124 // TODO(ikarienator): Rewrite this method to support IPv6. | |
| 125 bool SocketPermissionData::Parse(const std::string& permission) { | |
| 126 Reset(); | |
| 127 | |
| 128 std::vector<std::string> tokens; | |
| 129 base::SplitStringDontTrim(permission, kColon, &tokens); | |
| 130 if (tokens.empty()) | |
| 131 return false; | |
| 132 | |
| 133 SocketPermissionRequest::OperationType type = StringToType(tokens[0]); | |
| 134 if (type == SocketPermissionRequest::NONE) | |
| 135 return false; | |
| 136 | |
| 137 tokens.erase(tokens.begin()); | |
| 138 return SocketPermissionEntry::ParseHostPattern(type, tokens, &entry_); | |
| 139 } | |
| 140 | |
| 141 const std::string& SocketPermissionData::GetAsString() const { | |
| 142 if (!spec_.empty()) | |
| 143 return spec_; | |
| 144 | |
| 145 spec_.reserve(64); | |
| 146 spec_.append(TypeToString(entry_.pattern().type)); | |
| 147 std::string pattern = entry_.GetHostPatternAsString(); | |
| 148 if (!pattern.empty()) { | |
| 149 spec_.append(1, kColon).append(pattern); | |
| 150 } | |
| 151 return spec_; | |
| 152 } | |
| 153 | |
| 154 void SocketPermissionData::Reset() { | |
| 155 entry_ = SocketPermissionEntry(); | |
| 156 spec_.clear(); | |
| 157 } | |
| 158 | |
| 159 } // namespace extensions | |
| OLD | NEW |