summaryrefslogtreecommitdiff
path: root/chromium/net/proxy/proxy_config.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/proxy/proxy_config.cc')
-rw-r--r--chromium/net/proxy/proxy_config.cc277
1 files changed, 277 insertions, 0 deletions
diff --git a/chromium/net/proxy/proxy_config.cc b/chromium/net/proxy/proxy_config.cc
new file mode 100644
index 00000000000..c1fe0f5ceb4
--- /dev/null
+++ b/chromium/net/proxy/proxy_config.cc
@@ -0,0 +1,277 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/proxy/proxy_config.h"
+
+#include "base/logging.h"
+#include "base/strings/string_util.h"
+#include "base/strings/string_tokenizer.h"
+#include "base/values.h"
+#include "net/proxy/proxy_info.h"
+
+namespace net {
+
+namespace {
+
+// If |proxies| is non-empty, sets it in |dict| under the key |name|.
+void AddProxyListToValue(const char* name,
+ const ProxyList& proxies,
+ base::DictionaryValue* dict) {
+ if (!proxies.IsEmpty())
+ dict->Set(name, proxies.ToValue());
+}
+
+// Split the |uri_list| on commas and add each entry to |proxy_list| in turn.
+void AddProxyURIListToProxyList(std::string uri_list,
+ ProxyList* proxy_list,
+ ProxyServer::Scheme default_scheme) {
+ base::StringTokenizer proxy_uri_list(uri_list, ",");
+ while (proxy_uri_list.GetNext()) {
+ proxy_list->AddProxyServer(
+ ProxyServer::FromURI(proxy_uri_list.token(), default_scheme));
+ }
+}
+
+} // namespace
+
+ProxyConfig::ProxyRules::ProxyRules()
+ : reverse_bypass(false),
+ type(TYPE_NO_RULES) {
+}
+
+ProxyConfig::ProxyRules::~ProxyRules() {
+}
+
+void ProxyConfig::ProxyRules::Apply(const GURL& url, ProxyInfo* result) const {
+ if (empty()) {
+ result->UseDirect();
+ return;
+ }
+
+ bool bypass_proxy = bypass_rules.Matches(url);
+ if (reverse_bypass)
+ bypass_proxy = !bypass_proxy;
+ if (bypass_proxy) {
+ result->UseDirectWithBypassedProxy();
+ return;
+ }
+
+ switch (type) {
+ case ProxyRules::TYPE_SINGLE_PROXY: {
+ result->UseProxyList(single_proxies);
+ return;
+ }
+ case ProxyRules::TYPE_PROXY_PER_SCHEME: {
+ const ProxyList* entry = MapUrlSchemeToProxyList(url.scheme());
+ if (entry) {
+ result->UseProxyList(*entry);
+ } else {
+ // We failed to find a matching proxy server for the current URL
+ // scheme. Default to direct.
+ result->UseDirect();
+ }
+ return;
+ }
+ default: {
+ result->UseDirect();
+ NOTREACHED();
+ return;
+ }
+ }
+}
+
+void ProxyConfig::ProxyRules::ParseFromString(const std::string& proxy_rules) {
+ // Reset.
+ type = TYPE_NO_RULES;
+ single_proxies = ProxyList();
+ proxies_for_http = ProxyList();
+ proxies_for_https = ProxyList();
+ proxies_for_ftp = ProxyList();
+ fallback_proxies = ProxyList();
+
+ base::StringTokenizer proxy_server_list(proxy_rules, ";");
+ while (proxy_server_list.GetNext()) {
+ base::StringTokenizer proxy_server_for_scheme(
+ proxy_server_list.token_begin(), proxy_server_list.token_end(), "=");
+
+ while (proxy_server_for_scheme.GetNext()) {
+ std::string url_scheme = proxy_server_for_scheme.token();
+
+ // If we fail to get the proxy server here, it means that
+ // this is a regular proxy server configuration, i.e. proxies
+ // are not configured per protocol.
+ if (!proxy_server_for_scheme.GetNext()) {
+ if (type == TYPE_PROXY_PER_SCHEME)
+ continue; // Unexpected.
+ AddProxyURIListToProxyList(url_scheme,
+ &single_proxies,
+ ProxyServer::SCHEME_HTTP);
+ type = TYPE_SINGLE_PROXY;
+ return;
+ }
+
+ // Trim whitespace off the url scheme.
+ TrimWhitespaceASCII(url_scheme, TRIM_ALL, &url_scheme);
+
+ // Add it to the per-scheme mappings (if supported scheme).
+ type = TYPE_PROXY_PER_SCHEME;
+ ProxyList* entry = MapUrlSchemeToProxyListNoFallback(url_scheme);
+ ProxyServer::Scheme default_scheme = ProxyServer::SCHEME_HTTP;
+
+ // socks=XXX is inconsistent with the other formats, since "socks"
+ // is not a URL scheme. Rather this means "for everything else, send
+ // it to the SOCKS proxy server XXX".
+ if (url_scheme == "socks") {
+ DCHECK(!entry);
+ entry = &fallback_proxies;
+ // Note that here 'socks' is understood to be SOCKS4, even though
+ // 'socks' maps to SOCKS5 in ProxyServer::GetSchemeFromURIInternal.
+ default_scheme = ProxyServer::SCHEME_SOCKS4;
+ }
+
+ if (entry) {
+ AddProxyURIListToProxyList(proxy_server_for_scheme.token(),
+ entry,
+ default_scheme);
+ }
+ }
+ }
+}
+
+const ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyList(
+ const std::string& url_scheme) const {
+ const ProxyList* proxy_server_list = const_cast<ProxyRules*>(this)->
+ MapUrlSchemeToProxyListNoFallback(url_scheme);
+ if (proxy_server_list && !proxy_server_list->IsEmpty())
+ return proxy_server_list;
+ if (!fallback_proxies.IsEmpty())
+ return &fallback_proxies;
+ return NULL; // No mapping for this scheme. Use direct.
+}
+
+bool ProxyConfig::ProxyRules::Equals(const ProxyRules& other) const {
+ return type == other.type &&
+ single_proxies.Equals(other.single_proxies) &&
+ proxies_for_http.Equals(other.proxies_for_http) &&
+ proxies_for_https.Equals(other.proxies_for_https) &&
+ proxies_for_ftp.Equals(other.proxies_for_ftp) &&
+ fallback_proxies.Equals(other.fallback_proxies) &&
+ bypass_rules.Equals(other.bypass_rules) &&
+ reverse_bypass == other.reverse_bypass;
+}
+
+ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyListNoFallback(
+ const std::string& scheme) {
+ DCHECK_EQ(TYPE_PROXY_PER_SCHEME, type);
+ if (scheme == "http")
+ return &proxies_for_http;
+ if (scheme == "https")
+ return &proxies_for_https;
+ if (scheme == "ftp")
+ return &proxies_for_ftp;
+ return NULL; // No mapping for this scheme.
+}
+
+ProxyConfig::ProxyConfig()
+ : auto_detect_(false), pac_mandatory_(false),
+ source_(PROXY_CONFIG_SOURCE_UNKNOWN), id_(kInvalidConfigID) {
+}
+
+ProxyConfig::ProxyConfig(const ProxyConfig& config)
+ : auto_detect_(config.auto_detect_),
+ pac_url_(config.pac_url_),
+ pac_mandatory_(config.pac_mandatory_),
+ proxy_rules_(config.proxy_rules_),
+ source_(config.source_),
+ id_(config.id_) {
+}
+
+ProxyConfig::~ProxyConfig() {
+}
+
+ProxyConfig& ProxyConfig::operator=(const ProxyConfig& config) {
+ auto_detect_ = config.auto_detect_;
+ pac_url_ = config.pac_url_;
+ pac_mandatory_ = config.pac_mandatory_;
+ proxy_rules_ = config.proxy_rules_;
+ source_ = config.source_;
+ id_ = config.id_;
+ return *this;
+}
+
+bool ProxyConfig::Equals(const ProxyConfig& other) const {
+ // The two configs can have different IDs and sources. We are just interested
+ // in if they have the same settings.
+ return auto_detect_ == other.auto_detect_ &&
+ pac_url_ == other.pac_url_ &&
+ pac_mandatory_ == other.pac_mandatory_ &&
+ proxy_rules_.Equals(other.proxy_rules());
+}
+
+bool ProxyConfig::HasAutomaticSettings() const {
+ return auto_detect_ || has_pac_url();
+}
+
+void ProxyConfig::ClearAutomaticSettings() {
+ auto_detect_ = false;
+ pac_url_ = GURL();
+}
+
+base::DictionaryValue* ProxyConfig::ToValue() const {
+ base::DictionaryValue* dict = new base::DictionaryValue();
+
+ // Output the automatic settings.
+ if (auto_detect_)
+ dict->SetBoolean("auto_detect", auto_detect_);
+ if (has_pac_url()) {
+ dict->SetString("pac_url", pac_url_.possibly_invalid_spec());
+ if (pac_mandatory_)
+ dict->SetBoolean("pac_mandatory", pac_mandatory_);
+ }
+
+ // Output the manual settings.
+ if (proxy_rules_.type != ProxyRules::TYPE_NO_RULES) {
+ switch (proxy_rules_.type) {
+ case ProxyRules::TYPE_SINGLE_PROXY:
+ AddProxyListToValue("single_proxy",
+ proxy_rules_.single_proxies, dict);
+ break;
+ case ProxyRules::TYPE_PROXY_PER_SCHEME: {
+ base::DictionaryValue* dict2 = new base::DictionaryValue();
+ AddProxyListToValue("http", proxy_rules_.proxies_for_http, dict2);
+ AddProxyListToValue("https", proxy_rules_.proxies_for_https, dict2);
+ AddProxyListToValue("ftp", proxy_rules_.proxies_for_ftp, dict2);
+ AddProxyListToValue("fallback", proxy_rules_.fallback_proxies, dict2);
+ dict->Set("proxy_per_scheme", dict2);
+ break;
+ }
+ default:
+ NOTREACHED();
+ }
+
+ // Output the bypass rules.
+ const ProxyBypassRules& bypass = proxy_rules_.bypass_rules;
+ if (!bypass.rules().empty()) {
+ if (proxy_rules_.reverse_bypass)
+ dict->SetBoolean("reverse_bypass", true);
+
+ base::ListValue* list = new base::ListValue();
+
+ for (ProxyBypassRules::RuleList::const_iterator it =
+ bypass.rules().begin();
+ it != bypass.rules().end(); ++it) {
+ list->Append(new base::StringValue((*it)->ToString()));
+ }
+
+ dict->Set("bypass_list", list);
+ }
+ }
+
+ // Output the source.
+ dict->SetString("source", ProxyConfigSourceToString(source_));
+
+ return dict;
+}
+
+} // namespace net