Index: chrome/common/extensions/manifest_handlers/sandboxed_page_info.cc |
diff --git a/chrome/common/extensions/manifest_handlers/sandboxed_page_info.cc b/chrome/common/extensions/manifest_handlers/sandboxed_page_info.cc |
deleted file mode 100644 |
index 12c2ed5f3d2dfbeb9cf0f2e1cf586ca83e7c9fb6..0000000000000000000000000000000000000000 |
--- a/chrome/common/extensions/manifest_handlers/sandboxed_page_info.cc |
+++ /dev/null |
@@ -1,122 +0,0 @@ |
-// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/common/extensions/manifest_handlers/sandboxed_page_info.h" |
- |
-#include "base/lazy_instance.h" |
-#include "base/memory/scoped_ptr.h" |
-#include "base/strings/string_number_conversions.h" |
-#include "base/strings/utf_string_conversions.h" |
-#include "base/values.h" |
-#include "chrome/common/extensions/csp_validator.h" |
-#include "extensions/common/error_utils.h" |
-#include "extensions/common/manifest_constants.h" |
-#include "extensions/common/url_pattern.h" |
- |
-namespace extensions { |
- |
-namespace { |
- |
-namespace keys = extensions::manifest_keys; |
-namespace errors = manifest_errors; |
- |
-const char kDefaultSandboxedPageContentSecurityPolicy[] = |
- "sandbox allow-scripts allow-forms allow-popups"; |
- |
-static base::LazyInstance<SandboxedPageInfo> g_empty_sandboxed_info = |
- LAZY_INSTANCE_INITIALIZER; |
- |
-const SandboxedPageInfo& GetSandboxedPageInfo(const Extension* extension) { |
- SandboxedPageInfo* info = static_cast<SandboxedPageInfo*>( |
- extension->GetManifestData(keys::kSandboxedPages)); |
- return info ? *info : g_empty_sandboxed_info.Get(); |
-} |
- |
-} // namespace |
- |
-SandboxedPageInfo::SandboxedPageInfo() { |
-} |
- |
-SandboxedPageInfo::~SandboxedPageInfo() { |
-} |
- |
-const std::string& SandboxedPageInfo::GetContentSecurityPolicy( |
- const Extension* extension) { |
- return GetSandboxedPageInfo(extension).content_security_policy; |
-} |
- |
-const URLPatternSet& SandboxedPageInfo::GetPages(const Extension* extension) { |
- return GetSandboxedPageInfo(extension).pages; |
-} |
- |
-bool SandboxedPageInfo::IsSandboxedPage(const Extension* extension, |
- const std::string& relative_path) { |
- return extension->ResourceMatches(GetPages(extension), relative_path); |
-} |
- |
-SandboxedPageHandler::SandboxedPageHandler() { |
-} |
- |
-SandboxedPageHandler::~SandboxedPageHandler() { |
-} |
- |
-bool SandboxedPageHandler::Parse(Extension* extension, string16* error) { |
- scoped_ptr<SandboxedPageInfo> sandboxed_info(new SandboxedPageInfo); |
- |
- const base::ListValue* list_value = NULL; |
- if (!extension->manifest()->GetList(keys::kSandboxedPages, &list_value)) { |
- *error = ASCIIToUTF16(errors::kInvalidSandboxedPagesList); |
- return false; |
- } |
- |
- for (size_t i = 0; i < list_value->GetSize(); ++i) { |
- std::string relative_path; |
- if (!list_value->GetString(i, &relative_path)) { |
- *error = ErrorUtils::FormatErrorMessageUTF16( |
- errors::kInvalidSandboxedPage, base::IntToString(i)); |
- return false; |
- } |
- URLPattern pattern(URLPattern::SCHEME_EXTENSION); |
- if (pattern.Parse(extension->url().spec()) != URLPattern::PARSE_SUCCESS) { |
- *error = ErrorUtils::FormatErrorMessageUTF16( |
- errors::kInvalidURLPatternError, extension->url().spec()); |
- return false; |
- } |
- while (relative_path[0] == '/') |
- relative_path = relative_path.substr(1, relative_path.length() - 1); |
- pattern.SetPath(pattern.path() + relative_path); |
- sandboxed_info->pages.AddPattern(pattern); |
- } |
- |
- if (extension->manifest()->HasPath(keys::kSandboxedPagesCSP)) { |
- if (!extension->manifest()->GetString( |
- keys::kSandboxedPagesCSP, |
- &sandboxed_info->content_security_policy)) { |
- *error = ASCIIToUTF16(errors::kInvalidSandboxedPagesCSP); |
- return false; |
- } |
- |
- if (!csp_validator::ContentSecurityPolicyIsLegal( |
- sandboxed_info->content_security_policy) || |
- !csp_validator::ContentSecurityPolicyIsSandboxed( |
- sandboxed_info->content_security_policy, extension->GetType())) { |
- *error = ASCIIToUTF16(errors::kInvalidSandboxedPagesCSP); |
- return false; |
- } |
- } else { |
- sandboxed_info->content_security_policy = |
- kDefaultSandboxedPageContentSecurityPolicy; |
- CHECK(csp_validator::ContentSecurityPolicyIsSandboxed( |
- sandboxed_info->content_security_policy, extension->GetType())); |
- } |
- |
- extension->SetManifestData(keys::kSandboxedPages, sandboxed_info.release()); |
- return true; |
-} |
- |
-const std::vector<std::string> SandboxedPageHandler::Keys() const { |
- return SingleKey(keys::kSandboxedPages); |
-} |
- |
-} // namespace extensions |