• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "net/proxy/proxy_config.h"
6 
7 #include "base/logging.h"
8 #include "base/strings/string_util.h"
9 #include "base/strings/string_tokenizer.h"
10 #include "base/values.h"
11 #include "net/proxy/proxy_info.h"
12 
13 namespace net {
14 
15 namespace {
16 
17 // If |proxies| is non-empty, sets it in |dict| under the key |name|.
AddProxyListToValue(const char * name,const ProxyList & proxies,base::DictionaryValue * dict)18 void AddProxyListToValue(const char* name,
19                          const ProxyList& proxies,
20                          base::DictionaryValue* dict) {
21   if (!proxies.IsEmpty())
22     dict->Set(name, proxies.ToValue());
23 }
24 
25 // Split the |uri_list| on commas and add each entry to |proxy_list| in turn.
AddProxyURIListToProxyList(std::string uri_list,ProxyList * proxy_list,ProxyServer::Scheme default_scheme)26 void AddProxyURIListToProxyList(std::string uri_list,
27                                 ProxyList* proxy_list,
28                                 ProxyServer::Scheme default_scheme) {
29   base::StringTokenizer proxy_uri_list(uri_list, ",");
30   while (proxy_uri_list.GetNext()) {
31     proxy_list->AddProxyServer(
32         ProxyServer::FromURI(proxy_uri_list.token(), default_scheme));
33   }
34 }
35 
36 }  // namespace
37 
ProxyRules()38 ProxyConfig::ProxyRules::ProxyRules()
39     : reverse_bypass(false),
40       type(TYPE_NO_RULES) {
41 }
42 
~ProxyRules()43 ProxyConfig::ProxyRules::~ProxyRules() {
44 }
45 
Apply(const GURL & url,ProxyInfo * result) const46 void ProxyConfig::ProxyRules::Apply(const GURL& url, ProxyInfo* result) const {
47   if (empty()) {
48     result->UseDirect();
49     return;
50   }
51 
52   bool bypass_proxy = bypass_rules.Matches(url);
53   if (reverse_bypass)
54     bypass_proxy = !bypass_proxy;
55   if (bypass_proxy) {
56     result->UseDirectWithBypassedProxy();
57     return;
58   }
59 
60   switch (type) {
61     case ProxyRules::TYPE_SINGLE_PROXY: {
62       result->UseProxyList(single_proxies);
63       return;
64     }
65     case ProxyRules::TYPE_PROXY_PER_SCHEME: {
66       const ProxyList* entry = MapUrlSchemeToProxyList(url.scheme());
67       if (entry) {
68         result->UseProxyList(*entry);
69       } else {
70         // We failed to find a matching proxy server for the current URL
71         // scheme. Default to direct.
72         result->UseDirect();
73       }
74       return;
75     }
76     default: {
77       result->UseDirect();
78       NOTREACHED();
79       return;
80     }
81   }
82 }
83 
ParseFromString(const std::string & proxy_rules)84 void ProxyConfig::ProxyRules::ParseFromString(const std::string& proxy_rules) {
85   // Reset.
86   type = TYPE_NO_RULES;
87   single_proxies = ProxyList();
88   proxies_for_http = ProxyList();
89   proxies_for_https = ProxyList();
90   proxies_for_ftp = ProxyList();
91   fallback_proxies = ProxyList();
92 
93   base::StringTokenizer proxy_server_list(proxy_rules, ";");
94   while (proxy_server_list.GetNext()) {
95     base::StringTokenizer proxy_server_for_scheme(
96         proxy_server_list.token_begin(), proxy_server_list.token_end(), "=");
97 
98     while (proxy_server_for_scheme.GetNext()) {
99       std::string url_scheme = proxy_server_for_scheme.token();
100 
101       // If we fail to get the proxy server here, it means that
102       // this is a regular proxy server configuration, i.e. proxies
103       // are not configured per protocol.
104       if (!proxy_server_for_scheme.GetNext()) {
105         if (type == TYPE_PROXY_PER_SCHEME)
106           continue;  // Unexpected.
107         AddProxyURIListToProxyList(url_scheme,
108                                    &single_proxies,
109                                    ProxyServer::SCHEME_HTTP);
110         type = TYPE_SINGLE_PROXY;
111         return;
112       }
113 
114       // Trim whitespace off the url scheme.
115       base::TrimWhitespaceASCII(url_scheme, base::TRIM_ALL, &url_scheme);
116 
117       // Add it to the per-scheme mappings (if supported scheme).
118       type = TYPE_PROXY_PER_SCHEME;
119       ProxyList* entry = MapUrlSchemeToProxyListNoFallback(url_scheme);
120       ProxyServer::Scheme default_scheme = ProxyServer::SCHEME_HTTP;
121 
122       // socks=XXX is inconsistent with the other formats, since "socks"
123       // is not a URL scheme. Rather this means "for everything else, send
124       // it to the SOCKS proxy server XXX".
125       if (url_scheme == "socks") {
126         DCHECK(!entry);
127         entry = &fallback_proxies;
128         // Note that here 'socks' is understood to be SOCKS4, even though
129         // 'socks' maps to SOCKS5 in ProxyServer::GetSchemeFromURIInternal.
130         default_scheme = ProxyServer::SCHEME_SOCKS4;
131       }
132 
133       if (entry) {
134         AddProxyURIListToProxyList(proxy_server_for_scheme.token(),
135                                    entry,
136                                    default_scheme);
137       }
138     }
139   }
140 }
141 
MapUrlSchemeToProxyList(const std::string & url_scheme) const142 const ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyList(
143     const std::string& url_scheme) const {
144   const ProxyList* proxy_server_list = const_cast<ProxyRules*>(this)->
145       MapUrlSchemeToProxyListNoFallback(url_scheme);
146   if (proxy_server_list && !proxy_server_list->IsEmpty())
147     return proxy_server_list;
148   if (url_scheme == "ws" || url_scheme == "wss")
149     return GetProxyListForWebSocketScheme();
150   if (!fallback_proxies.IsEmpty())
151     return &fallback_proxies;
152   return NULL;  // No mapping for this scheme. Use direct.
153 }
154 
Equals(const ProxyRules & other) const155 bool ProxyConfig::ProxyRules::Equals(const ProxyRules& other) const {
156   return type == other.type &&
157          single_proxies.Equals(other.single_proxies) &&
158          proxies_for_http.Equals(other.proxies_for_http) &&
159          proxies_for_https.Equals(other.proxies_for_https) &&
160          proxies_for_ftp.Equals(other.proxies_for_ftp) &&
161          fallback_proxies.Equals(other.fallback_proxies) &&
162          bypass_rules.Equals(other.bypass_rules) &&
163          reverse_bypass == other.reverse_bypass;
164 }
165 
MapUrlSchemeToProxyListNoFallback(const std::string & scheme)166 ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyListNoFallback(
167     const std::string& scheme) {
168   DCHECK_EQ(TYPE_PROXY_PER_SCHEME, type);
169   if (scheme == "http")
170     return &proxies_for_http;
171   if (scheme == "https")
172     return &proxies_for_https;
173   if (scheme == "ftp")
174     return &proxies_for_ftp;
175   return NULL;  // No mapping for this scheme.
176 }
177 
GetProxyListForWebSocketScheme() const178 const ProxyList* ProxyConfig::ProxyRules::GetProxyListForWebSocketScheme()
179     const {
180   if (!fallback_proxies.IsEmpty())
181     return &fallback_proxies;
182   if (!proxies_for_https.IsEmpty())
183     return &proxies_for_https;
184   if (!proxies_for_http.IsEmpty())
185     return &proxies_for_http;
186   return NULL;
187 }
188 
ProxyConfig()189 ProxyConfig::ProxyConfig()
190     : auto_detect_(false), pac_mandatory_(false),
191       source_(PROXY_CONFIG_SOURCE_UNKNOWN), id_(kInvalidConfigID)  {
192 }
193 
ProxyConfig(const ProxyConfig & config)194 ProxyConfig::ProxyConfig(const ProxyConfig& config)
195     : auto_detect_(config.auto_detect_),
196       pac_url_(config.pac_url_),
197       pac_mandatory_(config.pac_mandatory_),
198       proxy_rules_(config.proxy_rules_),
199       source_(config.source_),
200       id_(config.id_) {
201 }
202 
~ProxyConfig()203 ProxyConfig::~ProxyConfig() {
204 }
205 
operator =(const ProxyConfig & config)206 ProxyConfig& ProxyConfig::operator=(const ProxyConfig& config) {
207   auto_detect_ = config.auto_detect_;
208   pac_url_ = config.pac_url_;
209   pac_mandatory_ = config.pac_mandatory_;
210   proxy_rules_ = config.proxy_rules_;
211   source_ = config.source_;
212   id_ = config.id_;
213   return *this;
214 }
215 
Equals(const ProxyConfig & other) const216 bool ProxyConfig::Equals(const ProxyConfig& other) const {
217   // The two configs can have different IDs and sources.  We are just interested
218   // in if they have the same settings.
219   return auto_detect_ == other.auto_detect_ &&
220          pac_url_ == other.pac_url_ &&
221          pac_mandatory_ == other.pac_mandatory_ &&
222          proxy_rules_.Equals(other.proxy_rules());
223 }
224 
HasAutomaticSettings() const225 bool ProxyConfig::HasAutomaticSettings() const {
226   return auto_detect_ || has_pac_url();
227 }
228 
ClearAutomaticSettings()229 void ProxyConfig::ClearAutomaticSettings() {
230   auto_detect_ = false;
231   pac_url_ = GURL();
232 }
233 
ToValue() const234 base::DictionaryValue* ProxyConfig::ToValue() const {
235   base::DictionaryValue* dict = new base::DictionaryValue();
236 
237   // Output the automatic settings.
238   if (auto_detect_)
239     dict->SetBoolean("auto_detect", auto_detect_);
240   if (has_pac_url()) {
241     dict->SetString("pac_url", pac_url_.possibly_invalid_spec());
242     if (pac_mandatory_)
243       dict->SetBoolean("pac_mandatory", pac_mandatory_);
244   }
245 
246   // Output the manual settings.
247   if (proxy_rules_.type != ProxyRules::TYPE_NO_RULES) {
248     switch (proxy_rules_.type) {
249       case ProxyRules::TYPE_SINGLE_PROXY:
250         AddProxyListToValue("single_proxy",
251                             proxy_rules_.single_proxies, dict);
252         break;
253       case ProxyRules::TYPE_PROXY_PER_SCHEME: {
254         base::DictionaryValue* dict2 = new base::DictionaryValue();
255         AddProxyListToValue("http", proxy_rules_.proxies_for_http, dict2);
256         AddProxyListToValue("https", proxy_rules_.proxies_for_https, dict2);
257         AddProxyListToValue("ftp", proxy_rules_.proxies_for_ftp, dict2);
258         AddProxyListToValue("fallback", proxy_rules_.fallback_proxies, dict2);
259         dict->Set("proxy_per_scheme", dict2);
260         break;
261       }
262       default:
263         NOTREACHED();
264     }
265 
266     // Output the bypass rules.
267     const ProxyBypassRules& bypass = proxy_rules_.bypass_rules;
268     if (!bypass.rules().empty()) {
269       if (proxy_rules_.reverse_bypass)
270         dict->SetBoolean("reverse_bypass", true);
271 
272       base::ListValue* list = new base::ListValue();
273 
274       for (ProxyBypassRules::RuleList::const_iterator it =
275               bypass.rules().begin();
276            it != bypass.rules().end(); ++it) {
277         list->Append(new base::StringValue((*it)->ToString()));
278       }
279 
280       dict->Set("bypass_list", list);
281     }
282   }
283 
284   // Output the source.
285   dict->SetString("source", ProxyConfigSourceToString(source_));
286 
287   return dict;
288 }
289 
290 }  // namespace net
291