OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chromeos/network/onc/onc_validator.h" | 5 #include "chromeos/network/onc/onc_validator.h" |
6 | 6 |
7 #include <algorithm> | 7 #include <algorithm> |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/json/json_writer.h" | 10 #include "base/json/json_writer.h" |
(...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
96 } | 96 } |
97 | 97 |
98 scoped_ptr<base::DictionaryValue> Validator::MapObject( | 98 scoped_ptr<base::DictionaryValue> Validator::MapObject( |
99 const OncValueSignature& signature, | 99 const OncValueSignature& signature, |
100 const base::DictionaryValue& onc_object, | 100 const base::DictionaryValue& onc_object, |
101 bool* error) { | 101 bool* error) { |
102 scoped_ptr<base::DictionaryValue> repaired(new base::DictionaryValue); | 102 scoped_ptr<base::DictionaryValue> repaired(new base::DictionaryValue); |
103 | 103 |
104 bool valid = ValidateObjectDefault(signature, onc_object, repaired.get()); | 104 bool valid = ValidateObjectDefault(signature, onc_object, repaired.get()); |
105 if (valid) { | 105 if (valid) { |
106 if (&signature == &kToplevelConfigurationSignature) | 106 if (&signature == &kToplevelConfigurationSignature) { |
107 valid = ValidateToplevelConfiguration(repaired.get()); | 107 valid = ValidateToplevelConfiguration(repaired.get()); |
108 else if (&signature == &kNetworkConfigurationSignature) | 108 } else if (&signature == &kNetworkConfigurationSignature) { |
109 valid = ValidateNetworkConfiguration(repaired.get()); | 109 valid = ValidateNetworkConfiguration(repaired.get()); |
110 else if (&signature == &kEthernetSignature) | 110 } else if (&signature == &kEthernetSignature) { |
111 valid = ValidateEthernet(repaired.get()); | 111 valid = ValidateEthernet(repaired.get()); |
112 else if (&signature == &kIPConfigSignature) | 112 } else if (&signature == &kIPConfigSignature || |
| 113 &signature == &kSavedIPConfigSignature || |
| 114 &signature == &kStaticIPConfigSignature) { |
113 valid = ValidateIPConfig(repaired.get()); | 115 valid = ValidateIPConfig(repaired.get()); |
114 else if (&signature == &kWiFiSignature) | 116 } else if (&signature == &kWiFiSignature) { |
115 valid = ValidateWiFi(repaired.get()); | 117 valid = ValidateWiFi(repaired.get()); |
116 else if (&signature == &kVPNSignature) | 118 } else if (&signature == &kVPNSignature) { |
117 valid = ValidateVPN(repaired.get()); | 119 valid = ValidateVPN(repaired.get()); |
118 else if (&signature == &kIPsecSignature) | 120 } else if (&signature == &kIPsecSignature) { |
119 valid = ValidateIPsec(repaired.get()); | 121 valid = ValidateIPsec(repaired.get()); |
120 else if (&signature == &kOpenVPNSignature) | 122 } else if (&signature == &kOpenVPNSignature) { |
121 valid = ValidateOpenVPN(repaired.get()); | 123 valid = ValidateOpenVPN(repaired.get()); |
122 else if (&signature == &kVerifyX509Signature) | 124 } else if (&signature == &kVerifyX509Signature) { |
123 valid = ValidateVerifyX509(repaired.get()); | 125 valid = ValidateVerifyX509(repaired.get()); |
124 else if (&signature == &kCertificatePatternSignature) | 126 } else if (&signature == &kCertificatePatternSignature) { |
125 valid = ValidateCertificatePattern(repaired.get()); | 127 valid = ValidateCertificatePattern(repaired.get()); |
126 else if (&signature == &kProxySettingsSignature) | 128 } else if (&signature == &kProxySettingsSignature) { |
127 valid = ValidateProxySettings(repaired.get()); | 129 valid = ValidateProxySettings(repaired.get()); |
128 else if (&signature == &kProxyLocationSignature) | 130 } else if (&signature == &kProxyLocationSignature) { |
129 valid = ValidateProxyLocation(repaired.get()); | 131 valid = ValidateProxyLocation(repaired.get()); |
130 else if (&signature == &kEAPSignature) | 132 } else if (&signature == &kEAPSignature) { |
131 valid = ValidateEAP(repaired.get()); | 133 valid = ValidateEAP(repaired.get()); |
132 else if (&signature == &kCertificateSignature) | 134 } else if (&signature == &kCertificateSignature) { |
133 valid = ValidateCertificate(repaired.get()); | 135 valid = ValidateCertificate(repaired.get()); |
| 136 } |
134 } | 137 } |
135 | 138 |
136 if (valid) { | 139 if (valid) { |
137 return repaired.Pass(); | 140 return repaired.Pass(); |
138 } else { | 141 } else { |
139 DCHECK(error_or_warning_found_); | 142 DCHECK(error_or_warning_found_); |
140 error_or_warning_found_ = *error = true; | 143 error_or_warning_found_ = *error = true; |
141 return scoped_ptr<base::DictionaryValue>(); | 144 return scoped_ptr<base::DictionaryValue>(); |
142 } | 145 } |
143 } | 146 } |
(...skipping 692 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
836 } | 839 } |
837 | 840 |
838 std::string Validator::MessageHeader() { | 841 std::string Validator::MessageHeader() { |
839 std::string path = path_.empty() ? "toplevel" : JoinString(path_, "."); | 842 std::string path = path_.empty() ? "toplevel" : JoinString(path_, "."); |
840 std::string message = "At " + path + ": "; | 843 std::string message = "At " + path + ": "; |
841 return message; | 844 return message; |
842 } | 845 } |
843 | 846 |
844 } // namespace onc | 847 } // namespace onc |
845 } // namespace chromeos | 848 } // namespace chromeos |
OLD | NEW |