blob: 536662045d69035a7c48d86e6e85e98b6a492053 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
|
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/extensions/api/messaging/native_messaging_host_manifest.h"
#include "base/json/json_file_value_serializer.h"
#include "base/logging.h"
#include "base/values.h"
namespace extensions {
NativeMessagingHostManifest::~NativeMessagingHostManifest() {}
// static
bool NativeMessagingHostManifest::IsValidName(const std::string& name) {
if (name.empty()) {
return false;
}
for (size_t i = 0; i < name.size(); ++i) {
char c = name[i];
// Verify that only the following characters are used: [a-z0-9._].
if (!((c >= 'a' && c <= 'z') || (c >= '0' && c <= '9') ||
c == '.' || c == '_')) {
return false;
}
// Verify that dots are separated by other characters and that string
// doesn't begin or end with a dot.
if (c == '.' && (i == 0 || name[i - 1] == '.' || i == name.size() - 1)) {
return false;
}
}
return true;
}
// static
scoped_ptr<NativeMessagingHostManifest> NativeMessagingHostManifest::Load(
const base::FilePath& file_path,
std::string* error_message) {
DCHECK(error_message);
JSONFileValueSerializer serializer(file_path);
scoped_ptr<base::Value> parsed(serializer.Deserialize(NULL, error_message));
if (!parsed) {
return scoped_ptr<NativeMessagingHostManifest>();
}
base::DictionaryValue* dictionary;
if (!parsed->GetAsDictionary(&dictionary)) {
*error_message = "Invalid manifest file.";
return scoped_ptr<NativeMessagingHostManifest>();
}
scoped_ptr<NativeMessagingHostManifest> result(
new NativeMessagingHostManifest());
if (!result->Parse(dictionary, error_message)) {
return scoped_ptr<NativeMessagingHostManifest>();
}
return result.Pass();
}
NativeMessagingHostManifest::NativeMessagingHostManifest() {
}
bool NativeMessagingHostManifest::Parse(base::DictionaryValue* dictionary,
std::string* error_message) {
if (!dictionary->GetString("name", &name_) ||
!IsValidName(name_)) {
*error_message = "Invalid value for name.";
return false;
}
if (!dictionary->GetString("description", &description_) ||
description_.empty()) {
*error_message = "Invalid value for description.";
return false;
}
std::string type;
// stdio is the only host type that's currently supported.
if (!dictionary->GetString("type", &type) ||
type != "stdio") {
*error_message = "Invalid value for type.";
return false;
}
interface_ = HOST_INTERFACE_STDIO;
std::string path;
// JSON parsed checks that all strings are valid UTF8.
if (!dictionary->GetString("path", &path) ||
(path_ = base::FilePath::FromUTF8Unsafe(path)).empty()) {
*error_message = "Invalid value for path.";
return false;
}
const base::ListValue* allowed_origins_list;
if (!dictionary->GetList("allowed_origins", &allowed_origins_list)) {
*error_message =
"Invalid value for allowed_origins. Expected a list of strings.";
return false;
}
allowed_origins_.ClearPatterns();
for (base::ListValue::const_iterator it = allowed_origins_list->begin();
it != allowed_origins_list->end(); ++it) {
std::string pattern_string;
if (!(*it)->GetAsString(&pattern_string)) {
*error_message = "allowed_origins must be list of strings.";
return false;
}
URLPattern pattern(URLPattern::SCHEME_EXTENSION);
URLPattern::ParseResult result = pattern.Parse(pattern_string);
if (result != URLPattern::PARSE_SUCCESS) {
*error_message = "Failed to parse pattern \"" + pattern_string +
"\": " + URLPattern::GetParseResultString(result);
return false;
}
// Disallow patterns that are too broad. Set of allowed origins must be a
// fixed list of extensions.
if (pattern.match_all_urls() || pattern.match_subdomains()) {
*error_message = "Pattern \"" + pattern_string + "\" is not allowed.";
return false;
}
allowed_origins_.AddPattern(pattern);
}
return true;
}
} // namespace extensions
|