123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286 |
- // Copyright (c) 2012 The Chromium Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style license that can be
- // found in the LICENSE file.
- #include "net/proxy_resolution/proxy_config.h"
- #include <memory>
- #include <utility>
- #include "base/check_op.h"
- #include "base/notreached.h"
- #include "base/strings/string_tokenizer.h"
- #include "base/strings/string_util.h"
- #include "base/values.h"
- #include "net/base/proxy_server.h"
- #include "net/base/proxy_string_util.h"
- #include "net/proxy_resolution/proxy_info.h"
- namespace net {
- namespace {
- // If |proxies| is non-empty, sets it in |dict| under the key |name|.
- void AddProxyListToValue(const char* name,
- const ProxyList& proxies,
- base::Value::Dict* dict) {
- if (!proxies.IsEmpty())
- dict->Set(name, proxies.ToValue());
- }
- // Split the |uri_list| on commas and add each entry to |proxy_list| in turn.
- void AddProxyURIListToProxyList(std::string uri_list,
- ProxyList* proxy_list,
- ProxyServer::Scheme default_scheme) {
- base::StringTokenizer proxy_uri_list(uri_list, ",");
- while (proxy_uri_list.GetNext()) {
- proxy_list->AddProxyServer(
- ProxyUriToProxyServer(proxy_uri_list.token(), default_scheme));
- }
- }
- } // namespace
- ProxyConfig::ProxyRules::ProxyRules() = default;
- ProxyConfig::ProxyRules::ProxyRules(const ProxyRules& other) = default;
- ProxyConfig::ProxyRules::~ProxyRules() = default;
- void ProxyConfig::ProxyRules::Apply(const GURL& url, ProxyInfo* result) const {
- if (empty()) {
- result->UseDirect();
- return;
- }
- if (bypass_rules.Matches(url, reverse_bypass)) {
- result->UseDirectWithBypassedProxy();
- return;
- }
- switch (type) {
- case ProxyRules::Type::PROXY_LIST: {
- result->UseProxyList(single_proxies);
- return;
- }
- case ProxyRules::Type::PROXY_LIST_PER_SCHEME: {
- const ProxyList* entry = MapUrlSchemeToProxyList(url.scheme());
- if (entry) {
- result->UseProxyList(*entry);
- } else {
- // We failed to find a matching proxy server for the current URL
- // scheme. Default to direct.
- result->UseDirect();
- }
- return;
- }
- default: {
- result->UseDirect();
- NOTREACHED();
- return;
- }
- }
- }
- void ProxyConfig::ProxyRules::ParseFromString(const std::string& proxy_rules) {
- // Reset.
- type = Type::EMPTY;
- single_proxies = ProxyList();
- proxies_for_http = ProxyList();
- proxies_for_https = ProxyList();
- proxies_for_ftp = ProxyList();
- fallback_proxies = ProxyList();
- base::StringTokenizer proxy_server_list(proxy_rules, ";");
- while (proxy_server_list.GetNext()) {
- base::StringTokenizer proxy_server_for_scheme(
- proxy_server_list.token_begin(), proxy_server_list.token_end(), "=");
- while (proxy_server_for_scheme.GetNext()) {
- std::string url_scheme = proxy_server_for_scheme.token();
- // If we fail to get the proxy server here, it means that
- // this is a regular proxy server configuration, i.e. proxies
- // are not configured per protocol.
- if (!proxy_server_for_scheme.GetNext()) {
- if (type == Type::PROXY_LIST_PER_SCHEME)
- continue; // Unexpected.
- AddProxyURIListToProxyList(url_scheme,
- &single_proxies,
- ProxyServer::SCHEME_HTTP);
- type = Type::PROXY_LIST;
- return;
- }
- // Trim whitespace off the url scheme.
- base::TrimWhitespaceASCII(url_scheme, base::TRIM_ALL, &url_scheme);
- // Add it to the per-scheme mappings (if supported scheme).
- type = Type::PROXY_LIST_PER_SCHEME;
- ProxyList* entry = MapUrlSchemeToProxyListNoFallback(url_scheme);
- ProxyServer::Scheme default_scheme = ProxyServer::SCHEME_HTTP;
- // socks=XXX is inconsistent with the other formats, since "socks"
- // is not a URL scheme. Rather this means "for everything else, send
- // it to the SOCKS proxy server XXX".
- if (url_scheme == "socks") {
- DCHECK(!entry);
- entry = &fallback_proxies;
- // Note that here 'socks' is understood to be SOCKS4, even though
- // 'socks' maps to SOCKS5 in ProxyServer::GetSchemeFromURIInternal.
- default_scheme = ProxyServer::SCHEME_SOCKS4;
- }
- if (entry) {
- AddProxyURIListToProxyList(proxy_server_for_scheme.token(),
- entry,
- default_scheme);
- }
- }
- }
- }
- const ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyList(
- const std::string& url_scheme) const {
- const ProxyList* proxy_server_list = const_cast<ProxyRules*>(this)->
- MapUrlSchemeToProxyListNoFallback(url_scheme);
- if (proxy_server_list && !proxy_server_list->IsEmpty())
- return proxy_server_list;
- if (url_scheme == "ws" || url_scheme == "wss")
- return GetProxyListForWebSocketScheme();
- if (!fallback_proxies.IsEmpty())
- return &fallback_proxies;
- return nullptr; // No mapping for this scheme. Use direct.
- }
- bool ProxyConfig::ProxyRules::Equals(const ProxyRules& other) const {
- return type == other.type && single_proxies.Equals(other.single_proxies) &&
- proxies_for_http.Equals(other.proxies_for_http) &&
- proxies_for_https.Equals(other.proxies_for_https) &&
- proxies_for_ftp.Equals(other.proxies_for_ftp) &&
- fallback_proxies.Equals(other.fallback_proxies) &&
- bypass_rules == other.bypass_rules &&
- reverse_bypass == other.reverse_bypass;
- }
- ProxyList* ProxyConfig::ProxyRules::MapUrlSchemeToProxyListNoFallback(
- const std::string& scheme) {
- DCHECK_EQ(Type::PROXY_LIST_PER_SCHEME, type);
- if (scheme == "http")
- return &proxies_for_http;
- if (scheme == "https")
- return &proxies_for_https;
- if (scheme == "ftp")
- return &proxies_for_ftp;
- return nullptr; // No mapping for this scheme.
- }
- const ProxyList* ProxyConfig::ProxyRules::GetProxyListForWebSocketScheme()
- const {
- // Follow the recommendation from RFC 6455 section 4.1.3:
- //
- // NOTE: Implementations that do not expose explicit UI for
- // selecting a proxy for WebSocket connections separate from other
- // proxies are encouraged to use a SOCKS5 [RFC1928] proxy for
- // WebSocket connections, if available, or failing that, to prefer
- // the proxy configured for HTTPS connections over the proxy
- // configured for HTTP connections.
- //
- // This interpretation is a bit different from the RFC, in
- // that it favors both SOCKSv4 and SOCKSv5.
- //
- // When the net::ProxyRules came from system proxy settings,
- // "fallback_proxies" will be empty, or a a single SOCKS
- // proxy, making this ordering match the RFC.
- //
- // However for other configurations it is possible for
- // "fallback_proxies" to be a list of any ProxyServer,
- // including non-SOCKS. In this case "fallback_proxies" is
- // still prioritized over proxies_for_http and
- // proxies_for_https.
- if (!fallback_proxies.IsEmpty())
- return &fallback_proxies;
- if (!proxies_for_https.IsEmpty())
- return &proxies_for_https;
- if (!proxies_for_http.IsEmpty())
- return &proxies_for_http;
- return nullptr;
- }
- ProxyConfig::ProxyConfig() = default;
- ProxyConfig::ProxyConfig(const ProxyConfig& config) = default;
- ProxyConfig::~ProxyConfig() = default;
- ProxyConfig& ProxyConfig::operator=(const ProxyConfig& config) = default;
- bool ProxyConfig::Equals(const ProxyConfig& other) const {
- return auto_detect_ == other.auto_detect_ && pac_url_ == other.pac_url_ &&
- pac_mandatory_ == other.pac_mandatory_ &&
- from_system_ == other.from_system_ &&
- proxy_rules_.Equals(other.proxy_rules());
- }
- bool ProxyConfig::HasAutomaticSettings() const {
- return auto_detect_ || has_pac_url();
- }
- void ProxyConfig::ClearAutomaticSettings() {
- auto_detect_ = false;
- pac_url_ = GURL();
- }
- base::Value ProxyConfig::ToValue() const {
- base::Value::Dict dict;
- // Output the automatic settings.
- if (auto_detect_)
- dict.Set("auto_detect", auto_detect_);
- if (has_pac_url()) {
- dict.Set("pac_url", pac_url_.possibly_invalid_spec());
- if (pac_mandatory_)
- dict.Set("pac_mandatory", pac_mandatory_);
- }
- if (from_system_) {
- dict.Set("from_system", from_system_);
- }
- // Output the manual settings.
- if (proxy_rules_.type != ProxyRules::Type::EMPTY) {
- switch (proxy_rules_.type) {
- case ProxyRules::Type::PROXY_LIST:
- AddProxyListToValue("single_proxy", proxy_rules_.single_proxies, &dict);
- break;
- case ProxyRules::Type::PROXY_LIST_PER_SCHEME: {
- base::Value::Dict dict2;
- AddProxyListToValue("http", proxy_rules_.proxies_for_http, &dict2);
- AddProxyListToValue("https", proxy_rules_.proxies_for_https, &dict2);
- AddProxyListToValue("ftp", proxy_rules_.proxies_for_ftp, &dict2);
- AddProxyListToValue("fallback", proxy_rules_.fallback_proxies, &dict2);
- dict.Set("proxy_per_scheme", std::move(dict2));
- break;
- }
- default:
- NOTREACHED();
- }
- // Output the bypass rules.
- const ProxyBypassRules& bypass = proxy_rules_.bypass_rules;
- if (!bypass.rules().empty()) {
- if (proxy_rules_.reverse_bypass)
- dict.Set("reverse_bypass", true);
- base::Value list(base::Value::Type::LIST);
- for (const auto& bypass_rule : bypass.rules())
- list.Append(bypass_rule->ToString());
- dict.Set("bypass_list", std::move(list));
- }
- }
- return base::Value(std::move(dict));
- }
- } // namespace net
|