Index: chrome/common/extensions/permissions/socket_permission_entry.h |
diff --git a/chrome/common/extensions/permissions/socket_permission_entry.h b/chrome/common/extensions/permissions/socket_permission_entry.h |
deleted file mode 100644 |
index 5d2eb9b2e6ab92620e4a0a472a5c9c08a6e803e7..0000000000000000000000000000000000000000 |
--- a/chrome/common/extensions/permissions/socket_permission_entry.h |
+++ /dev/null |
@@ -1,86 +0,0 @@ |
-// Copyright 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
-#ifndef CHROME_COMMON_EXTENSIONS_PERMISSIONS_SOCKET_PERMISSION_ENTRY_H_ |
-#define CHROME_COMMON_EXTENSIONS_PERMISSIONS_SOCKET_PERMISSION_ENTRY_H_ |
- |
-#include <string> |
-#include <vector> |
- |
-#include "content/public/common/socket_permission_request.h" |
-#include "ipc/ipc_param_traits.h" |
- |
-namespace ipc_fuzzer { |
-template <class T> struct FuzzTraits; |
-template <class T> struct GenerateTraits; |
-} // namespace ipc_fuzzer |
- |
-namespace extensions { |
- |
-// Internal representation of a socket permission for a specific operation, such |
-// as UDP "bind", host 127.0.0.1, port *. |
-class SocketPermissionEntry { |
- public: |
- enum HostType { |
- ANY_HOST, |
- HOSTS_IN_DOMAINS, |
- SPECIFIC_HOSTS, |
- }; |
- |
- SocketPermissionEntry(); |
- ~SocketPermissionEntry(); |
- |
- // operators <, == are needed by container std::set and algorithms |
- // std::set_includes and std::set_differences. |
- bool operator<(const SocketPermissionEntry& rhs) const; |
- bool operator==(const SocketPermissionEntry& rhs) const; |
- |
- bool Check(const content::SocketPermissionRequest& request) const; |
- |
- // Parse a host:port pattern for a given operation type. |
- // <pattern> := '' | |
- // <host> | |
- // ':' <port> | |
- // <host> ':' <port> | |
- // |
- // <host> := '*' | |
- // '*.' <anychar except '/' and '*'>+ | |
- // <anychar except '/' and '*'>+ |
- // |
- // <port> := '*' | |
- // <port number between 0 and 65535>) |
- static bool ParseHostPattern( |
- content::SocketPermissionRequest::OperationType type, |
- const std::string& pattern, |
- SocketPermissionEntry* entry); |
- |
- static bool ParseHostPattern( |
- content::SocketPermissionRequest::OperationType type, |
- const std::vector<std::string>& pattern_tokens, |
- SocketPermissionEntry* entry); |
- |
- // Returns true if the permission type can be bound to a host or port. |
- bool IsAddressBoundType() const; |
- |
- std::string GetHostPatternAsString() const; |
- HostType GetHostType() const; |
- |
- const content::SocketPermissionRequest& pattern() const { return pattern_; } |
- bool match_subdomains() const { return match_subdomains_; } |
- |
- private: |
- // Friend so ParamTraits can serialize us. |
- friend struct IPC::ParamTraits<SocketPermissionEntry>; |
- friend struct ipc_fuzzer::FuzzTraits<SocketPermissionEntry>; |
- friend struct ipc_fuzzer::GenerateTraits<SocketPermissionEntry>; |
- |
- // The permission type, host and port. |
- content::SocketPermissionRequest pattern_; |
- |
- // True if there was a wildcard in the host name. |
- bool match_subdomains_; |
-}; |
- |
-} // namespace extensions |
- |
-#endif // CHROME_COMMON_EXTENSIONS_PERMISSIONS_SOCKET_PERMISSION_ENTRY_H_ |