1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include "net/proxy/proxy_config.h" 6 7 #include "base/logging.h" 8 #include "base/strings/string_util.h" 9 #include "base/strings/string_tokenizer.h" 10 #include "base/values.h" 11 #include "net/proxy/proxy_info.h" 12 13 namespace net { 14 15 namespace { 16 17 // If |proxies| is non-empty, sets it in |dict| under the key |name|. 18 void AddProxyListToValue(const char* name, 19 const ProxyList& proxies, 20 base::DictionaryValue* dict) { 21 if (!proxies.IsEmpty()) 22 dict->Set(name, proxies.ToValue()); 23 } 24 25 // Split the |uri_list| on commas and add each entry to |proxy_list| in turn. 26 void AddProxyURIListToProxyList(std::string uri_list, 27 ProxyList* proxy_list, 28 ProxyServer::Scheme default_scheme) { 29 base::StringTokenizer proxy_uri_list(uri_list, ","); 30 while (proxy_uri_list.GetNext()) { 31 proxy_list->AddProxyServer( 32 ProxyServer::FromURI(proxy_uri_list.token(), default_scheme)); 33 } 34 } 35 36 } // namespace 37 38 ProxyConfig::ProxyRules::ProxyRules() 39 : reverse_bypass(false), 40 type(TYPE_NO_RULES) { 41 } 42 43 ProxyConfig::ProxyRules::~ProxyRules() { 44 } 45 46 void ProxyConfig::ProxyRules::Apply(const GURL& url, ProxyInfo* result) const { 47 if (empty()) { 48 result->UseDirect(); 49 return; 50 } 51 52 bool bypass_proxy = bypass_rules.Matches(url); 53 if (reverse_bypass) 54 bypass_proxy = !bypass_proxy; 55 if (bypass_proxy) { 56 result->UseDirectWithBypassedProxy(); 57 return; 58 } 59 60 switch (type) { 61 case ProxyRules::TYPE_SINGLE_PROXY: { 62 result->UseProxyList(single_proxies); 63 return; 64 } 65 case ProxyRules::TYPE_PROXY_PER_SCHEME: { 66 const ProxyList* entry = MapUrlSchemeToProxyList(url.scheme()); 67 if (entry) { 68 result->UseProxyList(*entry); 69 } else { 70 // We failed to find a matching proxy server for the current URL 71 // scheme. Default to direct. 72 result->UseDirect(); 73 } 74 return; 75 } 76 default: { 77 result->UseDirect(); 78 NOTREACHED(); 79 return; 80 } 81 } 82 } 83 84 void ProxyConfig::ProxyRules::ParseFromString(const std::string& proxy_rules) { 85 // Reset. 86 type = TYPE_NO_RULES; 87 single_proxies = ProxyList(); 88 proxies_for_http = ProxyList(); 89 proxies_for_https = ProxyList(); 90 proxies_for_ftp = ProxyList(); 91 fallback_proxies = ProxyList(); 92 93 base::StringTokenizer proxy_server_list(proxy_rules, ";"); 94 while (proxy_server_list.GetNext()) { 95 base::StringTokenizer proxy_server_for_scheme( 96 proxy_server_list.token_begin(), proxy_server_list.token_end(), "="); 97 98 while (proxy_server_for_scheme.GetNext()) { 99 std::string url_scheme = proxy_server_for_scheme.token(); 100 101 // If we fail to get the proxy server here, it means that 102 // this is a regular proxy server configuration, i.e. proxies 103 // are not configured per protocol. 104 if (!proxy_server_for_scheme.GetNext()) { 105 if (type == TYPE_PROXY_PER_SCHEME) 106 continue; // Unexpected. 107 AddProxyURIListToProxyList(url_scheme, 108 &single_proxies, 109 ProxyServer::SCHEME_HTTP); 110 type = TYPE_SINGLE_PROXY; 111 return; 112 } 113 114 // Trim whitespace off the url scheme. 115 base::TrimWhitespaceASCII(url_scheme, base::TRIM_ALL, &url_scheme); 116 117 // Add it to the per-scheme mappings (if supported scheme). 118 type = TYPE_PROXY_PER_SCHEME; 119 ProxyList* entry = MapUrlSchemeToProxyListNoFallback(url_scheme); 120 ProxyServer::Scheme default_scheme = ProxyServer::SCHEME_HTTP; 121 122 // socks=XXX is inconsistent with the other formats, since "socks" 123 // is not a URL scheme. Rather this means "for everything else, send 124 // it to the SOCKS proxy server XXX". 125 if (url_scheme == "socks") { 126 DCHECK(!entry); 127 entry = &fallback_proxies; 128 // Note that here 'socks' is understood to be SOCKS4, even though 129 // 'socks' maps to SOCKS5 in ProxyServer::GetSchemeFromURIInternal. 130 default_scheme = ProxyServer::SCHEME_SOCKS4; 131 } 132 133 if (entry) { 134 AddProxyURIListToProxyList(proxy_server_for_scheme.token(), 135 entry, 136 default_scheme); 137 } 138 } 139 } 140 } 141 142 const ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyList( 143 const std::string& url_scheme) const { 144 const ProxyList* proxy_server_list = const_cast<ProxyRules*>(this)-> 145 MapUrlSchemeToProxyListNoFallback(url_scheme); 146 if (proxy_server_list && !proxy_server_list->IsEmpty()) 147 return proxy_server_list; 148 if (url_scheme == "ws" || url_scheme == "wss") 149 return GetProxyListForWebSocketScheme(); 150 if (!fallback_proxies.IsEmpty()) 151 return &fallback_proxies; 152 return NULL; // No mapping for this scheme. Use direct. 153 } 154 155 bool ProxyConfig::ProxyRules::Equals(const ProxyRules& other) const { 156 return type == other.type && 157 single_proxies.Equals(other.single_proxies) && 158 proxies_for_http.Equals(other.proxies_for_http) && 159 proxies_for_https.Equals(other.proxies_for_https) && 160 proxies_for_ftp.Equals(other.proxies_for_ftp) && 161 fallback_proxies.Equals(other.fallback_proxies) && 162 bypass_rules.Equals(other.bypass_rules) && 163 reverse_bypass == other.reverse_bypass; 164 } 165 166 ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyListNoFallback( 167 const std::string& scheme) { 168 DCHECK_EQ(TYPE_PROXY_PER_SCHEME, type); 169 if (scheme == "http") 170 return &proxies_for_http; 171 if (scheme == "https") 172 return &proxies_for_https; 173 if (scheme == "ftp") 174 return &proxies_for_ftp; 175 return NULL; // No mapping for this scheme. 176 } 177 178 const ProxyList* ProxyConfig::ProxyRules::GetProxyListForWebSocketScheme() 179 const { 180 if (!fallback_proxies.IsEmpty()) 181 return &fallback_proxies; 182 if (!proxies_for_https.IsEmpty()) 183 return &proxies_for_https; 184 if (!proxies_for_http.IsEmpty()) 185 return &proxies_for_http; 186 return NULL; 187 } 188 189 ProxyConfig::ProxyConfig() 190 : auto_detect_(false), pac_mandatory_(false), 191 source_(PROXY_CONFIG_SOURCE_UNKNOWN), id_(kInvalidConfigID) { 192 } 193 194 ProxyConfig::ProxyConfig(const ProxyConfig& config) 195 : auto_detect_(config.auto_detect_), 196 pac_url_(config.pac_url_), 197 pac_mandatory_(config.pac_mandatory_), 198 proxy_rules_(config.proxy_rules_), 199 source_(config.source_), 200 id_(config.id_) { 201 } 202 203 ProxyConfig::~ProxyConfig() { 204 } 205 206 ProxyConfig& ProxyConfig::operator=(const ProxyConfig& config) { 207 auto_detect_ = config.auto_detect_; 208 pac_url_ = config.pac_url_; 209 pac_mandatory_ = config.pac_mandatory_; 210 proxy_rules_ = config.proxy_rules_; 211 source_ = config.source_; 212 id_ = config.id_; 213 return *this; 214 } 215 216 bool ProxyConfig::Equals(const ProxyConfig& other) const { 217 // The two configs can have different IDs and sources. We are just interested 218 // in if they have the same settings. 219 return auto_detect_ == other.auto_detect_ && 220 pac_url_ == other.pac_url_ && 221 pac_mandatory_ == other.pac_mandatory_ && 222 proxy_rules_.Equals(other.proxy_rules()); 223 } 224 225 bool ProxyConfig::HasAutomaticSettings() const { 226 return auto_detect_ || has_pac_url(); 227 } 228 229 void ProxyConfig::ClearAutomaticSettings() { 230 auto_detect_ = false; 231 pac_url_ = GURL(); 232 } 233 234 base::DictionaryValue* ProxyConfig::ToValue() const { 235 base::DictionaryValue* dict = new base::DictionaryValue(); 236 237 // Output the automatic settings. 238 if (auto_detect_) 239 dict->SetBoolean("auto_detect", auto_detect_); 240 if (has_pac_url()) { 241 dict->SetString("pac_url", pac_url_.possibly_invalid_spec()); 242 if (pac_mandatory_) 243 dict->SetBoolean("pac_mandatory", pac_mandatory_); 244 } 245 246 // Output the manual settings. 247 if (proxy_rules_.type != ProxyRules::TYPE_NO_RULES) { 248 switch (proxy_rules_.type) { 249 case ProxyRules::TYPE_SINGLE_PROXY: 250 AddProxyListToValue("single_proxy", 251 proxy_rules_.single_proxies, dict); 252 break; 253 case ProxyRules::TYPE_PROXY_PER_SCHEME: { 254 base::DictionaryValue* dict2 = new base::DictionaryValue(); 255 AddProxyListToValue("http", proxy_rules_.proxies_for_http, dict2); 256 AddProxyListToValue("https", proxy_rules_.proxies_for_https, dict2); 257 AddProxyListToValue("ftp", proxy_rules_.proxies_for_ftp, dict2); 258 AddProxyListToValue("fallback", proxy_rules_.fallback_proxies, dict2); 259 dict->Set("proxy_per_scheme", dict2); 260 break; 261 } 262 default: 263 NOTREACHED(); 264 } 265 266 // Output the bypass rules. 267 const ProxyBypassRules& bypass = proxy_rules_.bypass_rules; 268 if (!bypass.rules().empty()) { 269 if (proxy_rules_.reverse_bypass) 270 dict->SetBoolean("reverse_bypass", true); 271 272 base::ListValue* list = new base::ListValue(); 273 274 for (ProxyBypassRules::RuleList::const_iterator it = 275 bypass.rules().begin(); 276 it != bypass.rules().end(); ++it) { 277 list->Append(new base::StringValue((*it)->ToString())); 278 } 279 280 dict->Set("bypass_list", list); 281 } 282 } 283 284 // Output the source. 285 dict->SetString("source", ProxyConfigSourceToString(source_)); 286 287 return dict; 288 } 289 290 } // namespace net 291