File: origin_matcher_mojom_traits.cc

package info (click to toggle)
chromium 138.0.7204.183-1~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm-proposed-updates
  • size: 6,080,960 kB
  • sloc: cpp: 34,937,079; ansic: 7,176,967; javascript: 4,110,704; python: 1,419,954; asm: 946,768; xml: 739,971; pascal: 187,324; sh: 89,623; perl: 88,663; objc: 79,944; sql: 50,304; cs: 41,786; fortran: 24,137; makefile: 21,811; php: 13,980; tcl: 13,166; yacc: 8,925; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (84 lines) | stat: -rw-r--r-- 3,022 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
// Copyright 2020 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "components/js_injection/common/origin_matcher_mojom_traits.h"

#include "base/strings/pattern.h"
#include "components/js_injection/common/origin_matcher_internal.h"
#include "net/base/ip_address.h"
#include "net/base/ip_endpoint.h"
#include "net/base/parse_number.h"
#include "net/base/scheme_host_port_matcher_rule.h"
#include "net/base/url_util.h"
#include "url/gurl.h"
#include "url/origin.h"
#include "url/url_constants.h"
#include "url/url_util.h"

namespace mojo {

using js_injection::SubdomainMatchingRule;
using js_injection::mojom::OriginMatcherRuleDataView;

// static
js_injection::mojom::SubdomainMatchingRulePtr
StructTraits<OriginMatcherRuleDataView, OriginMatcherRuleUniquePtr>::
    subdomain_matching_rule(const OriginMatcherRuleUniquePtr& rule) {
  if (rule->type() == js_injection::OriginMatcherRuleType::kAny)
    return nullptr;

  DCHECK_EQ(js_injection::OriginMatcherRuleType::kSubdomain, rule->type());
  const SubdomainMatchingRule* matching_rule =
      static_cast<SubdomainMatchingRule*>(rule.get());
  js_injection::mojom::SubdomainMatchingRulePtr matching_rule_ptr(
      js_injection::mojom::SubdomainMatchingRule::New());

  matching_rule_ptr->scheme = matching_rule->scheme();
  matching_rule_ptr->optional_host = matching_rule->optional_host();
  matching_rule_ptr->optional_port = matching_rule->optional_port();
  return matching_rule_ptr;
}

// static
bool StructTraits<OriginMatcherRuleDataView, OriginMatcherRuleUniquePtr>::Read(
    OriginMatcherRuleDataView r,
    OriginMatcherRuleUniquePtr* out) {
  DCHECK(!out->get());

  js_injection::mojom::SubdomainMatchingRuleDataView
      subdomain_matching_rule_data_view;
  r.GetSubdomainMatchingRuleDataView(&subdomain_matching_rule_data_view);
  if (subdomain_matching_rule_data_view.is_null()) {
    *out = std::make_unique<js_injection::MatchAllOriginsRule>();
    return true;
  }

  js_injection::mojom::SubdomainMatchingRulePtr subdomain_matching_rule;
  if (!r.ReadSubdomainMatchingRule(&subdomain_matching_rule))
    return false;
  if (!SubdomainMatchingRule::IsValidScheme(subdomain_matching_rule->scheme) ||
      !SubdomainMatchingRule::IsValidSchemeAndHost(
          subdomain_matching_rule->scheme,
          subdomain_matching_rule->optional_host)) {
    return false;
  }
  *out = std::make_unique<SubdomainMatchingRule>(
      subdomain_matching_rule->scheme, subdomain_matching_rule->optional_host,
      subdomain_matching_rule->optional_port);
  return true;
}

// static
bool StructTraits<js_injection::mojom::OriginMatcherDataView,
                  js_injection::OriginMatcher>::
    Read(js_injection::mojom::OriginMatcherDataView data,
         js_injection::OriginMatcher* out) {
  std::vector<OriginMatcherRuleUniquePtr> rules;
  if (!data.ReadRules(&rules))
    return false;
  out->SetRules(std::move(rules));
  return true;
}

}  // namespace mojo