Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(80)

Side by Side Diff: extensions/common/permissions/socket_permission.cc

Issue 795543002: Added PermissionIDSet to APIPermissions (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@permissions_patch_1_static_initializer_fix
Patch Set: Rebase Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "extensions/common/permissions/socket_permission.h" 5 #include "extensions/common/permissions/socket_permission.h"
6 6
7 #include <algorithm> 7 #include <algorithm>
8 8
9 #include "base/logging.h" 9 #include "base/logging.h"
10 #include "base/memory/scoped_ptr.h" 10 #include "base/memory/scoped_ptr.h"
11 #include "base/strings/utf_string_conversions.h" 11 #include "base/strings/utf_string_conversions.h"
12 #include "extensions/common/permissions/permissions_info.h" 12 #include "extensions/common/permissions/permissions_info.h"
13 #include "extensions/common/permissions/set_disjunction_permission.h" 13 #include "extensions/common/permissions/set_disjunction_permission.h"
14 #include "grit/extensions_strings.h" 14 #include "grit/extensions_strings.h"
15 #include "ui/base/l10n/l10n_util.h" 15 #include "ui/base/l10n/l10n_util.h"
16 16
17 namespace extensions { 17 namespace extensions {
18 18
19 SocketPermission::SocketPermission(const APIPermissionInfo* info) 19 SocketPermission::SocketPermission(const APIPermissionInfo* info)
20 : SetDisjunctionPermission<SocketPermissionData, SocketPermission>(info) {} 20 : SetDisjunctionPermission<SocketPermissionData, SocketPermission>(info) {}
21 21
22 SocketPermission::~SocketPermission() {} 22 SocketPermission::~SocketPermission() {}
23 23
24 PermissionIDSet SocketPermission::GetPermissions() const {
25 PermissionMessages messages;
26 PermissionIDSet ids;
27 AddAllHostMessages(messages, ids);
28 return ids;
29 }
30
24 PermissionMessages SocketPermission::GetMessages() const { 31 PermissionMessages SocketPermission::GetMessages() const {
25 DCHECK(HasMessages()); 32 DCHECK(HasMessages());
26 PermissionMessages result; 33 PermissionMessages messages;
27 if (!AddAnyHostMessage(result)) { 34 PermissionIDSet ids;
28 AddSpecificHostMessage(result); 35 AddAllHostMessages(messages, ids);
29 AddSubdomainHostMessage(result); 36 return messages;
30 }
31 AddNetworkListMessage(result);
32 return result;
33 } 37 }
34 38
35 bool SocketPermission::AddAnyHostMessage(PermissionMessages& messages) const { 39 void SocketPermission::AddAllHostMessages(PermissionMessages& messages,
40 PermissionIDSet& ids) const {
41 // TODO(rpaquay): This function and callees is (almost) a copy/paste from
42 // extensions::SocketsManifestPermission.
43 if (!AddAnyHostMessage(messages, ids)) {
44 AddSpecificHostMessage(messages, ids);
45 AddSubdomainHostMessage(messages, ids);
46 }
47 AddNetworkListMessage(messages, ids);
48 }
49
50 bool SocketPermission::AddAnyHostMessage(PermissionMessages& messages,
51 PermissionIDSet& ids) const {
36 std::set<SocketPermissionData>::const_iterator i; 52 std::set<SocketPermissionData>::const_iterator i;
37 for (i = data_set_.begin(); i != data_set_.end(); ++i) { 53 for (i = data_set_.begin(); i != data_set_.end(); ++i) {
38 if (i->entry().IsAddressBoundType() && 54 if (i->entry().IsAddressBoundType() &&
39 i->entry().GetHostType() == SocketPermissionEntry::ANY_HOST) { 55 i->entry().GetHostType() == SocketPermissionEntry::ANY_HOST) {
40 messages.push_back( 56 messages.push_back(
41 PermissionMessage(PermissionMessage::kSocketAnyHost, 57 PermissionMessage(PermissionMessage::kSocketAnyHost,
42 l10n_util::GetStringUTF16( 58 l10n_util::GetStringUTF16(
43 IDS_EXTENSION_PROMPT_WARNING_SOCKET_ANY_HOST))); 59 IDS_EXTENSION_PROMPT_WARNING_SOCKET_ANY_HOST)));
60 ids.insert(APIPermission::kSocketAnyHost);
44 return true; 61 return true;
45 } 62 }
46 } 63 }
47 return false; 64 return false;
48 } 65 }
49 66
50 void SocketPermission::AddSubdomainHostMessage( 67 void SocketPermission::AddSubdomainHostMessage(PermissionMessages& messages,
51 PermissionMessages& messages) const { 68 PermissionIDSet& ids) const {
52 std::set<base::string16> domains; 69 std::set<base::string16> domains;
53 std::set<SocketPermissionData>::const_iterator i; 70 std::set<SocketPermissionData>::const_iterator i;
54 for (i = data_set_.begin(); i != data_set_.end(); ++i) { 71 for (i = data_set_.begin(); i != data_set_.end(); ++i) {
55 if (i->entry().GetHostType() == SocketPermissionEntry::HOSTS_IN_DOMAINS) 72 if (i->entry().GetHostType() == SocketPermissionEntry::HOSTS_IN_DOMAINS)
56 domains.insert(base::UTF8ToUTF16(i->entry().pattern().host)); 73 domains.insert(base::UTF8ToUTF16(i->entry().pattern().host));
57 } 74 }
58 if (!domains.empty()) { 75 if (!domains.empty()) {
59 int id = (domains.size() == 1) 76 int id = (domains.size() == 1)
60 ? IDS_EXTENSION_PROMPT_WARNING_SOCKET_HOSTS_IN_DOMAIN 77 ? IDS_EXTENSION_PROMPT_WARNING_SOCKET_HOSTS_IN_DOMAIN
61 : IDS_EXTENSION_PROMPT_WARNING_SOCKET_HOSTS_IN_DOMAINS; 78 : IDS_EXTENSION_PROMPT_WARNING_SOCKET_HOSTS_IN_DOMAINS;
62 messages.push_back(PermissionMessage( 79 messages.push_back(PermissionMessage(
63 PermissionMessage::kSocketDomainHosts, 80 PermissionMessage::kSocketDomainHosts,
64 l10n_util::GetStringFUTF16( 81 l10n_util::GetStringFUTF16(
65 id, 82 id,
66 JoinString( 83 JoinString(
67 std::vector<base::string16>(domains.begin(), domains.end()), 84 std::vector<base::string16>(domains.begin(), domains.end()),
68 ' ')))); 85 ' '))));
86 for (const auto& domain : domains)
87 ids.insert(APIPermission::kSocketDomainHosts, domain);
69 } 88 }
70 } 89 }
71 90
72 void SocketPermission::AddSpecificHostMessage( 91 void SocketPermission::AddSpecificHostMessage(PermissionMessages& messages,
73 PermissionMessages& messages) const { 92 PermissionIDSet& ids) const {
74 std::set<base::string16> hostnames; 93 std::set<base::string16> hostnames;
75 std::set<SocketPermissionData>::const_iterator i; 94 std::set<SocketPermissionData>::const_iterator i;
76 for (i = data_set_.begin(); i != data_set_.end(); ++i) { 95 for (i = data_set_.begin(); i != data_set_.end(); ++i) {
77 if (i->entry().GetHostType() == SocketPermissionEntry::SPECIFIC_HOSTS) 96 if (i->entry().GetHostType() == SocketPermissionEntry::SPECIFIC_HOSTS)
78 hostnames.insert(base::UTF8ToUTF16(i->entry().pattern().host)); 97 hostnames.insert(base::UTF8ToUTF16(i->entry().pattern().host));
79 } 98 }
80 if (!hostnames.empty()) { 99 if (!hostnames.empty()) {
81 int id = (hostnames.size() == 1) 100 int id = (hostnames.size() == 1)
82 ? IDS_EXTENSION_PROMPT_WARNING_SOCKET_SPECIFIC_HOST 101 ? IDS_EXTENSION_PROMPT_WARNING_SOCKET_SPECIFIC_HOST
83 : IDS_EXTENSION_PROMPT_WARNING_SOCKET_SPECIFIC_HOSTS; 102 : IDS_EXTENSION_PROMPT_WARNING_SOCKET_SPECIFIC_HOSTS;
84 messages.push_back(PermissionMessage( 103 messages.push_back(PermissionMessage(
85 PermissionMessage::kSocketSpecificHosts, 104 PermissionMessage::kSocketSpecificHosts,
86 l10n_util::GetStringFUTF16( 105 l10n_util::GetStringFUTF16(
87 id, 106 id,
88 JoinString( 107 JoinString(
89 std::vector<base::string16>(hostnames.begin(), hostnames.end()), 108 std::vector<base::string16>(hostnames.begin(), hostnames.end()),
90 ' ')))); 109 ' '))));
110 for (const auto& hostname : hostnames)
111 ids.insert(APIPermission::kSocketSpecificHosts, hostname);
91 } 112 }
92 } 113 }
93 114
94 void SocketPermission::AddNetworkListMessage( 115 void SocketPermission::AddNetworkListMessage(PermissionMessages& messages,
95 PermissionMessages& messages) const { 116 PermissionIDSet& ids) const {
96 std::set<SocketPermissionData>::const_iterator i; 117 std::set<SocketPermissionData>::const_iterator i;
97 for (i = data_set_.begin(); i != data_set_.end(); ++i) { 118 for (i = data_set_.begin(); i != data_set_.end(); ++i) {
98 if (i->entry().pattern().type == 119 if (i->entry().pattern().type ==
99 content::SocketPermissionRequest::NETWORK_STATE) { 120 content::SocketPermissionRequest::NETWORK_STATE) {
100 messages.push_back( 121 messages.push_back(
101 PermissionMessage(PermissionMessage::kNetworkState, 122 PermissionMessage(PermissionMessage::kNetworkState,
102 l10n_util::GetStringUTF16( 123 l10n_util::GetStringUTF16(
103 IDS_EXTENSION_PROMPT_WARNING_NETWORK_STATE))); 124 IDS_EXTENSION_PROMPT_WARNING_NETWORK_STATE)));
125 ids.insert(APIPermission::kNetworkState);
104 } 126 }
105 } 127 }
106 } 128 }
107 129
108 } // namespace extensions 130 } // namespace extensions
OLDNEW
« no previous file with comments | « extensions/common/permissions/socket_permission.h ('k') | extensions/common/permissions/usb_device_permission.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698