Home | History | Annotate | Download | only in proxy
      1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "net/proxy/proxy_list.h"
      6 
      7 #include "base/callback.h"
      8 #include "base/logging.h"
      9 #include "base/rand_util.h"
     10 #include "base/strings/string_tokenizer.h"
     11 #include "base/time/time.h"
     12 #include "base/values.h"
     13 #include "net/proxy/proxy_server.h"
     14 
     15 using base::TimeDelta;
     16 using base::TimeTicks;
     17 
     18 namespace net {
     19 
     20 ProxyList::ProxyList() {
     21 }
     22 
     23 ProxyList::~ProxyList() {
     24 }
     25 
     26 void ProxyList::Set(const std::string& proxy_uri_list) {
     27   proxies_.clear();
     28   base::StringTokenizer str_tok(proxy_uri_list, ";");
     29   while (str_tok.GetNext()) {
     30     ProxyServer uri = ProxyServer::FromURI(
     31         str_tok.token_begin(), str_tok.token_end(), ProxyServer::SCHEME_HTTP);
     32     // Silently discard malformed inputs.
     33     if (uri.is_valid())
     34       proxies_.push_back(uri);
     35   }
     36 }
     37 
     38 void ProxyList::SetSingleProxyServer(const ProxyServer& proxy_server) {
     39   proxies_.clear();
     40   AddProxyServer(proxy_server);
     41 }
     42 
     43 void ProxyList::AddProxyServer(const ProxyServer& proxy_server) {
     44   if (proxy_server.is_valid())
     45     proxies_.push_back(proxy_server);
     46 }
     47 
     48 void ProxyList::DeprioritizeBadProxies(
     49     const ProxyRetryInfoMap& proxy_retry_info) {
     50   // Partition the proxy list in two:
     51   //   (1) the known bad proxies
     52   //   (2) everything else
     53   std::vector<ProxyServer> good_proxies;
     54   std::vector<ProxyServer> bad_proxies;
     55 
     56   std::vector<ProxyServer>::const_iterator iter = proxies_.begin();
     57   for (; iter != proxies_.end(); ++iter) {
     58     ProxyRetryInfoMap::const_iterator bad_proxy =
     59         proxy_retry_info.find(iter->ToURI());
     60     if (bad_proxy != proxy_retry_info.end()) {
     61       // This proxy is bad. Check if it's time to retry.
     62       if (bad_proxy->second.bad_until >= TimeTicks::Now()) {
     63         // still invalid.
     64         bad_proxies.push_back(*iter);
     65         continue;
     66       }
     67     }
     68     good_proxies.push_back(*iter);
     69   }
     70 
     71   // "proxies_ = good_proxies + bad_proxies"
     72   proxies_.swap(good_proxies);
     73   proxies_.insert(proxies_.end(), bad_proxies.begin(), bad_proxies.end());
     74 }
     75 
     76 bool ProxyList::HasUntriedProxies(
     77     const ProxyRetryInfoMap& proxy_retry_info) const {
     78   std::vector<ProxyServer>::const_iterator iter = proxies_.begin();
     79   for (; iter != proxies_.end(); ++iter) {
     80     ProxyRetryInfoMap::const_iterator bad_proxy =
     81         proxy_retry_info.find(iter->ToURI());
     82     if (bad_proxy != proxy_retry_info.end()) {
     83       // This proxy is bad. Check if it's time to retry.
     84       if (bad_proxy->second.bad_until >= TimeTicks::Now()) {
     85         continue;
     86       }
     87     }
     88     // Either we've found the entry in the retry map and it's expired or we
     89     // didn't find a corresponding entry in the retry map. In either case, we
     90     // have a proxy to try.
     91     return true;
     92   }
     93   return false;
     94 }
     95 
     96 void ProxyList::RemoveProxiesWithoutScheme(int scheme_bit_field) {
     97   for (std::vector<ProxyServer>::iterator it = proxies_.begin();
     98        it != proxies_.end(); ) {
     99     if (!(scheme_bit_field & it->scheme())) {
    100       it = proxies_.erase(it);
    101       continue;
    102     }
    103     ++it;
    104   }
    105 }
    106 
    107 void ProxyList::Clear() {
    108   proxies_.clear();
    109 }
    110 
    111 bool ProxyList::IsEmpty() const {
    112   return proxies_.empty();
    113 }
    114 
    115 size_t ProxyList::size() const {
    116   return proxies_.size();
    117 }
    118 
    119 // Returns true if |*this| lists the same proxies as |other|.
    120 bool ProxyList::Equals(const ProxyList& other) const {
    121   if (size() != other.size())
    122     return false;
    123   return proxies_ == other.proxies_;
    124 }
    125 
    126 const ProxyServer& ProxyList::Get() const {
    127   DCHECK(!proxies_.empty());
    128   return proxies_[0];
    129 }
    130 
    131 void ProxyList::SetFromPacString(const std::string& pac_string) {
    132   base::StringTokenizer entry_tok(pac_string, ";");
    133   proxies_.clear();
    134   while (entry_tok.GetNext()) {
    135     ProxyServer uri = ProxyServer::FromPacString(
    136         entry_tok.token_begin(), entry_tok.token_end());
    137     // Silently discard malformed inputs.
    138     if (uri.is_valid())
    139       proxies_.push_back(uri);
    140   }
    141 
    142   // If we failed to parse anything from the PAC results list, fallback to
    143   // DIRECT (this basically means an error in the PAC script).
    144   if (proxies_.empty()) {
    145     proxies_.push_back(ProxyServer::Direct());
    146   }
    147 }
    148 
    149 std::string ProxyList::ToPacString() const {
    150   std::string proxy_list;
    151   std::vector<ProxyServer>::const_iterator iter = proxies_.begin();
    152   for (; iter != proxies_.end(); ++iter) {
    153     if (!proxy_list.empty())
    154       proxy_list += ";";
    155     proxy_list += iter->ToPacString();
    156   }
    157   return proxy_list.empty() ? std::string() : proxy_list;
    158 }
    159 
    160 base::ListValue* ProxyList::ToValue() const {
    161   base::ListValue* list = new base::ListValue();
    162   for (size_t i = 0; i < proxies_.size(); ++i)
    163     list->AppendString(proxies_[i].ToURI());
    164   return list;
    165 }
    166 
    167 bool ProxyList::Fallback(ProxyRetryInfoMap* proxy_retry_info,
    168                          const BoundNetLog& net_log) {
    169 
    170   // TODO(eroman): It would be good if instead of removing failed proxies
    171   // from the list, we simply annotated them with the error code they failed
    172   // with. Of course, ProxyService::ReconsiderProxyAfterError() would need to
    173   // be given this information by the network transaction.
    174   //
    175   // The advantage of this approach is when the network transaction
    176   // fails, we could output the full list of proxies that were attempted, and
    177   // why each one of those failed (as opposed to just the last failure).
    178   //
    179   // And also, before failing the transaction wholesale, we could go back and
    180   // retry the "bad proxies" which we never tried to begin with.
    181   // (RemoveBadProxies would annotate them as 'expected bad' rather then delete
    182   // them from the list, so we would know what they were).
    183 
    184   if (proxies_.empty()) {
    185     NOTREACHED();
    186     return false;
    187   }
    188   UpdateRetryInfoOnFallback(proxy_retry_info, base::TimeDelta(), ProxyServer(),
    189                             net_log);
    190 
    191   // Remove this proxy from our list.
    192   proxies_.erase(proxies_.begin());
    193   return !proxies_.empty();
    194 }
    195 
    196 void ProxyList::AddProxyToRetryList(ProxyRetryInfoMap* proxy_retry_info,
    197                                     base::TimeDelta retry_delay,
    198                                     const std::string& proxy_key,
    199                                     const BoundNetLog& net_log) const {
    200   // Mark this proxy as bad.
    201   ProxyRetryInfoMap::iterator iter = proxy_retry_info->find(proxy_key);
    202   if (iter != proxy_retry_info->end()) {
    203     // TODO(nsylvain): This is not the first time we get this. We should
    204     // double the retry time. Bug 997660.
    205     iter->second.bad_until = TimeTicks::Now() + iter->second.current_delay;
    206   } else {
    207     ProxyRetryInfo retry_info;
    208     retry_info.current_delay = retry_delay;
    209     retry_info.bad_until = TimeTicks().Now() + retry_info.current_delay;
    210     (*proxy_retry_info)[proxy_key] = retry_info;
    211   }
    212   net_log.AddEvent(NetLog::TYPE_PROXY_LIST_FALLBACK,
    213                    NetLog::StringCallback("bad_proxy", &proxy_key));
    214 }
    215 
    216 void ProxyList::UpdateRetryInfoOnFallback(
    217     ProxyRetryInfoMap* proxy_retry_info,
    218     base::TimeDelta retry_delay,
    219     const ProxyServer& another_proxy_to_bypass,
    220     const BoundNetLog& net_log) const {
    221   // Time to wait before retrying a bad proxy server.
    222   if (retry_delay == base::TimeDelta()) {
    223 #if defined(SPDY_PROXY_AUTH_ORIGIN)
    224     // Randomize the timeout over a range from one to five minutes.
    225     retry_delay =
    226         TimeDelta::FromMilliseconds(
    227             base::RandInt(1 * 60 * 1000, 5 * 60 * 1000));
    228 #else
    229     retry_delay = TimeDelta::FromMinutes(5);
    230 #endif
    231   }
    232 
    233   if (proxies_.empty()) {
    234     NOTREACHED();
    235     return;
    236   }
    237 
    238   if (!proxies_[0].is_direct()) {
    239     std::string key = proxies_[0].ToURI();
    240     AddProxyToRetryList(proxy_retry_info, retry_delay, key, net_log);
    241 
    242     // If additional proxies to bypass are specified, add these to the retry
    243     // map as well.
    244     if (another_proxy_to_bypass.is_valid()) {
    245       // Start at index 1 because index 0 is already handled above.
    246       for (size_t j = 1; j < proxies_.size(); ++j) {
    247         if (proxies_[j].is_direct())
    248           break;
    249         if (another_proxy_to_bypass == proxies_[j]) {
    250           key = proxies_[j].ToURI();
    251           AddProxyToRetryList(proxy_retry_info, retry_delay, key, net_log);
    252         }
    253       }
    254     }
    255   }
    256 }
    257 
    258 }  // namespace net
    259