OLD | NEW |
| (Empty) |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/common/extensions/api/sockets/sockets_handler.h" | |
6 | |
7 #include "base/memory/scoped_ptr.h" | |
8 #include "base/strings/utf_string_conversions.h" | |
9 #include "base/values.h" | |
10 #include "chrome/common/extensions/api/manifest_types.h" | |
11 #include "chrome/common/extensions/extension.h" | |
12 #include "chrome/common/extensions/permissions/permissions_data.h" | |
13 #include "chrome/common/extensions/permissions/socket_permission_data.h" | |
14 #include "extensions/common/error_utils.h" | |
15 #include "extensions/common/manifest_constants.h" | |
16 #include "extensions/common/permissions/api_permission_set.h" | |
17 | |
18 namespace extensions { | |
19 | |
20 namespace sockets_errors { | |
21 const char kErrorInvalidHostPattern[] = "Invalid host:port pattern '*'"; | |
22 } | |
23 | |
24 namespace keys = extensions::manifest_keys; | |
25 namespace errors = sockets_errors; | |
26 using api::manifest_types::Sockets; | |
27 | |
28 SocketsHandler::SocketsHandler() {} | |
29 | |
30 SocketsHandler::~SocketsHandler() {} | |
31 | |
32 bool SocketsHandler::Parse(Extension* extension, string16* error) { | |
33 const base::Value* sockets = NULL; | |
34 CHECK(extension->manifest()->Get(keys::kSockets, &sockets)); | |
35 std::vector<InstallWarning> install_warnings; | |
36 scoped_ptr<SocketsManifestData> data = | |
37 SocketsManifestData::FromValue(*sockets, | |
38 &install_warnings, | |
39 error); | |
40 if (!data) | |
41 return false; | |
42 | |
43 extension->AddInstallWarnings(install_warnings); | |
44 extension->SetManifestData(keys::kSockets, data.release()); | |
45 return true; | |
46 } | |
47 | |
48 const std::vector<std::string> SocketsHandler::Keys() const { | |
49 return SingleKey(manifest_keys::kSockets); | |
50 } | |
51 | |
52 SocketsManifestData::SocketsManifestData() {} | |
53 SocketsManifestData::~SocketsManifestData() {} | |
54 | |
55 // static | |
56 SocketsManifestData* SocketsManifestData::Get(const Extension* extension) { | |
57 return static_cast<SocketsManifestData*>( | |
58 extension->GetManifestData(keys::kSockets)); | |
59 } | |
60 | |
61 // static | |
62 bool SocketsManifestData::CheckRequest( | |
63 const Extension* extension, | |
64 const content::SocketPermissionRequest& request) { | |
65 SocketsManifestData* data = SocketsManifestData::Get(extension); | |
66 if (data == NULL) | |
67 return false; | |
68 | |
69 return data->CheckRequestImpl(extension, request); | |
70 } | |
71 | |
72 // static | |
73 scoped_ptr<SocketsManifestData> SocketsManifestData::FromValue( | |
74 const base::Value& value, | |
75 std::vector<InstallWarning>* install_warnings, | |
76 string16* error) { | |
77 scoped_ptr<Sockets> sockets = Sockets::FromValue(value, error); | |
78 if (!sockets) | |
79 return scoped_ptr<SocketsManifestData>(); | |
80 | |
81 scoped_ptr<SocketsManifestData> result(new SocketsManifestData()); | |
82 if (sockets->udp) { | |
83 if (!ParseHostPattern(result.get(), | |
84 content::SocketPermissionRequest::UDP_BIND, | |
85 sockets->udp->bind, | |
86 error)) { | |
87 return scoped_ptr<SocketsManifestData>(); | |
88 } | |
89 if (!ParseHostPattern(result.get(), | |
90 content::SocketPermissionRequest::UDP_SEND_TO, | |
91 sockets->udp->send, | |
92 error)) { | |
93 return scoped_ptr<SocketsManifestData>(); | |
94 } | |
95 if (!ParseHostPattern(result.get(), | |
96 content::SocketPermissionRequest::UDP_MULTICAST_MEMBERSHIP, | |
97 sockets->udp->multicast_membership, | |
98 error)) { | |
99 return scoped_ptr<SocketsManifestData>(); | |
100 } | |
101 } | |
102 if (sockets->tcp) { | |
103 if (!ParseHostPattern(result.get(), | |
104 content::SocketPermissionRequest::TCP_CONNECT, | |
105 sockets->tcp->connect, | |
106 error)) { | |
107 return scoped_ptr<SocketsManifestData>(); | |
108 } | |
109 } | |
110 if (sockets->tcp_server) { | |
111 if (!ParseHostPattern(result.get(), | |
112 content::SocketPermissionRequest::TCP_LISTEN, | |
113 sockets->tcp_server->listen, | |
114 error)) { | |
115 return scoped_ptr<SocketsManifestData>(); | |
116 } | |
117 } | |
118 return result.Pass(); | |
119 } | |
120 | |
121 // static | |
122 bool SocketsManifestData::ParseHostPattern( | |
123 SocketsManifestData* manifest_data, | |
124 content::SocketPermissionRequest::OperationType operation_type, | |
125 const scoped_ptr<std::string>& value, | |
126 string16* error) { | |
127 if (value) { | |
128 SocketPermissionEntry entry; | |
129 if (!SocketPermissionEntry::ParseHostPattern( | |
130 operation_type, *value, &entry)) { | |
131 *error = ErrorUtils::FormatErrorMessageUTF16( | |
132 errors::kErrorInvalidHostPattern, *value); | |
133 return false; | |
134 } | |
135 manifest_data->AddPermission(entry); | |
136 } | |
137 return true; | |
138 } | |
139 | |
140 void SocketsManifestData::AddPermission(const SocketPermissionEntry& entry) { | |
141 permissions_.insert(entry); | |
142 } | |
143 | |
144 bool SocketsManifestData::CheckRequestImpl( | |
145 const Extension* extension, | |
146 const content::SocketPermissionRequest& request) { | |
147 for (PermissionSet::const_iterator it = permissions_.begin(); | |
148 it != permissions_.end(); ++it) { | |
149 if (it->Check(request)) | |
150 return true; | |
151 } | |
152 return false; | |
153 } | |
154 | |
155 } // namespace extensions | |
OLD | NEW |