Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(35)

Side by Side Diff: chrome/browser/chromeos/proxy_config_service_impl.cc

Issue 8102019: redesign and reimplement proxy config service and tracker, revise proxy ui on cros (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: '' Created 9 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/chromeos/proxy_config_service_impl.h" 5 #include "chrome/browser/chromeos/proxy_config_service_impl.h"
6 6
7 #include <ostream> 7 #include <ostream>
8 8
9 #include "base/bind.h"
9 #include "base/json/json_value_serializer.h" 10 #include "base/json/json_value_serializer.h"
10 #include "base/logging.h" 11 #include "base/logging.h"
11 #include "base/string_util.h" 12 #include "base/string_util.h"
12 #include "base/task.h"
13 #include "chrome/browser/chromeos/cros/cros_library.h" 13 #include "chrome/browser/chromeos/cros/cros_library.h"
14 #include "chrome/browser/chromeos/cros_settings_names.h" 14 #include "chrome/browser/chromeos/cros_settings_names.h"
15 #include "chrome/browser/policy/proto/chrome_device_policy.pb.h" 15 #include "chrome/browser/policy/proto/chrome_device_policy.pb.h"
16 #include "chrome/browser/prefs/pref_service.h"
16 #include "chrome/browser/prefs/proxy_config_dictionary.h" 17 #include "chrome/browser/prefs/proxy_config_dictionary.h"
17 #include "chrome/browser/prefs/proxy_prefs.h" 18 #include "chrome/browser/prefs/proxy_prefs.h"
19 #include "chrome/browser/profiles/profile_manager.h"
20 #include "chrome/common/chrome_notification_types.h"
21 #include "chrome/common/pref_names.h"
18 #include "content/browser/browser_thread.h" 22 #include "content/browser/browser_thread.h"
23 #include "content/public/browser/notification_details.h"
24 #include "content/public/browser/notification_source.h"
19 #include "grit/generated_resources.h" 25 #include "grit/generated_resources.h"
20 #include "ui/base/l10n/l10n_util.h" 26 #include "ui/base/l10n/l10n_util.h"
21 27
22 namespace em = enterprise_management; 28 namespace em = enterprise_management;
23 29
24 namespace chromeos { 30 namespace chromeos {
25 31
26 namespace { 32 namespace {
27 33
28 const char* SourceToString(ProxyConfigServiceImpl::ProxyConfig::Source source) { 34 const char* ModeToString(ProxyConfigServiceImpl::ProxyConfig::Mode mode) {
29 switch (source) { 35 switch (mode) {
30 case ProxyConfigServiceImpl::ProxyConfig::SOURCE_NONE: 36 case ProxyConfigServiceImpl::ProxyConfig::MODE_DIRECT:
31 return "SOURCE_NONE"; 37 return "direct";
32 case ProxyConfigServiceImpl::ProxyConfig::SOURCE_POLICY: 38 case ProxyConfigServiceImpl::ProxyConfig::MODE_AUTO_DETECT:
33 return "SOURCE_POLICY"; 39 return "auto-detect";
34 case ProxyConfigServiceImpl::ProxyConfig::SOURCE_OWNER: 40 case ProxyConfigServiceImpl::ProxyConfig::MODE_PAC_SCRIPT:
35 return "SOURCE_OWNER"; 41 return "pacurl";
42 case ProxyConfigServiceImpl::ProxyConfig::MODE_SINGLE_PROXY:
43 return "single-proxy";
44 case ProxyConfigServiceImpl::ProxyConfig::MODE_PROXY_PER_SCHEME:
45 return "proxy-per-scheme";
36 } 46 }
37 NOTREACHED() << "Unrecognized source type"; 47 NOTREACHED() << "Unrecognized mode type";
38 return ""; 48 return "";
39 } 49 }
40 50
51 const char* ConfigStateToString(ProxyPrefs::ConfigState state) {
52 switch (state) {
53 case ProxyPrefs::CONFIG_POLICY:
54 return "config_policy";
55 case ProxyPrefs::CONFIG_EXTENSION:
56 return "config_extension";
57 case ProxyPrefs::CONFIG_OTHER_PRECEDE:
58 return "config_other_precede";
59 case ProxyPrefs::CONFIG_SYSTEM:
60 return "config_network"; // For ChromeOS, system is network.
61 case ProxyPrefs::CONFIG_FALLBACK:
62 return "config_recommended"; // Fallback is recommended.
63 case ProxyPrefs::CONFIG_UNSET:
64 return "config_unset";
65 }
66 NOTREACHED() << "Unrecognized config state type";
67 return "";
68 }
69
70 // Only unblock if needed for debugging.
71 #if defined(NEED_DEBUG_LOG)
41 std::ostream& operator<<(std::ostream& out, 72 std::ostream& operator<<(std::ostream& out,
42 const ProxyConfigServiceImpl::ProxyConfig::ManualProxy& proxy) { 73 const ProxyConfigServiceImpl::ProxyConfig::ManualProxy& proxy) {
43 out << " " << SourceToString(proxy.source) << "\n" 74 out << (proxy.server.is_valid() ? proxy.server.ToURI() : "") << "\n";
44 << " server: " << (proxy.server.is_valid() ? proxy.server.ToURI() : "")
45 << "\n";
46 return out; 75 return out;
47 } 76 }
48 77
49 std::ostream& operator<<(std::ostream& out, 78 std::ostream& operator<<(std::ostream& out,
50 const ProxyConfigServiceImpl::ProxyConfig& config) { 79 const ProxyConfigServiceImpl::ProxyConfig& config) {
51 switch (config.mode) { 80 switch (config.mode) {
52 case ProxyConfigServiceImpl::ProxyConfig::MODE_DIRECT: 81 case ProxyConfigServiceImpl::ProxyConfig::MODE_DIRECT:
53 out << "Direct connection:\n "
54 << SourceToString(config.automatic_proxy.source) << "\n";
55 break;
56 case ProxyConfigServiceImpl::ProxyConfig::MODE_AUTO_DETECT: 82 case ProxyConfigServiceImpl::ProxyConfig::MODE_AUTO_DETECT:
57 out << "Auto detection:\n " 83 out << ModeToString(config.mode) << ", "
58 << SourceToString(config.automatic_proxy.source) << "\n"; 84 << ConfigStateToString(config.state) << "\n";
59 break; 85 break;
60 case ProxyConfigServiceImpl::ProxyConfig::MODE_PAC_SCRIPT: 86 case ProxyConfigServiceImpl::ProxyConfig::MODE_PAC_SCRIPT:
61 out << "Custom PAC script:\n " 87 out << ModeToString(config.mode) << ", "
62 << SourceToString(config.automatic_proxy.source) 88 << ConfigStateToString(config.state)
63 << "\n PAC: " << config.automatic_proxy.pac_url << "\n"; 89 << "\n PAC: " << config.automatic_proxy.pac_url << "\n";
64 break; 90 break;
65 case ProxyConfigServiceImpl::ProxyConfig::MODE_SINGLE_PROXY: 91 case ProxyConfigServiceImpl::ProxyConfig::MODE_SINGLE_PROXY:
66 out << "Single proxy:\n" << config.single_proxy; 92 out << ModeToString(config.mode) << ", "
93 << ConfigStateToString(config.state) << "\n " << config.single_proxy;
67 break; 94 break;
68 case ProxyConfigServiceImpl::ProxyConfig::MODE_PROXY_PER_SCHEME: 95 case ProxyConfigServiceImpl::ProxyConfig::MODE_PROXY_PER_SCHEME:
69 out << "HTTP proxy: " << config.http_proxy; 96 out << ModeToString(config.mode) << ", "
70 out << "HTTPS proxy: " << config.https_proxy; 97 << ConfigStateToString(config.state) << "\n"
71 out << "FTP proxy: " << config.ftp_proxy; 98 << " HTTP: " << config.http_proxy
72 out << "SOCKS proxy: " << config.socks_proxy; 99 << " HTTPS: " << config.https_proxy
100 << " FTP: " << config.ftp_proxy
101 << " SOCKS: " << config.socks_proxy;
73 break; 102 break;
74 default: 103 default:
75 NOTREACHED() << "Unrecognized proxy config mode"; 104 NOTREACHED() << "Unrecognized proxy config mode";
76 break; 105 break;
77 } 106 }
78 if (config.mode == ProxyConfigServiceImpl::ProxyConfig::MODE_SINGLE_PROXY || 107 if (config.mode == ProxyConfigServiceImpl::ProxyConfig::MODE_SINGLE_PROXY ||
79 config.mode == 108 config.mode ==
80 ProxyConfigServiceImpl::ProxyConfig::MODE_PROXY_PER_SCHEME) { 109 ProxyConfigServiceImpl::ProxyConfig::MODE_PROXY_PER_SCHEME) {
81 out << "Bypass list: "; 110 out << "Bypass list: ";
82 if (config.bypass_rules.rules().empty()) { 111 if (config.bypass_rules.rules().empty()) {
83 out << "[None]"; 112 out << "[None]";
84 } else { 113 } else {
85 const net::ProxyBypassRules& bypass_rules = config.bypass_rules; 114 const net::ProxyBypassRules& bypass_rules = config.bypass_rules;
86 net::ProxyBypassRules::RuleList::const_iterator it; 115 net::ProxyBypassRules::RuleList::const_iterator it;
87 for (it = bypass_rules.rules().begin(); 116 for (it = bypass_rules.rules().begin();
88 it != bypass_rules.rules().end(); ++it) { 117 it != bypass_rules.rules().end(); ++it) {
89 out << "\n " << (*it)->ToString(); 118 out << "\n " << (*it)->ToString();
90 } 119 }
91 } 120 }
92 } 121 }
93 return out; 122 return out;
94 } 123 }
95 124
96 std::string ProxyConfigToString( 125 std::string ProxyConfigToString(
97 const ProxyConfigServiceImpl::ProxyConfig& proxy_config) { 126 const ProxyConfigServiceImpl::ProxyConfig& proxy_config) {
98 std::ostringstream stream; 127 std::ostringstream stream;
99 stream << proxy_config; 128 stream << proxy_config;
100 return stream.str(); 129 return stream.str();
101 } 130 }
131 #endif // defined(NEED_DEBUG_LOG)
102 132
103 } // namespace 133 } // namespace
104 134
105 //---------- ProxyConfigServiceImpl::ProxyConfig::Setting methods --------------
106
107 bool ProxyConfigServiceImpl::ProxyConfig::Setting::CanBeWrittenByUser(
108 bool user_is_owner) {
109 // Setting can only be written by user if user is owner and setting is not
110 // from policy.
111 return user_is_owner && source != ProxyConfig::SOURCE_POLICY;
112 }
113
114 //----------- ProxyConfigServiceImpl::ProxyConfig: public methods -------------- 135 //----------- ProxyConfigServiceImpl::ProxyConfig: public methods --------------
115 136
116 ProxyConfigServiceImpl::ProxyConfig::ProxyConfig() : mode(MODE_DIRECT) {} 137 ProxyConfigServiceImpl::ProxyConfig::ProxyConfig()
138 : mode(MODE_DIRECT),
139 state(ProxyPrefs::CONFIG_UNSET),
140 user_modifiable(true) {}
117 141
118 ProxyConfigServiceImpl::ProxyConfig::~ProxyConfig() {} 142 ProxyConfigServiceImpl::ProxyConfig::~ProxyConfig() {}
119 143
120 void ProxyConfigServiceImpl::ProxyConfig::ToNetProxyConfig( 144 bool ProxyConfigServiceImpl::ProxyConfig::FromNetProxyConfig(
121 net::ProxyConfig* net_config) { 145 const net::ProxyConfig& net_config) {
122 switch (mode) { 146 *this = ProxyConfigServiceImpl::ProxyConfig(); // Reset to default.
123 case MODE_DIRECT: 147 const net::ProxyConfig::ProxyRules& rules = net_config.proxy_rules();
124 *net_config = net::ProxyConfig::CreateDirect(); 148 switch (rules.type) {
125 break; 149 case net::ProxyConfig::ProxyRules::TYPE_NO_RULES:
126 case MODE_AUTO_DETECT: 150 if (!net_config.HasAutomaticSettings()) {
127 *net_config = net::ProxyConfig::CreateAutoDetect(); 151 mode = ProxyConfig::MODE_DIRECT;
128 break; 152 } else if (net_config.auto_detect()) {
129 case MODE_PAC_SCRIPT: 153 mode = ProxyConfig::MODE_AUTO_DETECT;
130 *net_config = net::ProxyConfig::CreateFromCustomPacURL( 154 } else if (net_config.has_pac_url()) {
131 automatic_proxy.pac_url); 155 mode = ProxyConfig::MODE_PAC_SCRIPT;
132 break; 156 automatic_proxy.pac_url = net_config.pac_url();
133 case MODE_SINGLE_PROXY: 157 } else {
134 *net_config = net::ProxyConfig(); 158 return false;
135 net_config->proxy_rules().type = 159 }
136 net::ProxyConfig::ProxyRules::TYPE_SINGLE_PROXY; 160 return true;
137 net_config->proxy_rules().single_proxy = single_proxy.server; 161 case net::ProxyConfig::ProxyRules::TYPE_SINGLE_PROXY:
138 net_config->proxy_rules().bypass_rules = bypass_rules; 162 if (!rules.single_proxy.is_valid())
139 break; 163 return false;
140 case MODE_PROXY_PER_SCHEME: 164 mode = MODE_SINGLE_PROXY;
141 *net_config = net::ProxyConfig(); 165 single_proxy.server = rules.single_proxy;
142 net_config->proxy_rules().type = 166 bypass_rules = rules.bypass_rules;
143 net::ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME; 167 return true;
144 net_config->proxy_rules().proxy_for_http = http_proxy.server; 168 case net::ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME:
145 net_config->proxy_rules().proxy_for_https = https_proxy.server; 169 // Make sure we have valid server for at least one of the protocols.
146 net_config->proxy_rules().proxy_for_ftp = ftp_proxy.server; 170 if (!rules.proxy_for_http.is_valid() &&
147 net_config->proxy_rules().fallback_proxy = socks_proxy.server; 171 !rules.proxy_for_https.is_valid() &&
148 net_config->proxy_rules().bypass_rules = bypass_rules; 172 !rules.proxy_for_ftp.is_valid() &&
149 break; 173 !rules.fallback_proxy.is_valid()) {
174 return false;
175 }
176 mode = MODE_PROXY_PER_SCHEME;
177 if (rules.proxy_for_http.is_valid())
178 http_proxy.server = rules.proxy_for_http;
179 if (rules.proxy_for_https.is_valid())
180 https_proxy.server = rules.proxy_for_https;
181 if (rules.proxy_for_ftp.is_valid())
182 ftp_proxy.server = rules.proxy_for_ftp;
183 if (rules.fallback_proxy.is_valid())
184 socks_proxy.server = rules.fallback_proxy;
185 bypass_rules = rules.bypass_rules;
186 return true;
150 default: 187 default:
151 NOTREACHED() << "Unrecognized proxy config mode"; 188 NOTREACHED() << "Unrecognized proxy config mode";
152 break; 189 break;
153 } 190 }
191 return false;
154 } 192 }
155 193
156 bool ProxyConfigServiceImpl::ProxyConfig::CanBeWrittenByUser( 194 DictionaryValue* ProxyConfigServiceImpl::ProxyConfig::ToPrefProxyConfig() {
157 bool user_is_owner, const std::string& scheme) {
158 // Setting can only be written by user if user is owner and setting is not
159 // from policy.
160 Setting* setting = NULL;
161 switch (mode) { 195 switch (mode) {
162 case MODE_DIRECT: 196 case MODE_DIRECT: {
163 case MODE_AUTO_DETECT: 197 return ProxyConfigDictionary::CreateDirect();
164 case MODE_PAC_SCRIPT: 198 }
165 setting = &automatic_proxy; 199 case MODE_AUTO_DETECT: {
166 break; 200 return ProxyConfigDictionary::CreateAutoDetect();
167 case MODE_SINGLE_PROXY: 201 }
168 setting = &single_proxy; 202 case MODE_PAC_SCRIPT: {
169 break; 203 return ProxyConfigDictionary::CreatePacScript(
170 case MODE_PROXY_PER_SCHEME: 204 automatic_proxy.pac_url.spec(), false);
171 setting = MapSchemeToProxy(scheme); 205 }
172 break; 206 case MODE_SINGLE_PROXY: {
207 std::string spec;
208 if (single_proxy.server.is_valid())
209 spec = single_proxy.server.ToURI();
210 return ProxyConfigDictionary::CreateFixedServers(
211 spec, bypass_rules.ToString());
212 }
213 case MODE_PROXY_PER_SCHEME: {
214 std::string spec;
215 EncodeAndAppendProxyServer("http", http_proxy.server, &spec);
216 EncodeAndAppendProxyServer("https", https_proxy.server, &spec);
217 EncodeAndAppendProxyServer("ftp", ftp_proxy.server, &spec);
218 EncodeAndAppendProxyServer("socks", socks_proxy.server, &spec);
219 return ProxyConfigDictionary::CreateFixedServers(
220 spec, bypass_rules.ToString());
221 }
173 default: 222 default:
174 break; 223 break;
175 } 224 }
176 if (!setting) { 225 NOTREACHED() << "Unrecognized proxy config mode for preference";
177 NOTREACHED() << "Unrecognized proxy config mode"; 226 return NULL;
178 return false;
179 }
180 return setting->CanBeWrittenByUser(user_is_owner);
181 } 227 }
182 228
183 ProxyConfigServiceImpl::ProxyConfig::ManualProxy* 229 ProxyConfigServiceImpl::ProxyConfig::ManualProxy*
184 ProxyConfigServiceImpl::ProxyConfig::MapSchemeToProxy( 230 ProxyConfigServiceImpl::ProxyConfig::MapSchemeToProxy(
185 const std::string& scheme) { 231 const std::string& scheme) {
186 if (scheme == "http") 232 if (scheme == "http")
187 return &http_proxy; 233 return &http_proxy;
188 if (scheme == "https") 234 if (scheme == "https")
189 return &https_proxy; 235 return &https_proxy;
190 if (scheme == "ftp") 236 if (scheme == "ftp")
(...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after
254 300
255 bool ProxyConfigServiceImpl::ProxyConfig::SerializeForNetwork( 301 bool ProxyConfigServiceImpl::ProxyConfig::SerializeForNetwork(
256 std::string* output) { 302 std::string* output) {
257 scoped_ptr<DictionaryValue> proxy_dict(ToPrefProxyConfig()); 303 scoped_ptr<DictionaryValue> proxy_dict(ToPrefProxyConfig());
258 if (!proxy_dict.get()) 304 if (!proxy_dict.get())
259 return false; 305 return false;
260 JSONStringValueSerializer serializer(output); 306 JSONStringValueSerializer serializer(output);
261 return serializer.Serialize(*proxy_dict.get()); 307 return serializer.Serialize(*proxy_dict.get());
262 } 308 }
263 309
264 bool ProxyConfigServiceImpl::ProxyConfig::DeserializeForNetwork(
265 const std::string& input) {
266 JSONStringValueSerializer serializer(input);
267 scoped_ptr<Value> value(serializer.Deserialize(NULL, NULL));
268 if (!value.get() || value->GetType() != Value::TYPE_DICTIONARY)
269 return false;
270 DictionaryValue* proxy_dict = static_cast<DictionaryValue*>(value.get());
271 return FromPrefProxyConfig(proxy_dict);
272 }
273
274 bool ProxyConfigServiceImpl::ProxyConfig::Equals(
275 const ProxyConfig& other) const {
276 if (mode != other.mode)
277 return false;
278 switch (mode) {
279 case MODE_DIRECT:
280 case MODE_AUTO_DETECT:
281 return true;
282 case MODE_PAC_SCRIPT:
283 return automatic_proxy.pac_url == other.automatic_proxy.pac_url;
284 case MODE_SINGLE_PROXY:
285 return single_proxy.server == other.single_proxy.server &&
286 bypass_rules.Equals(other.bypass_rules);
287 case MODE_PROXY_PER_SCHEME:
288 return http_proxy.server == other.http_proxy.server &&
289 https_proxy.server == other.https_proxy.server &&
290 ftp_proxy.server == other.ftp_proxy.server &&
291 socks_proxy.server == other.socks_proxy.server &&
292 bypass_rules.Equals(other.bypass_rules);
293 default: {
294 NOTREACHED() << "Unrecognized proxy config mode";
295 break;
296 }
297 }
298 return false;
299 }
300
301 std::string ProxyConfigServiceImpl::ProxyConfig::ToString() const {
302 return ProxyConfigToString(*this);
303 }
304
305 //----------- ProxyConfigServiceImpl::ProxyConfig: private methods ------------- 310 //----------- ProxyConfigServiceImpl::ProxyConfig: private methods -------------
306 311
307 // static 312 // static
308 void ProxyConfigServiceImpl::ProxyConfig::EncodeAndAppendProxyServer( 313 void ProxyConfigServiceImpl::ProxyConfig::EncodeAndAppendProxyServer(
309 const std::string& scheme, 314 const std::string& scheme,
310 const net::ProxyServer& server, 315 const net::ProxyServer& server,
311 std::string* spec) { 316 std::string* spec) {
312 if (!server.is_valid()) 317 if (!server.is_valid())
313 return; 318 return;
314 319
315 if (!spec->empty()) 320 if (!spec->empty())
316 *spec += ';'; 321 *spec += ';';
317 322
318 if (!scheme.empty()) { 323 if (!scheme.empty()) {
319 *spec += scheme; 324 *spec += scheme;
320 *spec += "="; 325 *spec += "=";
321 } 326 }
322 *spec += server.ToURI(); 327 *spec += server.ToURI();
323 } 328 }
324 329
325 DictionaryValue* ProxyConfigServiceImpl::ProxyConfig::ToPrefProxyConfig() {
326 switch (mode) {
327 case MODE_DIRECT: {
328 return ProxyConfigDictionary::CreateDirect();
329 }
330 case MODE_AUTO_DETECT: {
331 return ProxyConfigDictionary::CreateAutoDetect();
332 }
333 case MODE_PAC_SCRIPT: {
334 return ProxyConfigDictionary::CreatePacScript(
335 automatic_proxy.pac_url.spec(), false);
336 }
337 case MODE_SINGLE_PROXY: {
338 std::string spec;
339 if (single_proxy.server.is_valid())
340 spec = single_proxy.server.ToURI();
341 return ProxyConfigDictionary::CreateFixedServers(
342 spec, bypass_rules.ToString());
343 }
344 case MODE_PROXY_PER_SCHEME: {
345 std::string spec;
346 EncodeAndAppendProxyServer("http", http_proxy.server, &spec);
347 EncodeAndAppendProxyServer("https", https_proxy.server, &spec);
348 EncodeAndAppendProxyServer("ftp", ftp_proxy.server, &spec);
349 EncodeAndAppendProxyServer("socks", socks_proxy.server, &spec);
350 return ProxyConfigDictionary::CreateFixedServers(
351 spec, bypass_rules.ToString());
352 }
353 default:
354 break;
355 }
356 NOTREACHED() << "Unrecognized proxy config mode for preference";
357 return NULL;
358 }
359
360 bool ProxyConfigServiceImpl::ProxyConfig::FromPrefProxyConfig(
361 const DictionaryValue* dict) {
362 ProxyConfigDictionary proxy_dict(dict);
363
364 *this = ProxyConfigServiceImpl::ProxyConfig(); // Reset to default.
365
366 ProxyPrefs::ProxyMode proxy_mode;
367 if (!proxy_dict.GetMode(&proxy_mode)) {
368 // Fall back to system settings if the mode preference is invalid.
369 return false;
370 }
371
372 switch (proxy_mode) {
373 case ProxyPrefs::MODE_SYSTEM:
374 // Use system settings, so we shouldn't use |this| proxy config.
375 return false;
376 case ProxyPrefs::MODE_DIRECT:
377 // Ignore all the other proxy config preferences if the use of a proxy
378 // has been explicitly disabled.
379 return true;
380 case ProxyPrefs::MODE_AUTO_DETECT:
381 mode = MODE_AUTO_DETECT;
382 return true;
383 case ProxyPrefs::MODE_PAC_SCRIPT: {
384 std::string proxy_pac;
385 if (!proxy_dict.GetPacUrl(&proxy_pac)) {
386 LOG(ERROR) << "Proxy settings request PAC script but do not specify "
387 << "its URL. Falling back to direct connection.";
388 return true;
389 }
390 GURL proxy_pac_url(proxy_pac);
391 if (!proxy_pac_url.is_valid()) {
392 LOG(ERROR) << "Invalid proxy PAC url: " << proxy_pac;
393 return true;
394 }
395 mode = MODE_PAC_SCRIPT;
396 automatic_proxy.pac_url = proxy_pac_url;
397 return true;
398 }
399 case ProxyPrefs::MODE_FIXED_SERVERS: {
400 std::string proxy_server;
401 if (!proxy_dict.GetProxyServer(&proxy_server)) {
402 LOG(ERROR) << "Proxy settings request fixed proxy servers but do not "
403 << "specify their URLs. Falling back to direct connection.";
404 return true;
405 }
406 net::ProxyConfig::ProxyRules proxy_rules;
407 proxy_rules.ParseFromString(proxy_server);
408 if (proxy_rules.type == net::ProxyConfig::ProxyRules::TYPE_SINGLE_PROXY) {
409 mode = MODE_SINGLE_PROXY;
410 single_proxy.server = proxy_rules.single_proxy;
411 } else if (proxy_rules.type ==
412 net::ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME) {
413 mode = MODE_PROXY_PER_SCHEME;
414 http_proxy.server = proxy_rules.proxy_for_http;
415 https_proxy.server = proxy_rules.proxy_for_https;
416 ftp_proxy.server = proxy_rules.proxy_for_ftp;
417 socks_proxy.server = proxy_rules.fallback_proxy;
418 } else {
419 LOG(ERROR) << "Proxy settings request fixed proxy servers but do not "
420 << "have valid proxy rules type. "
421 << "Falling back to direct connection.";
422 return true;
423 }
424
425 std::string proxy_bypass;
426 if (proxy_dict.GetBypassList(&proxy_bypass)) {
427 bypass_rules.ParseFromString(proxy_bypass);
428 }
429 return true;
430 }
431 case ProxyPrefs::kModeCount: {
432 // Fall through to NOTREACHED().
433 }
434 }
435 NOTREACHED() << "Unknown proxy mode, falling back to system settings.";
436 return false;
437 }
438
439 //------------------- ProxyConfigServiceImpl: public methods ------------------- 330 //------------------- ProxyConfigServiceImpl: public methods -------------------
440 331
441 ProxyConfigServiceImpl::ProxyConfigServiceImpl() 332 ProxyConfigServiceImpl::ProxyConfigServiceImpl(PrefService* pref_service)
442 : testing_(false), 333 : PrefProxyConfigTracker(pref_service),
443 can_post_task_(false), 334 active_config_state_(ProxyPrefs::CONFIG_UNSET),
444 config_availability_(net::ProxyConfigService::CONFIG_UNSET),
445 use_shared_proxies_(true) { 335 use_shared_proxies_(true) {
446 // Start async fetch of proxy config from settings persisted on device. 336 // Start async fetch of proxy config from settings persisted on device.
447 if (CrosLibrary::Get()->EnsureLoaded()) { 337 if (CrosLibrary::Get()->libcros_loaded()) {
448 retrieve_property_op_ = SignedSettings::CreateRetrievePropertyOp( 338 retrieve_property_op_ = SignedSettings::CreateRetrievePropertyOp(
449 kSettingProxyEverywhere, this); 339 kSettingProxyEverywhere, this);
450 if (retrieve_property_op_) { 340 if (retrieve_property_op_) {
451 retrieve_property_op_->Execute(); 341 retrieve_property_op_->Execute();
452 VLOG(1) << "Start retrieving proxy setting from device"; 342 VLOG(1) << this << ": Start retrieving proxy setting from device";
453 } else { 343 } else {
454 VLOG(1) << "Fail to retrieve proxy setting from device"; 344 VLOG(1) << this << ": Fail to retrieve proxy setting from device";
455 } 345 }
456 } 346 }
457 347
348 // Register for flimflam network notifications.
458 NetworkLibrary* network_lib = CrosLibrary::Get()->GetNetworkLibrary(); 349 NetworkLibrary* network_lib = CrosLibrary::Get()->GetNetworkLibrary();
459 OnActiveNetworkChanged(network_lib, network_lib->active_network()); 350 OnActiveNetworkChanged(network_lib, network_lib->active_network());
460 network_lib->AddNetworkManagerObserver(this); 351 network_lib->AddNetworkManagerObserver(this);
461 352
462 can_post_task_ = true; 353 // Register for notifications of UseSharedProxies user preference.
463 } 354 if (pref_service->FindPreference(prefs::kUseSharedProxies)) {
464 355 use_shared_proxies_pref_.Init(prefs::kUseSharedProxies, pref_service, this);
465 ProxyConfigServiceImpl::ProxyConfigServiceImpl(const ProxyConfig& init_config) 356 SetUseSharedProxies(use_shared_proxies_pref_.GetValue());
466 : testing_(false), 357 }
467 can_post_task_(true),
468 config_availability_(net::ProxyConfigService::CONFIG_VALID),
469 use_shared_proxies_(true) {
470 active_config_ = init_config;
471 // Update the IO-accessible copy in |cached_config_| as well.
472 cached_config_ = active_config_;
473 } 358 }
474 359
475 ProxyConfigServiceImpl::~ProxyConfigServiceImpl() { 360 ProxyConfigServiceImpl::~ProxyConfigServiceImpl() {
476 NetworkLibrary* netlib = CrosLibrary::Get()->GetNetworkLibrary(); 361 NetworkLibrary* netlib = CrosLibrary::Get()->GetNetworkLibrary();
477 if (netlib) { 362 if (netlib) {
478 netlib->RemoveNetworkManagerObserver(this); 363 netlib->RemoveNetworkManagerObserver(this);
479 netlib->RemoveObserverForAllNetworks(this); 364 netlib->RemoveObserverForAllNetworks(this);
480 } 365 }
481 } 366 }
482 367
368 void ProxyConfigServiceImpl::UISetCurrentNetwork(
369 const std::string& current_network) {
370 Network* network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath(
371 current_network);
372 if (!network) {
373 ResetUICache();
374 LOG(ERROR) << "can't find requested network " << current_network;
375 return;
376 }
377 current_ui_network_ = current_network;
378 OnUISetCurrentNetwork(network);
379 }
380
381 void ProxyConfigServiceImpl::UIMakeActiveNetworkCurrent() {
382 Network* network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath(
383 active_network_);
384 if (!network) {
385 ResetUICache();
386 LOG(ERROR) << "can't find requested network " << active_network_;
387 return;
388 }
389 current_ui_network_ = active_network_;
390 OnUISetCurrentNetwork(network);
391 }
392
393 void ProxyConfigServiceImpl::UIGetCurrentNetworkName(
394 std::string* network_name) {
395 if (!network_name)
396 return;
397 network_name->clear();
398 Network* network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath(
399 current_ui_network_);
400 if (!network) {
401 LOG(ERROR) << "can't find requested network " << current_ui_network_;
402 return;
403 }
404 if (network->name().empty() && network->type() == chromeos::TYPE_ETHERNET) {
405 *network_name =
406 l10n_util::GetStringUTF8(IDS_STATUSBAR_NETWORK_DEVICE_ETHERNET);
407 } else {
408 *network_name = network->name();
409 }
410 }
411
483 void ProxyConfigServiceImpl::UIGetProxyConfig(ProxyConfig* config) { 412 void ProxyConfigServiceImpl::UIGetProxyConfig(ProxyConfig* config) {
484 // Should be called from UI thread. 413 // Simply returns the copy last set from UI via UISetCurrentNetwork or
485 CheckCurrentlyOnUIThread(); 414 // UIMakeActiveNetworkCurrent.
486 // Simply returns the copy on the UI thread.
487 *config = current_ui_config_; 415 *config = current_ui_config_;
488 } 416 }
489 417
490 bool ProxyConfigServiceImpl::UISetCurrentNetwork(
491 const std::string& current_network) {
492 // Should be called from UI thread.
493 CheckCurrentlyOnUIThread();
494 if (current_ui_network_ == current_network)
495 return false;
496 Network* network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath(
497 current_network);
498 if (!network) {
499 LOG(ERROR) << "can't find requested network " << current_network;
500 return false;
501 }
502 current_ui_network_ = current_network;
503 current_ui_config_ = ProxyConfig();
504 SetCurrentNetworkName(network);
505 if (!network->proxy_config().empty())
506 current_ui_config_.DeserializeForNetwork(network->proxy_config());
507 VLOG(1) << "current ui network: "
508 << (current_ui_network_name_.empty() ?
509 current_ui_network_ : current_ui_network_name_)
510 << ", proxy mode: " << current_ui_config_.mode;
511 return true;
512 }
513
514 bool ProxyConfigServiceImpl::UIMakeActiveNetworkCurrent() {
515 // Should be called from UI thread.
516 CheckCurrentlyOnUIThread();
517 if (current_ui_network_ == active_network_)
518 return false;
519 Network* network = NULL;
520 if (!testing_) {
521 network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath(
522 active_network_);
523 if (!network) {
524 LOG(ERROR) << "can't find requested network " << active_network_;
525 return false;
526 }
527 }
528 current_ui_network_ = active_network_;
529 current_ui_config_ = active_config_;
530 SetCurrentNetworkName(network);
531 VLOG(1) << "current ui network: "
532 << (current_ui_network_name_.empty() ?
533 current_ui_network_ : current_ui_network_name_)
534 << ", proxy mode: " << current_ui_config_.mode;
535 return true;
536 }
537
538 void ProxyConfigServiceImpl::UISetUseSharedProxies(bool use_shared) {
539 // Should be called from UI thread.
540 CheckCurrentlyOnUIThread();
541
542 // Reset all UI-related variables so that the next opening of proxy
543 // configuration dialog of any network will trigger javascript reloading of
544 // (possibly) new proxy settings.
545 current_ui_network_.clear();
546 current_ui_network_name_.clear();
547 current_ui_config_ = ProxyConfig();
548
549 if (use_shared_proxies_ == use_shared) {
550 VLOG(1) << "same use_shared_proxies = " << use_shared_proxies_;
551 return;
552 }
553 use_shared_proxies_ = use_shared;
554 VLOG(1) << "new use_shared_proxies = " << use_shared_proxies_;
555 if (active_network_.empty())
556 return;
557 Network* network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath(
558 active_network_);
559 if (!network) {
560 LOG(ERROR) << "can't find requested network " << active_network_;
561 return;
562 }
563 DetermineConfigFromNetwork(network);
564 }
565
566 bool ProxyConfigServiceImpl::UISetProxyConfigToDirect() { 418 bool ProxyConfigServiceImpl::UISetProxyConfigToDirect() {
567 // Should be called from UI thread.
568 CheckCurrentlyOnUIThread();
569 current_ui_config_.mode = ProxyConfig::MODE_DIRECT; 419 current_ui_config_.mode = ProxyConfig::MODE_DIRECT;
570 OnUISetProxyConfig(); 420 OnUISetProxyConfig();
571 return true; 421 return true;
572 } 422 }
573 423
574 bool ProxyConfigServiceImpl::UISetProxyConfigToAutoDetect() { 424 bool ProxyConfigServiceImpl::UISetProxyConfigToAutoDetect() {
575 // Should be called from UI thread.
576 CheckCurrentlyOnUIThread();
577 current_ui_config_.mode = ProxyConfig::MODE_AUTO_DETECT; 425 current_ui_config_.mode = ProxyConfig::MODE_AUTO_DETECT;
578 OnUISetProxyConfig(); 426 OnUISetProxyConfig();
579 return true; 427 return true;
580 } 428 }
581 429
582 bool ProxyConfigServiceImpl::UISetProxyConfigToPACScript(const GURL& pac_url) { 430 bool ProxyConfigServiceImpl::UISetProxyConfigToPACScript(const GURL& pac_url) {
583 // Should be called from UI thread.
584 CheckCurrentlyOnUIThread();
585 current_ui_config_.mode = ProxyConfig::MODE_PAC_SCRIPT; 431 current_ui_config_.mode = ProxyConfig::MODE_PAC_SCRIPT;
586 current_ui_config_.automatic_proxy.pac_url = pac_url; 432 current_ui_config_.automatic_proxy.pac_url = pac_url;
587 OnUISetProxyConfig(); 433 OnUISetProxyConfig();
588 return true; 434 return true;
589 } 435 }
590 436
591 bool ProxyConfigServiceImpl::UISetProxyConfigToSingleProxy( 437 bool ProxyConfigServiceImpl::UISetProxyConfigToSingleProxy(
592 const net::ProxyServer& server) { 438 const net::ProxyServer& server) {
593 // Should be called from UI thread.
594 CheckCurrentlyOnUIThread();
595 current_ui_config_.mode = ProxyConfig::MODE_SINGLE_PROXY; 439 current_ui_config_.mode = ProxyConfig::MODE_SINGLE_PROXY;
596 current_ui_config_.single_proxy.server = server; 440 current_ui_config_.single_proxy.server = server;
597 OnUISetProxyConfig(); 441 OnUISetProxyConfig();
598 return true; 442 return true;
599 } 443 }
600 444
601 bool ProxyConfigServiceImpl::UISetProxyConfigToProxyPerScheme( 445 bool ProxyConfigServiceImpl::UISetProxyConfigToProxyPerScheme(
602 const std::string& scheme, const net::ProxyServer& server) { 446 const std::string& scheme, const net::ProxyServer& server) {
603 // Should be called from UI thread.
604 CheckCurrentlyOnUIThread();
605 ProxyConfig::ManualProxy* proxy = current_ui_config_.MapSchemeToProxy(scheme); 447 ProxyConfig::ManualProxy* proxy = current_ui_config_.MapSchemeToProxy(scheme);
606 if (!proxy) { 448 if (!proxy) {
607 NOTREACHED() << "Cannot set proxy: invalid scheme [" << scheme << "]"; 449 NOTREACHED() << "Cannot set proxy: invalid scheme [" << scheme << "]";
608 return false; 450 return false;
609 } 451 }
610 current_ui_config_.mode = ProxyConfig::MODE_PROXY_PER_SCHEME; 452 current_ui_config_.mode = ProxyConfig::MODE_PROXY_PER_SCHEME;
611 proxy->server = server; 453 proxy->server = server;
612 OnUISetProxyConfig(); 454 OnUISetProxyConfig();
613 return true; 455 return true;
614 } 456 }
615 457
616 bool ProxyConfigServiceImpl::UISetProxyConfigBypassRules( 458 bool ProxyConfigServiceImpl::UISetProxyConfigBypassRules(
617 const net::ProxyBypassRules& bypass_rules) { 459 const net::ProxyBypassRules& bypass_rules) {
618 // Should be called from UI thread.
619 CheckCurrentlyOnUIThread();
620 if (current_ui_config_.mode != ProxyConfig::MODE_SINGLE_PROXY && 460 if (current_ui_config_.mode != ProxyConfig::MODE_SINGLE_PROXY &&
621 current_ui_config_.mode != ProxyConfig::MODE_PROXY_PER_SCHEME) { 461 current_ui_config_.mode != ProxyConfig::MODE_PROXY_PER_SCHEME) {
622 NOTREACHED(); 462 NOTREACHED();
623 VLOG(1) << "Cannot set bypass rules for proxy mode [" 463 VLOG(1) << "Cannot set bypass rules for proxy mode ["
624 << current_ui_config_.mode << "]"; 464 << current_ui_config_.mode << "]";
625 return false; 465 return false;
626 } 466 }
627 current_ui_config_.bypass_rules = bypass_rules; 467 current_ui_config_.bypass_rules = bypass_rules;
628 OnUISetProxyConfig(); 468 OnUISetProxyConfig();
629 return true; 469 return true;
630 } 470 }
631 471
632 void ProxyConfigServiceImpl::AddObserver( 472 void ProxyConfigServiceImpl::OnProxyConfigChanged(
633 net::ProxyConfigService::Observer* observer) { 473 ProxyPrefs::ConfigState config_state,
634 // Should be called from IO thread. 474 const net::ProxyConfig& config) {
635 CheckCurrentlyOnIOThread(); 475 VLOG(1) << this << ": got prefs change: " << ConfigStateToString(config_state)
636 observers_.AddObserver(observer); 476 << ", mode=" << config.proxy_rules().type;
637 } 477 Network* network = NULL;
638 478 if (!active_network_.empty()) {
639 void ProxyConfigServiceImpl::RemoveObserver( 479 network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath(
640 net::ProxyConfigService::Observer* observer) { 480 active_network_);
641 // Should be called from IO thread. 481 if (!network)
642 CheckCurrentlyOnIOThread(); 482 LOG(ERROR) << "can't find requested network " << active_network_;
643 observers_.RemoveObserver(observer);
644 }
645
646 net::ProxyConfigService::ConfigAvailability
647 ProxyConfigServiceImpl::IOGetProxyConfig(net::ProxyConfig* net_config) {
648 // Should be called from IO thread.
649 CheckCurrentlyOnIOThread();
650 if (config_availability_ == net::ProxyConfigService::CONFIG_VALID) {
651 VLOG(1) << "returning proxy mode=" << cached_config_.mode;
652 cached_config_.ToNetProxyConfig(net_config);
653 } 483 }
654 return config_availability_; 484 DetermineEffectiveConfig(network, true);
655 } 485 }
656 486
657 void ProxyConfigServiceImpl::OnSettingsOpCompleted( 487 void ProxyConfigServiceImpl::OnSettingsOpCompleted(
658 SignedSettings::ReturnCode code, 488 SignedSettings::ReturnCode code,
659 std::string value) { 489 std::string value) {
660 retrieve_property_op_ = NULL; 490 retrieve_property_op_ = NULL;
661 if (code != SignedSettings::SUCCESS) { 491 if (code != SignedSettings::SUCCESS) {
662 LOG(WARNING) << "Error retrieving proxy setting from device"; 492 LOG(WARNING) << "Error retrieving proxy setting from device";
663 device_config_.clear(); 493 device_config_.clear();
664 return; 494 return;
665 } 495 }
666 VLOG(1) << "Retrieved proxy setting from device, value=[" << value << "]"; 496 VLOG(1) << this << ": Retrieved proxy setting from device, value=["
497 << value << "]";
667 ProxyConfig device_config; 498 ProxyConfig device_config;
668 if (!device_config.DeserializeForDevice(value) || 499 if (!device_config.DeserializeForDevice(value) ||
669 !device_config.SerializeForNetwork(&device_config_)) { 500 !device_config.SerializeForNetwork(&device_config_)) {
670 LOG(WARNING) << "Can't deserialize device setting or serialize for network"; 501 LOG(WARNING) << "Can't deserialize device setting or serialize for network";
671 device_config_.clear(); 502 device_config_.clear();
672 return; 503 return;
673 } 504 }
674 if (!active_network_.empty()) { 505 if (!active_network_.empty()) {
675 VLOG(1) << "try migrating device config to " << active_network_; 506 VLOG(1) << this << ": try migrating device config to " << active_network_;
676 SetProxyConfigForNetwork(active_network_, device_config_, true); 507 SetProxyConfigForNetwork(active_network_, device_config_, true);
677 } 508 }
678 } 509 }
679 510
680 void ProxyConfigServiceImpl::OnNetworkManagerChanged( 511 void ProxyConfigServiceImpl::OnNetworkManagerChanged(
681 NetworkLibrary* network_lib) { 512 NetworkLibrary* network_lib) {
682 VLOG(1) << "OnNetworkManagerChanged: use-shared-proxies=" 513 VLOG(1) << this << " OnNetworkManagerChanged: use-shared-proxies="
683 << use_shared_proxies_; 514 << use_shared_proxies_;
684 OnActiveNetworkChanged(network_lib, network_lib->active_network()); 515 OnActiveNetworkChanged(network_lib, network_lib->active_network());
685 } 516 }
686 517
687 void ProxyConfigServiceImpl::OnNetworkChanged(NetworkLibrary* network_lib, 518 void ProxyConfigServiceImpl::OnNetworkChanged(NetworkLibrary* network_lib,
688 const Network* network) { 519 const Network* network) {
689 if (!network) 520 if (!network)
690 return; 521 return;
691 VLOG(1) << "OnNetworkChanged: " 522 VLOG(1) << this << " OnNetworkChanged: "
692 << (network->name().empty() ? network->service_path() : 523 << (network->name().empty() ? network->service_path() :
693 network->name()) 524 network->name())
694 << ", use-shared-proxies=" << use_shared_proxies_; 525 << ", use-shared-proxies=" << use_shared_proxies_;
695 // We only care about active network. 526 // We only care about active network.
696 if (network == network_lib->active_network()) 527 if (network == network_lib->active_network())
697 OnActiveNetworkChanged(network_lib, network); 528 OnActiveNetworkChanged(network_lib, network);
698 } 529 }
699 530
700 //------------------ ProxyConfigServiceImpl: private methods ------------------- 531 //------------------ ProxyConfigServiceImpl: private methods -------------------
701 532
702 void ProxyConfigServiceImpl::OnUISetProxyConfig() { 533 void ProxyConfigServiceImpl::Observe(
703 if (testing_) { 534 int type,
704 active_config_ = current_ui_config_; 535 const content::NotificationSource& source,
705 IOSetProxyConfig(active_config_, net::ProxyConfigService::CONFIG_VALID); 536 const content::NotificationDetails& details) {
537 if (type == chrome::NOTIFICATION_PREF_CHANGED &&
538 content::Source<PrefService>(source).ptr() == prefs() &&
539 *(content::Details<std::string>(details).ptr()) ==
540 prefs::kUseSharedProxies) {
541 SetUseSharedProxies(use_shared_proxies_pref_.GetValue());
706 return; 542 return;
707 } 543 }
544 PrefProxyConfigTracker::Observe(type, source, details);
545 }
546
547 void ProxyConfigServiceImpl::OnUISetProxyConfig() {
708 if (current_ui_network_.empty()) 548 if (current_ui_network_.empty())
709 return; 549 return;
710 // Update config to flimflam. 550 // Update config to flimflam.
711 std::string value; 551 std::string value;
712 if (current_ui_config_.SerializeForNetwork(&value)) { 552 if (current_ui_config_.SerializeForNetwork(&value)) {
713 VLOG(1) << "set proxy (mode=" << current_ui_config_.mode 553 VLOG(1) << this << ": set proxy (mode=" << current_ui_config_.mode
714 << ") for " << current_ui_network_; 554 << ") for " << current_ui_network_;
555 current_ui_config_.state = ProxyPrefs::CONFIG_SYSTEM;
715 SetProxyConfigForNetwork(current_ui_network_, value, false); 556 SetProxyConfigForNetwork(current_ui_network_, value, false);
716 } 557 }
717 } 558 }
718 559
719 void ProxyConfigServiceImpl::IOSetProxyConfig(
720 const ProxyConfig& new_config,
721 net::ProxyConfigService::ConfigAvailability new_availability) {
722 if (!BrowserThread::CurrentlyOn(BrowserThread::IO) && can_post_task_) {
723 // Posts a task to IO thread with the new config, so it can update
724 // |cached_config_|.
725 Task* task = NewRunnableMethod(this,
726 &ProxyConfigServiceImpl::IOSetProxyConfig,
727 new_config,
728 new_availability);
729 if (!BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, task))
730 VLOG(1) << "Couldn't post task to IO thread to set new proxy config";
731 return;
732 }
733
734 // Now guaranteed to be on the correct thread.
735
736 if (config_availability_ == new_availability &&
737 cached_config_.Equals(new_config))
738 return;
739
740 VLOG(1) << "Proxy changed: mode=" << new_config.mode
741 << ", avail=" << new_availability;
742 cached_config_ = new_config;
743 config_availability_ = new_availability;
744 // Notify observers of new proxy config.
745 net::ProxyConfig net_config;
746 cached_config_.ToNetProxyConfig(&net_config);
747 if (net_config.proxy_rules().type !=
748 net::ProxyConfig::ProxyRules::TYPE_NO_RULES) {
749 net_config.proxy_rules().bypass_rules.AddRuleToBypassLocal();
750 }
751 FOR_EACH_OBSERVER(net::ProxyConfigService::Observer, observers_,
752 OnProxyConfigChanged(net_config, config_availability_));
753 }
754
755 void ProxyConfigServiceImpl::OnActiveNetworkChanged(NetworkLibrary* network_lib, 560 void ProxyConfigServiceImpl::OnActiveNetworkChanged(NetworkLibrary* network_lib,
756 const Network* active_network) { 561 const Network* active_network) {
757 std::string new_network; 562 std::string new_network;
758 if (active_network) 563 if (active_network)
759 new_network = active_network->service_path(); 564 new_network = active_network->service_path();
760 565
761 if (active_network_ == new_network) { // Same active network. 566 if (active_network_ == new_network) { // Same active network.
762 VLOG(1) << "same active network: " 567 VLOG(1) << this << ": same active network: "
763 << (new_network.empty() ? "empty" : 568 << (new_network.empty() ? "empty" :
764 (active_network->name().empty() ? 569 (active_network->name().empty() ?
765 new_network : active_network->name())); 570 new_network : active_network->name()));
571 // If last proxy update to network stack wasn't completed, do it now.
572 if (active_network && update_pending())
573 DetermineEffectiveConfig(active_network, true);
766 return; 574 return;
767 } 575 }
768 576
769 // If there was a previous active network, remove it as observer. 577 // If there was a previous active network, remove it as observer.
770 if (!active_network_.empty()) 578 if (!active_network_.empty())
771 network_lib->RemoveNetworkObserver(active_network_, this); 579 network_lib->RemoveNetworkObserver(active_network_, this);
772 580
773 active_network_ = new_network; 581 active_network_ = new_network;
774 582
775 if (active_network_.empty()) { 583 if (active_network_.empty()) {
776 VLOG(1) << "new active network: empty"; 584 VLOG(1) << this << ": new active network: empty";
777 active_config_ = ProxyConfig(); 585 DetermineEffectiveConfig(active_network, true);
778 IOSetProxyConfig(active_config_, net::ProxyConfigService::CONFIG_UNSET);
779 return; 586 return;
780 } 587 }
781 588
782 VLOG(1) << "new active network: path=" << active_network->service_path() 589 VLOG(1) << this << ": new active network: path="
783 << ", name=" << active_network->name() 590 << active_network->service_path()
784 << ", profile=" << active_network->profile_path() 591 << ", name=" << active_network->name()
785 << ", proxy=" << active_network->proxy_config(); 592 << ", profile=" << active_network->profile_path()
593 << ", proxy=" << active_network->proxy_config();
786 594
787 // Register observer for new network. 595 // Register observer for new network.
788 network_lib->AddNetworkObserver(active_network_, this); 596 network_lib->AddNetworkObserver(active_network_, this);
789 597
790 // If necessary, migrate config to flimflam. 598 // If necessary, migrate config to flimflam.
791 if (active_network->proxy_config().empty() && !device_config_.empty()) { 599 if (active_network->proxy_config().empty() && !device_config_.empty()) {
792 VLOG(1) << "try migrating device config to " << active_network_; 600 VLOG(1) << this << ": try migrating device config to " << active_network_;
793 SetProxyConfigForNetwork(active_network_, device_config_, true); 601 SetProxyConfigForNetwork(active_network_, device_config_, true);
794 } else { 602 } else {
795 DetermineConfigFromNetwork(active_network); 603 // Otherwise, determine and activate possibly new effective proxy config.
604 DetermineEffectiveConfig(active_network, true);
796 } 605 }
797 } 606 }
798 607
799 void ProxyConfigServiceImpl::SetProxyConfigForNetwork( 608 void ProxyConfigServiceImpl::SetProxyConfigForNetwork(
800 const std::string& network_path, const std::string& value, 609 const std::string& network_path, const std::string& value,
801 bool only_set_if_empty) { 610 bool only_set_if_empty) {
802 Network* network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath( 611 Network* network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath(
803 network_path); 612 network_path);
804 if (!network) { 613 if (!network) {
805 NOTREACHED() << "can't find requested network " << network_path; 614 NOTREACHED() << "can't find requested network " << network_path;
806 return; 615 return;
807 } 616 }
808 if (!only_set_if_empty || network->proxy_config().empty()) { 617 if (!only_set_if_empty || network->proxy_config().empty()) {
809 network->SetProxyConfig(value); 618 network->SetProxyConfig(value);
810 VLOG(1) << "set proxy for " 619 VLOG(1) << this << ": set proxy for " << (network->name().empty() ?
811 << (network->name().empty() ? network_path : network->name()) 620 network_path : network->name())
812 << ", value=" << value; 621 << ", value=" << value;
813 if (network_path == active_network_) 622 if (network_path == active_network_)
814 DetermineConfigFromNetwork(network); 623 DetermineEffectiveConfig(network, true);
815 } 624 }
816 } 625 }
817 626
818 void ProxyConfigServiceImpl::DetermineConfigFromNetwork( 627 void ProxyConfigServiceImpl::SetUseSharedProxies(bool use_shared) {
819 const Network* network) { 628 if (use_shared_proxies_ == use_shared) {
820 active_config_ = ProxyConfig(); // Default is DIRECT mode (i.e. no proxy). 629 VLOG(1) << this << ": same use-shared-proxies = " << use_shared_proxies_;
821 net::ProxyConfigService::ConfigAvailability available = 630 return;
822 net::ProxyConfigService::CONFIG_UNSET;
823 // If network is shared but user doesn't use shared proxies, use direct mode.
824 if (network->profile_type() == PROFILE_SHARED && !use_shared_proxies_) {
825 VLOG(1) << "shared network and !use_shared_proxies, using direct";
826 available = net::ProxyConfigService::CONFIG_VALID;
827 } else if (!network->proxy_config().empty() &&
828 active_config_.DeserializeForNetwork(network->proxy_config())) {
829 // Network is private or shared with user using shared proxies.
830 VLOG(1) << "using network proxy: " << network->proxy_config();
831 available = net::ProxyConfigService::CONFIG_VALID;
832 } 631 }
833 IOSetProxyConfig(active_config_, available); 632
633 use_shared_proxies_ = use_shared;
634 VLOG(1) << this << ": new use-shared-proxies = " << use_shared_proxies_;
635
636 // Determine new proxy config which may have changed because of new
637 // use-shared-proxies. If necessary, activate it.
638 Network* network = NULL;
639 if (!active_network_.empty()) {
640 network = CrosLibrary::Get()->GetNetworkLibrary()->FindNetworkByPath(
641 active_network_);
642 if (!network)
643 LOG(WARNING) << "can't find requested network " << active_network_;
644 }
645 DetermineEffectiveConfig(network, true);
834 } 646 }
835 647
836 void ProxyConfigServiceImpl::SetCurrentNetworkName(const Network* network) { 648 void ProxyConfigServiceImpl::DetermineEffectiveConfig(const Network* network,
837 if (!network) { 649 bool activate) {
838 if (testing_) 650 // Get prefs proxy config if available.
839 current_ui_network_name_ = "test"; 651 net::ProxyConfig pref_config;
840 return; 652 ProxyPrefs::ConfigState pref_state = GetProxyConfig(&pref_config);
653
654 // Get network proxy config if available.
655 net::ProxyConfig network_config;
656 net::ProxyConfigService::ConfigAvailability network_availability =
657 net::ProxyConfigService::CONFIG_UNSET;
658 bool ignore_proxy = activate;
659 if (network) {
660 // If we're activating proxy, ignore proxy if necessary;
661 // otherwise, for ui, get actual proxy to show user.
662 ignore_proxy = activate ? IgnoreProxy(network) : false;
663 // If network is shared but use-shared-proxies is off, use direct mode.
664 if (ignore_proxy) {
665 VLOG(1) << this << ": shared network && !use-shared-proxies, use direct";
666 network_availability = net::ProxyConfigService::CONFIG_VALID;
667 } else if (!network->proxy_config().empty()) {
668 // Network is private or shared with user using shared proxies.
669 JSONStringValueSerializer serializer(network->proxy_config());
670 scoped_ptr<Value> value(serializer.Deserialize(NULL, NULL));
671 if (value.get() && value->GetType() == Value::TYPE_DICTIONARY) {
672 DictionaryValue* dict = static_cast<DictionaryValue*>(value.get());
673 ProxyConfigDictionary proxy_dict(dict);
674 if (PrefConfigToNetConfig(proxy_dict, &network_config)) {
675 VLOG(1) << this << ": using network proxy: "
676 << network->proxy_config();
677 network_availability = net::ProxyConfigService::CONFIG_VALID;
678 }
679 }
680 }
841 } 681 }
842 if (network->name().empty() && network->type() == chromeos::TYPE_ETHERNET) { 682
843 current_ui_network_name_ = l10n_util::GetStringUTF8( 683 // Determine effective proxy config, either from prefs or network.
844 IDS_STATUSBAR_NETWORK_DEVICE_ETHERNET); 684 ProxyPrefs::ConfigState effective_config_state;
845 } else { 685 net::ProxyConfig effective_config;
846 current_ui_network_name_ = network->name(); 686 GetEffectiveProxyConfig(pref_state, pref_config,
687 network_availability, network_config, ignore_proxy,
688 &effective_config_state, &effective_config);
689
690 // Determine if we should activate effective proxy and which proxy config to
691 // store it.
692 if (activate) { // Activate effective proxy and store into |active_config_|.
693 // If last update didn't complete, we definitely update now.
694 bool update_now = update_pending();
695 if (!update_now) { // Otherwise, only update now if there're changes.
696 update_now = active_config_state_ != effective_config_state ||
697 (active_config_state_ != ProxyPrefs::CONFIG_UNSET &&
698 !active_config_.Equals(effective_config));
699 }
700 if (update_now) { // Activate and store new effective config.
701 active_config_state_ = effective_config_state;
702 if (active_config_state_ != ProxyPrefs::CONFIG_UNSET)
703 active_config_ = effective_config;
704 // If effective config is from system (i.e. network), it's considered a
705 // special kind of prefs that ranks below policy/extension but above
706 // others, so bump it up to CONFIG_OTHER_PRECEDE to force its precedence
707 // when PrefProxyConfigTracker pushes it to ChromeProxyConfigService.
708 if (effective_config_state == ProxyPrefs::CONFIG_SYSTEM)
709 effective_config_state = ProxyPrefs::CONFIG_OTHER_PRECEDE;
710 // If config is manual, add rule to bypass local host.
711 if (effective_config.proxy_rules().type !=
712 net::ProxyConfig::ProxyRules::TYPE_NO_RULES)
713 effective_config.proxy_rules().bypass_rules.AddRuleToBypassLocal();
714 PrefProxyConfigTracker::OnProxyConfigChanged(effective_config_state,
715 effective_config);
716 if (VLOG_IS_ON(1) && !update_pending()) { // Update was successful.
717 scoped_ptr<DictionaryValue> config_dict(static_cast<DictionaryValue*>(
718 effective_config.ToValue()));
719 std::string config_value;
720 JSONStringValueSerializer serializer(&config_value);
721 serializer.Serialize(*config_dict.get());
722 VLOG(1) << this << ": Proxy changed: "
723 << ConfigStateToString(active_config_state_)
724 << ", " << config_value;
725 }
726 }
727 } else { // For UI, store effective proxy into |current_ui_config_|.
728 current_ui_config_.FromNetProxyConfig(effective_config);
729 current_ui_config_.state = effective_config_state;
730 if (PrefPrecedes(effective_config_state))
731 current_ui_config_.user_modifiable = false;
732 else
733 current_ui_config_.user_modifiable = !network || !IgnoreProxy(network);
847 } 734 }
848 } 735 }
849 736
850 void ProxyConfigServiceImpl::CheckCurrentlyOnIOThread() { 737 void ProxyConfigServiceImpl::OnUISetCurrentNetwork(const Network* network) {
851 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 738 DetermineEffectiveConfig(network, false);
739 VLOG(1) << this << ": current ui network: "
740 << (network->name().empty() ?
741 current_ui_network_ : network->name())
742 << ", " << ModeToString(current_ui_config_.mode)
743 << ", " << ConfigStateToString(current_ui_config_.state)
744 << ", modifiable:" << current_ui_config_.user_modifiable;
852 } 745 }
853 746
854 void ProxyConfigServiceImpl::CheckCurrentlyOnUIThread() { 747 void ProxyConfigServiceImpl::ResetUICache() {
855 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); 748 current_ui_network_.clear();
749 current_ui_config_ = ProxyConfig();
856 } 750 }
857 751
858 } // namespace chromeos 752 } // namespace chromeos
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698