Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1780)

Unified Diff: remoting/host/third_party_auth_config.cc

Issue 966433002: Malformed PortRange or ThirdPartyAuthConfig trigger OnPolicyError. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixing a Windows-specific, pre-processor-related build break. Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « remoting/host/third_party_auth_config.h ('k') | remoting/host/third_party_auth_config_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: remoting/host/third_party_auth_config.cc
diff --git a/remoting/host/third_party_auth_config.cc b/remoting/host/third_party_auth_config.cc
new file mode 100644
index 0000000000000000000000000000000000000000..5ed63a86131a3f636d6719a2708adb79ed4c140d
--- /dev/null
+++ b/remoting/host/third_party_auth_config.cc
@@ -0,0 +1,138 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "remoting/host/third_party_auth_config.h"
+
+#include "base/logging.h"
+#include "base/values.h"
+#include "policy/policy_constants.h"
+
+namespace remoting {
+
+namespace {
+
+bool ParseUrlPolicy(const std::string& str, GURL* out) {
+ if (str.empty()) {
+ *out = GURL();
+ return true;
+ }
+
+ GURL gurl(str);
+ if (!gurl.is_valid()) {
+ LOG(ERROR) << "Not a valid URL: " << str;
+ return false;
+ }
+// We validate https-vs-http only on Release builds to help with manual testing.
+#if defined(NDEBUG)
+ if (!gurl.SchemeIsSecure()) {
+ LOG(ERROR) << "Not a secure URL: " << str;
+ return false;
+ }
+#endif
+
+ *out = gurl;
+ return true;
+}
+
+} // namespace
+
+bool ThirdPartyAuthConfig::ParseStrings(
+ const std::string& token_url,
+ const std::string& token_validation_url,
+ const std::string& token_validation_cert_issuer,
+ ThirdPartyAuthConfig* result) {
+ ThirdPartyAuthConfig tmp;
+
+ // Extract raw values for the 3 individual fields.
+ bool urls_valid = true;
+ urls_valid &= ParseUrlPolicy(token_url, &tmp.token_url);
+ urls_valid &= ParseUrlPolicy(token_validation_url, &tmp.token_validation_url);
+ if (!urls_valid) {
+ return false;
+ }
+ tmp.token_validation_cert_issuer = token_validation_cert_issuer;
+
+ // Validate inter-dependencies between the 3 fields.
+ if (tmp.token_url.is_empty() ^ tmp.token_validation_url.is_empty()) {
+ LOG(ERROR) << "TokenUrl and TokenValidationUrl "
+ << "have to be specified together.";
+ return false;
+ }
+ if (!tmp.token_validation_cert_issuer.empty() && tmp.token_url.is_empty()) {
+ LOG(ERROR) << "TokenValidationCertificateIssuer cannot be used "
+ << "without TokenUrl and TokenValidationUrl.";
+ return false;
+ }
+
+ *result = tmp;
+ return true;
+}
+
+namespace {
+
+void ExtractHelper(const base::DictionaryValue& policy_dict,
+ const std::string& policy_name,
+ bool* policy_present,
+ std::string* policy_value) {
+ if (policy_dict.GetString(policy_name, policy_value)) {
+ *policy_present = true;
+ } else {
+ policy_value->clear();
+ }
+}
+
+} // namespace
+
+bool ThirdPartyAuthConfig::ExtractStrings(
+ const base::DictionaryValue& policy_dict,
+ std::string* token_url,
+ std::string* token_validation_url,
+ std::string* token_validation_cert_issuer) {
+ bool policies_present = false;
+ ExtractHelper(policy_dict, policy::key::kRemoteAccessHostTokenUrl,
+ &policies_present, token_url);
+ ExtractHelper(policy_dict, policy::key::kRemoteAccessHostTokenValidationUrl,
+ &policies_present, token_validation_url);
+ ExtractHelper(policy_dict,
+ policy::key::kRemoteAccessHostTokenValidationCertificateIssuer,
+ &policies_present, token_validation_cert_issuer);
+ return policies_present;
+}
+
+ThirdPartyAuthConfig::ParseStatus ThirdPartyAuthConfig::Parse(
+ const base::DictionaryValue& policy_dict,
+ ThirdPartyAuthConfig* result) {
+ // Extract 3 individial policy values.
+ std::string token_url;
+ std::string token_validation_url;
+ std::string token_validation_cert_issuer;
+ if (!ThirdPartyAuthConfig::ExtractStrings(policy_dict, &token_url,
+ &token_validation_url,
+ &token_validation_cert_issuer)) {
+ return NoPolicy;
+ }
+
+ // Parse the policy value.
+ if (!ThirdPartyAuthConfig::ParseStrings(token_url, token_validation_url,
+ token_validation_cert_issuer,
+ result)) {
+ return InvalidPolicy;
+ }
+
+ return ParsingSuccess;
+}
+
+std::ostream& operator<<(std::ostream& os, const ThirdPartyAuthConfig& cfg) {
+ if (cfg.is_null()) {
+ os << "<no 3rd party auth config specified>";
+ } else {
+ os << "TokenUrl = <" << cfg.token_url << ">, ";
+ os << "TokenValidationUrl = <" << cfg.token_validation_url << ">, ";
+ os << "TokenValidationCertificateIssuer = <"
+ << cfg.token_validation_cert_issuer << ">";
+ }
+ return os;
+}
+
+} // namespace remoting
« no previous file with comments | « remoting/host/third_party_auth_config.h ('k') | remoting/host/third_party_auth_config_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698