Index: extensions/browser/api/vpn_provider/vpn_provider_api.cc |
diff --git a/extensions/browser/api/vpn_provider/vpn_provider_api.cc b/extensions/browser/api/vpn_provider/vpn_provider_api.cc |
index a7a0d828398604b26026f11d14f5af4c2f36fa11..710e2cc6aecbd743858316fcf520b0658613a074 100644 |
--- a/extensions/browser/api/vpn_provider/vpn_provider_api.cc |
+++ b/extensions/browser/api/vpn_provider/vpn_provider_api.cc |
@@ -24,15 +24,67 @@ namespace api_vpn = extensions::core_api::vpn_provider; |
const char kCIDRSeperator[] = "/"; |
bartfab (slow)
2015/02/19 13:10:13
Why is this a string and not a single-char constan
kaliamoorthi
2015/02/19 16:20:05
This is due to tokenize below.
|
+bool CheckIPCIDR(const std::string& value, bool cidr, bool ipv6) { |
not at google - send to devlin
2015/02/18 19:14:04
You should test this.
kaliamoorthi
2015/02/19 12:53:59
I am working on the test.
bartfab (slow)
2015/02/19 13:10:14
I think it would be better to implement this diffe
kaliamoorthi
2015/02/19 16:20:05
I am doing a simple sanity check here in a single
|
+ int dots = !ipv6 ? 3 : 0; |
+ int sep = cidr ? 1 : 0; |
+ int colon = ipv6 ? 7 : 0; |
+ |
+ for (auto elem : value) { |
bartfab (slow)
2015/02/19 13:10:14
Nit: const auto&
kaliamoorthi
2015/02/19 16:20:05
Done.
|
+ if (base::IsAsciiDigit(*elem)) { |
+ continue; |
+ } else if (*elem == '.' && !dots) { |
bartfab (slow)
2015/02/19 13:10:14
Nit: No else after continue.
kaliamoorthi
2015/02/19 16:20:05
Done.
|
+ return false; |
+ } else if (*elem == '.') { |
bartfab (slow)
2015/02/19 13:10:14
Nit: No else after return.
kaliamoorthi
2015/02/19 16:20:05
Done.
|
+ dots--; |
+ } else if (*elem == kCIDRSeperator[0] && !sep) { |
+ return false; |
+ } else if (*elem == kCIDRSeperator[0]) { |
bartfab (slow)
2015/02/19 13:10:13
Nit: No else after return.
kaliamoorthi
2015/02/19 16:20:05
Done.
|
+ sep--; |
+ } else if (*elem == ':' && !colon) { |
+ return false; |
+ } else if (*elem == ':') { |
bartfab (slow)
2015/02/19 13:10:14
Nit: No else after return.
kaliamoorthi
2015/02/19 16:20:05
Done.
|
+ colon--; |
bartfab (slow)
2015/02/19 13:10:13
You are not checking that IPv6 starts with a colon
kaliamoorthi
2015/02/19 16:20:04
It need not start with a colon.
|
+ } else if (ipv6 && base::IsHexDigit(*elem)) { |
+ continue; |
+ } else { |
bartfab (slow)
2015/02/19 13:10:14
Nit: No else after continue.
kaliamoorthi
2015/02/19 16:20:05
Done.
|
+ return false; |
+ } |
+ } |
+ return !sep && !dots && (colon < 7); |
bartfab (slow)
2015/02/19 13:10:14
Is the number of colons not fixed?
kaliamoorthi
2015/02/19 16:20:05
Acknowledged.
|
+} |
+ |
void ConvertParameters(const api_vpn::Parameters& parameters, |
base::DictionaryValue* parameter_value, |
std::string* error) { |
- std::vector<std::string> cidr_parts; |
- if (Tokenize(parameters.address, kCIDRSeperator, &cidr_parts) != 2) { |
+ if (!CheckIPCIDR(parameters.address, true, false)) { |
*error = "Invalid CIDR address."; |
return; |
} |
+ for (auto address : parameters.exclusion_list) { |
+ if (!CheckIPCIDR(*address, true, false)) { |
+ *error = "Invalid CIDR in exclusion list."; |
+ return; |
+ } |
+ } |
+ |
+ for (auto address : parameters.inclusion_list) { |
+ if (!CheckIPCIDR(*address, true, false)) { |
+ *error = "Invalid CIDR in inclusion list."; |
+ return; |
+ } |
+ } |
+ |
+ for (auto address : parameters.dns_servers) { |
+ if (!CheckIPCIDR(*address, false, false)) { |
+ *error = "Invalid IP in DNS servers."; |
+ return; |
+ } |
+ } |
not at google - send to devlin
2015/02/18 19:14:04
Could you pull each of these into a CheckIPCIDRLis
kaliamoorthi
2015/02/19 12:53:59
Done.
|
+ |
+ std::vector<std::string> cidr_parts; |
+ Tokenize(parameters.address, kCIDRSeperator, &cidr_parts); |
+ |
parameter_value->SetStringWithoutPathExpansion( |
shill::kAddressParameterThirdPartyVpn, cidr_parts[0]); |
@@ -40,8 +92,12 @@ void ConvertParameters(const api_vpn::Parameters& parameters, |
shill::kSubnetPrefixParameterThirdPartyVpn, cidr_parts[1]); |
parameter_value->SetStringWithoutPathExpansion( |
- shill::kBypassTunnelForIpParameterThirdPartyVpn, |
- JoinString(parameters.bypass_tunnel_for_ip, shill::kIPDelimiter)); |
+ "exclusion_list", |
+ JoinString(parameters.exclusion_list, shill::kIPDelimiter)); |
+ |
+ parameter_value->SetStringWithoutPathExpansion( |
+ "inclusion_list", |
+ JoinString(parameters.inclusion_list, shill::kIPDelimiter)); |
if (parameters.mtu) { |
parameter_value->SetStringWithoutPathExpansion( |