| Index: net/proxy/proxy_script_decider.cc
|
| ===================================================================
|
| --- net/proxy/proxy_script_decider.cc (revision 113525)
|
| +++ net/proxy/proxy_script_decider.cc (working copy)
|
| @@ -2,22 +2,33 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "net/proxy/init_proxy_resolver.h"
|
| +#include "net/proxy/proxy_script_decider.h"
|
|
|
| #include "base/compiler_specific.h"
|
| #include "base/format_macros.h"
|
| #include "base/logging.h"
|
| #include "base/string_util.h"
|
| +#include "base/utf_string_conversions.h"
|
| #include "net/base/net_log.h"
|
| #include "net/base/net_errors.h"
|
| #include "net/proxy/dhcp_proxy_script_fetcher.h"
|
| #include "net/proxy/dhcp_proxy_script_fetcher_factory.h"
|
| -#include "net/proxy/proxy_config.h"
|
| -#include "net/proxy/proxy_resolver.h"
|
| #include "net/proxy/proxy_script_fetcher.h"
|
|
|
| namespace net {
|
|
|
| +namespace {
|
| +bool LooksLikePacScript(const string16& script) {
|
| + // Note: this is only an approximation! It may not always work correctly,
|
| + // however it is very likely that legitimate scripts have this exact string,
|
| + // since they must minimally define a function of this name. Conversely, a
|
| + // file not containing the string is not likely to be a PAC script.
|
| + //
|
| + // An exact test would have to load the script in a javascript evaluator.
|
| + return script.find(ASCIIToUTF16("FindProxyForURL")) != string16::npos;
|
| +}
|
| +}
|
| +
|
| // This is the hard-coded location used by the DNS portion of web proxy
|
| // auto-discovery.
|
| //
|
| @@ -32,47 +43,45 @@
|
| // http://code.google.com/p/chromium/issues/detail?id=18575#c20
|
| static const char kWpadUrl[] = "http://wpad/wpad.dat";
|
|
|
| -InitProxyResolver::InitProxyResolver(
|
| - ProxyResolver* resolver,
|
| +ProxyScriptDecider::ProxyScriptDecider(
|
| ProxyScriptFetcher* proxy_script_fetcher,
|
| DhcpProxyScriptFetcher* dhcp_proxy_script_fetcher,
|
| NetLog* net_log)
|
| - : resolver_(resolver),
|
| - proxy_script_fetcher_(proxy_script_fetcher),
|
| + : proxy_script_fetcher_(proxy_script_fetcher),
|
| dhcp_proxy_script_fetcher_(dhcp_proxy_script_fetcher),
|
| ALLOW_THIS_IN_INITIALIZER_LIST(io_callback_(
|
| - this, &InitProxyResolver::OnIOCompletion)),
|
| + this, &ProxyScriptDecider::OnIOCompletion)),
|
| user_callback_(NULL),
|
| current_pac_source_index_(0u),
|
| pac_mandatory_(false),
|
| next_state_(STATE_NONE),
|
| net_log_(BoundNetLog::Make(
|
| - net_log, NetLog::SOURCE_INIT_PROXY_RESOLVER)),
|
| - effective_config_(NULL) {
|
| + net_log, NetLog::SOURCE_PROXY_SCRIPT_DECIDER)),
|
| + fetch_pac_bytes_(false) {
|
| }
|
|
|
| -InitProxyResolver::~InitProxyResolver() {
|
| +ProxyScriptDecider::~ProxyScriptDecider() {
|
| if (next_state_ != STATE_NONE)
|
| Cancel();
|
| }
|
|
|
| -int InitProxyResolver::Init(const ProxyConfig& config,
|
| - const base::TimeDelta wait_delay,
|
| - ProxyConfig* effective_config,
|
| - OldCompletionCallback* callback) {
|
| +int ProxyScriptDecider::Start(const ProxyConfig& config,
|
| + const base::TimeDelta wait_delay,
|
| + bool fetch_pac_bytes,
|
| + OldCompletionCallback* callback) {
|
| DCHECK_EQ(STATE_NONE, next_state_);
|
| DCHECK(callback);
|
| DCHECK(config.HasAutomaticSettings());
|
|
|
| - net_log_.BeginEvent(NetLog::TYPE_INIT_PROXY_RESOLVER, NULL);
|
| + net_log_.BeginEvent(NetLog::TYPE_PROXY_SCRIPT_DECIDER, NULL);
|
|
|
| + fetch_pac_bytes_ = fetch_pac_bytes;
|
| +
|
| // Save the |wait_delay| as a non-negative value.
|
| wait_delay_ = wait_delay;
|
| if (wait_delay_ < base::TimeDelta())
|
| wait_delay_ = base::TimeDelta();
|
|
|
| - effective_config_ = effective_config;
|
| -
|
| pac_mandatory_ = config.pac_mandatory();
|
|
|
| pac_sources_ = BuildPacSourcesFallbackList(config);
|
| @@ -84,16 +93,28 @@
|
| if (rv == ERR_IO_PENDING)
|
| user_callback_ = callback;
|
| else
|
| - DidCompleteInit();
|
| + DidComplete();
|
|
|
| return rv;
|
| }
|
|
|
| +const ProxyConfig& ProxyScriptDecider::effective_config() const {
|
| + DCHECK_EQ(STATE_NONE, next_state_);
|
| + return effective_config_;
|
| +}
|
| +
|
| +// TODO(eroman): Return a const-pointer.
|
| +ProxyResolverScriptData* ProxyScriptDecider::script_data() const {
|
| + DCHECK_EQ(STATE_NONE, next_state_);
|
| + return script_data_.get();
|
| +}
|
| +
|
| // Initialize the fallback rules.
|
| // (1) WPAD (DHCP).
|
| // (2) WPAD (DNS).
|
| // (3) Custom PAC URL.
|
| -InitProxyResolver::PacSourceList InitProxyResolver::BuildPacSourcesFallbackList(
|
| +ProxyScriptDecider::PacSourceList ProxyScriptDecider::
|
| + BuildPacSourcesFallbackList(
|
| const ProxyConfig& config) const {
|
| PacSourceList pac_sources;
|
| if (config.auto_detect()) {
|
| @@ -105,16 +126,16 @@
|
| return pac_sources;
|
| }
|
|
|
| -void InitProxyResolver::OnIOCompletion(int result) {
|
| +void ProxyScriptDecider::OnIOCompletion(int result) {
|
| DCHECK_NE(STATE_NONE, next_state_);
|
| int rv = DoLoop(result);
|
| if (rv != ERR_IO_PENDING) {
|
| - DidCompleteInit();
|
| + DidComplete();
|
| DoCallback(rv);
|
| }
|
| }
|
|
|
| -int InitProxyResolver::DoLoop(int result) {
|
| +int ProxyScriptDecider::DoLoop(int result) {
|
| DCHECK_NE(next_state_, STATE_NONE);
|
| int rv = result;
|
| do {
|
| @@ -135,12 +156,12 @@
|
| case STATE_FETCH_PAC_SCRIPT_COMPLETE:
|
| rv = DoFetchPacScriptComplete(rv);
|
| break;
|
| - case STATE_SET_PAC_SCRIPT:
|
| + case STATE_VERIFY_PAC_SCRIPT:
|
| DCHECK_EQ(OK, rv);
|
| - rv = DoSetPacScript();
|
| + rv = DoVerifyPacScript();
|
| break;
|
| - case STATE_SET_PAC_SCRIPT_COMPLETE:
|
| - rv = DoSetPacScriptComplete(rv);
|
| + case STATE_VERIFY_PAC_SCRIPT_COMPLETE:
|
| + rv = DoVerifyPacScriptComplete(rv);
|
| break;
|
| default:
|
| NOTREACHED() << "bad state";
|
| @@ -151,13 +172,13 @@
|
| return rv;
|
| }
|
|
|
| -void InitProxyResolver::DoCallback(int result) {
|
| +void ProxyScriptDecider::DoCallback(int result) {
|
| DCHECK_NE(ERR_IO_PENDING, result);
|
| DCHECK(user_callback_);
|
| user_callback_->Run(result);
|
| }
|
|
|
| -int InitProxyResolver::DoWait() {
|
| +int ProxyScriptDecider::DoWait() {
|
| next_state_ = STATE_WAIT_COMPLETE;
|
|
|
| // If no waiting is required, continue on to the next state.
|
| @@ -166,23 +187,23 @@
|
|
|
| // Otherwise wait the specified amount of time.
|
| wait_timer_.Start(FROM_HERE, wait_delay_, this,
|
| - &InitProxyResolver::OnWaitTimerFired);
|
| - net_log_.BeginEvent(NetLog::TYPE_INIT_PROXY_RESOLVER_WAIT, NULL);
|
| + &ProxyScriptDecider::OnWaitTimerFired);
|
| + net_log_.BeginEvent(NetLog::TYPE_PROXY_SCRIPT_DECIDER_WAIT, NULL);
|
| return ERR_IO_PENDING;
|
| }
|
|
|
| -int InitProxyResolver::DoWaitComplete(int result) {
|
| +int ProxyScriptDecider::DoWaitComplete(int result) {
|
| DCHECK_EQ(OK, result);
|
| if (wait_delay_.ToInternalValue() != 0) {
|
| - net_log_.EndEventWithNetErrorCode(NetLog::TYPE_INIT_PROXY_RESOLVER_WAIT,
|
| + net_log_.EndEventWithNetErrorCode(NetLog::TYPE_PROXY_SCRIPT_DECIDER_WAIT,
|
| result);
|
| }
|
| next_state_ = GetStartState();
|
| return OK;
|
| }
|
|
|
| -int InitProxyResolver::DoFetchPacScript() {
|
| - DCHECK(resolver_->expects_pac_bytes());
|
| +int ProxyScriptDecider::DoFetchPacScript() {
|
| + DCHECK(fetch_pac_bytes_);
|
|
|
| next_state_ = STATE_FETCH_PAC_SCRIPT_COMPLETE;
|
|
|
| @@ -193,12 +214,12 @@
|
| CreateNetLogParameterAndDetermineURL(pac_source, &effective_pac_url);
|
|
|
| net_log_.BeginEvent(
|
| - NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT,
|
| + NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT,
|
| make_scoped_refptr(log_parameter));
|
|
|
| if (pac_source.type == PacSource::WPAD_DHCP) {
|
| if (!dhcp_proxy_script_fetcher_) {
|
| - net_log_.AddEvent(NetLog::TYPE_INIT_PROXY_RESOLVER_HAS_NO_FETCHER, NULL);
|
| + net_log_.AddEvent(NetLog::TYPE_PROXY_SCRIPT_DECIDER_HAS_NO_FETCHER, NULL);
|
| return ERR_UNEXPECTED;
|
| }
|
|
|
| @@ -206,7 +227,7 @@
|
| }
|
|
|
| if (!proxy_script_fetcher_) {
|
| - net_log_.AddEvent(NetLog::TYPE_INIT_PROXY_RESOLVER_HAS_NO_FETCHER, NULL);
|
| + net_log_.AddEvent(NetLog::TYPE_PROXY_SCRIPT_DECIDER_HAS_NO_FETCHER, NULL);
|
| return ERR_UNEXPECTED;
|
| }
|
|
|
| @@ -214,83 +235,80 @@
|
| effective_pac_url, &pac_script_, &io_callback_);
|
| }
|
|
|
| -int InitProxyResolver::DoFetchPacScriptComplete(int result) {
|
| - DCHECK(resolver_->expects_pac_bytes());
|
| +int ProxyScriptDecider::DoFetchPacScriptComplete(int result) {
|
| + DCHECK(fetch_pac_bytes_);
|
|
|
| net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT, result);
|
| + NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT, result);
|
| if (result != OK)
|
| return TryToFallbackPacSource(result);
|
|
|
| - next_state_ = STATE_SET_PAC_SCRIPT;
|
| + next_state_ = STATE_VERIFY_PAC_SCRIPT;
|
| return result;
|
| }
|
|
|
| -int InitProxyResolver::DoSetPacScript() {
|
| - net_log_.BeginEvent(NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT, NULL);
|
| +int ProxyScriptDecider::DoVerifyPacScript() {
|
| + next_state_ = STATE_VERIFY_PAC_SCRIPT_COMPLETE;
|
|
|
| - const PacSource& pac_source = current_pac_source();
|
| + // This is just a heuristic. Ideally we would try to parse the script.
|
| + if (fetch_pac_bytes_ && !LooksLikePacScript(pac_script_))
|
| + return ERR_PAC_SCRIPT_FAILED;
|
|
|
| - next_state_ = STATE_SET_PAC_SCRIPT_COMPLETE;
|
| + return OK;
|
| +}
|
|
|
| - scoped_refptr<ProxyResolverScriptData> script_data;
|
| +int ProxyScriptDecider::DoVerifyPacScriptComplete(int result) {
|
| + if (result != OK)
|
| + return TryToFallbackPacSource(result);
|
|
|
| - if (resolver_->expects_pac_bytes()) {
|
| - script_data = ProxyResolverScriptData::FromUTF16(pac_script_);
|
| + const PacSource& pac_source = current_pac_source();
|
| +
|
| + // Extract the current script data.
|
| + if (fetch_pac_bytes_) {
|
| + script_data_ = ProxyResolverScriptData::FromUTF16(pac_script_);
|
| } else {
|
| - script_data = pac_source.type == PacSource::CUSTOM ?
|
| + script_data_ = pac_source.type == PacSource::CUSTOM ?
|
| ProxyResolverScriptData::FromURL(pac_source.url) :
|
| ProxyResolverScriptData::ForAutoDetect();
|
| }
|
|
|
| - return resolver_->SetPacScript(script_data, &io_callback_);
|
| -}
|
| -
|
| -int InitProxyResolver::DoSetPacScriptComplete(int result) {
|
| - net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT, result);
|
| - if (result != OK)
|
| - return TryToFallbackPacSource(result);
|
| -
|
| // Let the caller know which automatic setting we ended up initializing the
|
| // resolver for (there may have been multiple fallbacks to choose from.)
|
| - if (effective_config_) {
|
| - if (current_pac_source().type == PacSource::CUSTOM) {
|
| - *effective_config_ =
|
| - ProxyConfig::CreateFromCustomPacURL(current_pac_source().url);
|
| - effective_config_->set_pac_mandatory(pac_mandatory_);
|
| - } else {
|
| - if (resolver_->expects_pac_bytes()) {
|
| - GURL auto_detected_url;
|
| + if (current_pac_source().type == PacSource::CUSTOM) {
|
| + effective_config_ =
|
| + ProxyConfig::CreateFromCustomPacURL(current_pac_source().url);
|
| + effective_config_.set_pac_mandatory(pac_mandatory_);
|
| + } else {
|
| + if (fetch_pac_bytes_) {
|
| + GURL auto_detected_url;
|
|
|
| - switch (current_pac_source().type) {
|
| - case PacSource::WPAD_DHCP:
|
| - auto_detected_url = dhcp_proxy_script_fetcher_->GetPacURL();
|
| - break;
|
| + switch (current_pac_source().type) {
|
| + case PacSource::WPAD_DHCP:
|
| + auto_detected_url = dhcp_proxy_script_fetcher_->GetPacURL();
|
| + break;
|
|
|
| - case PacSource::WPAD_DNS:
|
| - auto_detected_url = GURL(kWpadUrl);
|
| - break;
|
| + case PacSource::WPAD_DNS:
|
| + auto_detected_url = GURL(kWpadUrl);
|
| + break;
|
|
|
| - default:
|
| - NOTREACHED();
|
| - }
|
| + default:
|
| + NOTREACHED();
|
| + }
|
|
|
| - *effective_config_ =
|
| - ProxyConfig::CreateFromCustomPacURL(auto_detected_url);
|
| - } else {
|
| - // The resolver does its own resolution so we cannot know the
|
| - // URL. Just do the best we can and state that the configuration
|
| - // is to auto-detect proxy settings.
|
| - *effective_config_ = ProxyConfig::CreateAutoDetect();
|
| - }
|
| + effective_config_ =
|
| + ProxyConfig::CreateFromCustomPacURL(auto_detected_url);
|
| + } else {
|
| + // The resolver does its own resolution so we cannot know the
|
| + // URL. Just do the best we can and state that the configuration
|
| + // is to auto-detect proxy settings.
|
| + effective_config_ = ProxyConfig::CreateAutoDetect();
|
| }
|
| }
|
|
|
| - return result;
|
| + return OK;
|
| }
|
|
|
| -int InitProxyResolver::TryToFallbackPacSource(int error) {
|
| +int ProxyScriptDecider::TryToFallbackPacSource(int error) {
|
| DCHECK_LT(error, 0);
|
|
|
| if (current_pac_source_index_ + 1 >= pac_sources_.size()) {
|
| @@ -302,19 +320,18 @@
|
| ++current_pac_source_index_;
|
|
|
| net_log_.AddEvent(
|
| - NetLog::TYPE_INIT_PROXY_RESOLVER_FALLING_BACK_TO_NEXT_PAC_SOURCE, NULL);
|
| + NetLog::TYPE_PROXY_SCRIPT_DECIDER_FALLING_BACK_TO_NEXT_PAC_SOURCE, NULL);
|
|
|
| next_state_ = GetStartState();
|
|
|
| return OK;
|
| }
|
|
|
| -InitProxyResolver::State InitProxyResolver::GetStartState() const {
|
| - return resolver_->expects_pac_bytes() ?
|
| - STATE_FETCH_PAC_SCRIPT : STATE_SET_PAC_SCRIPT;
|
| +ProxyScriptDecider::State ProxyScriptDecider::GetStartState() const {
|
| + return fetch_pac_bytes_ ? STATE_FETCH_PAC_SCRIPT : STATE_VERIFY_PAC_SCRIPT;
|
| }
|
|
|
| -NetLogStringParameter* InitProxyResolver::CreateNetLogParameterAndDetermineURL(
|
| +NetLogStringParameter* ProxyScriptDecider::CreateNetLogParameterAndDetermineURL(
|
| const PacSource& pac_source,
|
| GURL* effective_pac_url) {
|
| DCHECK(effective_pac_url);
|
| @@ -338,21 +355,21 @@
|
| return new NetLogStringParameter("source", source_field);
|
| }
|
|
|
| -const InitProxyResolver::PacSource&
|
| - InitProxyResolver::current_pac_source() const {
|
| +const ProxyScriptDecider::PacSource&
|
| + ProxyScriptDecider::current_pac_source() const {
|
| DCHECK_LT(current_pac_source_index_, pac_sources_.size());
|
| return pac_sources_[current_pac_source_index_];
|
| }
|
|
|
| -void InitProxyResolver::OnWaitTimerFired() {
|
| +void ProxyScriptDecider::OnWaitTimerFired() {
|
| OnIOCompletion(OK);
|
| }
|
|
|
| -void InitProxyResolver::DidCompleteInit() {
|
| - net_log_.EndEvent(NetLog::TYPE_INIT_PROXY_RESOLVER, NULL);
|
| +void ProxyScriptDecider::DidComplete() {
|
| + net_log_.EndEvent(NetLog::TYPE_PROXY_SCRIPT_DECIDER, NULL);
|
| }
|
|
|
| -void InitProxyResolver::Cancel() {
|
| +void ProxyScriptDecider::Cancel() {
|
| DCHECK_NE(STATE_NONE, next_state_);
|
|
|
| net_log_.AddEvent(NetLog::TYPE_CANCELLED, NULL);
|
| @@ -364,9 +381,6 @@
|
| case STATE_FETCH_PAC_SCRIPT_COMPLETE:
|
| proxy_script_fetcher_->Cancel();
|
| break;
|
| - case STATE_SET_PAC_SCRIPT_COMPLETE:
|
| - resolver_->CancelSetPacScript();
|
| - break;
|
| default:
|
| NOTREACHED();
|
| break;
|
| @@ -376,7 +390,7 @@
|
| if (dhcp_proxy_script_fetcher_)
|
| dhcp_proxy_script_fetcher_->Cancel();
|
|
|
| - DidCompleteInit();
|
| + DidComplete();
|
| }
|
|
|
| } // namespace net
|
|
|